2025-07-22 10:33:01 +02:00
|
|
|
global:
|
|
|
|
|
domain: argocd.edp.buildth.ing
|
|
|
|
|
|
|
|
|
|
configs:
|
|
|
|
|
params:
|
|
|
|
|
server.insecure: true
|
|
|
|
|
cm:
|
2026-01-29 09:48:55 +00:00
|
|
|
# This code never quite worked, always led to 503 errors
|
|
|
|
|
# In theory it allows access to ArgoCD via OIDC through Forgejo
|
|
|
|
|
# oidc.config: |
|
|
|
|
|
# name: FORGEJO
|
|
|
|
|
# issuer: https://dex.edp.buildth.ing
|
|
|
|
|
# clientID: controller-argocd-dex
|
|
|
|
|
# clientSecret: $dex-argo-client:clientSecret
|
|
|
|
|
# requestedScopes:
|
|
|
|
|
# - openid
|
|
|
|
|
# - profile
|
|
|
|
|
# - email
|
|
|
|
|
# - groups
|
2025-07-22 10:33:01 +02:00
|
|
|
application.resourceTrackingMethod: annotation
|
|
|
|
|
timeout.reconciliation: 60s
|
|
|
|
|
resource.exclusions: |
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- "*"
|
|
|
|
|
kinds:
|
|
|
|
|
- ProviderConfigUsage
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- cilium.io
|
|
|
|
|
kinds:
|
|
|
|
|
- CiliumIdentity
|
|
|
|
|
clusters:
|
|
|
|
|
- "*"
|
|
|
|
|
url: https://argocd.edp.buildth.ing
|
|
|
|
|
rbac:
|
2026-01-29 09:07:02 +00:00
|
|
|
policy.csv: 'g, DevFW, role:admin'
|
2025-07-22 10:33:01 +02:00
|
|
|
|
|
|
|
|
tls:
|
|
|
|
|
certificates:
|
|
|
|
|
|
|
|
|
|
notifications:
|
|
|
|
|
enabled: false
|
|
|
|
|
|
|
|
|
|
dex:
|
|
|
|
|
enabled: false
|