Compare commits

..

No commits in common. "main" and "argo-cd-8.0.1" have entirely different histories.

71 changed files with 108 additions and 437 deletions

View File

@ -11,7 +11,6 @@ Checklist:
* [ ] I have updated the chart changelog with all the changes that come with this pull request according to [changelog](https://github.com/argoproj/argo-helm/blob/main/CONTRIBUTING.md#changelog).
* [ ] Any new values are backwards compatible and/or have sensible default.
* [ ] I have signed off all my commits as required by [DCO](https://github.com/argoproj/argoproj/blob/master/community/CONTRIBUTING.md).
* [ ] I have created a separate pull request for each chart according to [pull requests](https://github.com/argoproj/argo-helm/blob/main/CONTRIBUTING.md#pull-requests)
* [ ] My build is green ([troubleshooting builds](https://argo-cd.readthedocs.io/en/stable/developer-guide/ci/)).
<!-- Changes are automatically published when merged to `main`. They are not published on branches. -->

View File

@ -9,7 +9,7 @@ jobs:
linter-artifacthub:
runs-on: ubuntu-latest
container:
image: ecr-public.aws.com/artifacthub/ah:v1.14.0
image: public.ecr.aws/artifacthub/ah:v1.14.0
options: --user 1001
steps:
- name: Checkout

View File

@ -26,11 +26,11 @@ jobs:
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Self-hosted Renovate
uses: renovatebot/github-action@a889a8abcb11ef7feaafaf5e483ea01d4bf7774e # v43.0.5
uses: renovatebot/github-action@f5c3383cb7cbf7711d8b66b809375b2d5f4e2d1d # v42.0.2
with:
configurationFile: .github/configs/renovate-config.js
# renovate: datasource=docker depName=ghcr.io/renovatebot/renovate
renovate-version: 41.46.8
renovate-version: 40.2.0
token: '${{ steps.get_token.outputs.token }}'
mount-docker-socket: true
env:

View File

@ -38,7 +38,7 @@ jobs:
persist-credentials: false
- name: "Run analysis"
uses: ossf/scorecard-action@05b42c624433fc40578a4040d5cf5e36ddca8cde # v2.4.2
uses: ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 # v2.4.1
with:
results_file: results.sarif
results_format: sarif
@ -68,6 +68,6 @@ jobs:
# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
uses: github/codeql-action/upload-sarif@51f77329afa6477de8c49fc9c7046c15b9a4e79d # v3.29.5
uses: github/codeql-action/upload-sarif@60168efe1c415ce0f5521ea06d5c2062adbeed1b # v3.28.17
with:
sarif_file: results.sarif

View File

@ -6,10 +6,6 @@ Argo Helm is a collection of **community maintained** charts. Therefore we rely
All submissions, including submissions by project members, require review. We use GitHub pull requests for this purpose. Consult [GitHub Help](https://help.github.com/articles/about-pull-requests/) for more information on using pull requests. See the above stated requirements for PR on this project.
> **Note**
> Please create a separate Pull Request for each chart.
> e.g: If your changes involve both argo-cd and argo-rollouts, please submit one PR for argo-cd and another separate.
### Pull Request Title Linting
We lint the title of your pull request to ensure it follows the [Conventional Commits](https://www.conventionalcommits.org/en/v1.0.0/) specification. This is done using GitHub actions and the [action-semantic-pull-request](.github/workflows/pr-title.yml) workflow. We require the scope of the change to be included in the title. The scope should be the name of the chart you are changing. For example, if you are changing the `argo-cd` chart, the title of your pull request should be `fix(argo-cd): Fix typo in values.yaml`.

View File

@ -1,6 +1,6 @@
dependencies:
- name: redis-ha
repository: https://dandydeveloper.github.io/charts/
version: 4.33.7
digest: sha256:a3eba6bba484e9fbfaca33e7f1ea3e6daed74014df7e7b077c496c2201b01996
generated: "2025-05-25T11:18:29.356017-05:00"
version: 4.33.2
digest: sha256:1ce334c23fe53427c771277cc7cecd4143226aba04c8a6c52513042a96e7ff5d
generated: "2025-03-27T09:46:27.113833-07:00"

View File

@ -1,9 +1,9 @@
apiVersion: v2
appVersion: v3.0.12
appVersion: v3.0.0
kubeVersion: ">=1.25.0-0"
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
name: argo-cd
version: 8.2.5
version: 8.0.1
home: https://github.com/argoproj/argo-helm
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
sources:
@ -18,7 +18,7 @@ maintainers:
url: https://argoproj.github.io/
dependencies:
- name: redis-ha
version: 4.33.7
version: 4.33.2
repository: https://dandydeveloper.github.io/charts/
condition: redis-ha.enabled
annotations:
@ -26,5 +26,5 @@ annotations:
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
artifacthub.io/changes: |
- kind: added
description: Add condition for rootpath in NOTES.txt
- kind: fixed
description: Use correct Secret name for optional (external-)Redis authentication

View File

@ -237,31 +237,6 @@ server:
enabled: true
```
## Setting the initial admin password via Argo CD Application CR
> **Note:** When deploying the `argo-cd` chart via an Argo CD `Application` CR, define your bcrypt-hashed admin password under `helm.values`—not `helm.parameters`—because Argo CD performs variable substitution on `parameters`, which will mangle any `$…` in your hash.
```yaml
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: argocd-testing
spec:
destination:
namespace: testing
server: https://kubernetes.default.svc
project: default
source:
chart: argo-cd
repoURL: https://argoproj.github.io/argo-helm
targetRevision: 3.21.0
helm:
values: |
configs:
secret:
argocdServerAdminPassword: $2a$10$H1a30nMr9v2QE2nkyz0BoOD2J0I6FQFMtHS0csEg12RBWzfRuuoE6
```
## Synchronizing Changes from Original Repository
In the original [Argo CD repository](https://github.com/argoproj/argo-cd/) an [`manifests/install.yaml`](https://github.com/argoproj/argo-cd/blob/master/manifests/install.yaml) is generated using `kustomize`. It's the basis for the installation as [described in the docs](https://argo-cd.readthedocs.io/en/stable/getting_started/#1-install-argo-cd).
@ -731,7 +706,7 @@ NAME: my-release
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| apiVersionOverrides | object | `{}` | |
| crds.additionalLabels | object | `{}` | Additional labels to be added to all CRDs |
| crds.additionalLabels | object | `{}` | Addtional labels to be added to all CRDs |
| crds.annotations | object | `{}` | Annotations to be added to all CRDs |
| crds.install | bool | `true` | Install and upgrade CRDs |
| crds.keep | bool | `true` | Keep CRDs on chart uninstall |
@ -757,7 +732,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| global.affinity.podAntiAffinity | string | `"soft"` | Default pod anti-affinity rules. Either: `none`, `soft` or `hard` |
| global.certificateAnnotations | object | `{}` | Annotations for the all deployed Certificates |
| global.deploymentAnnotations | object | `{}` | Annotations for the all deployed Deployments |
| global.deploymentLabels | object | `{}` | Labels for the all deployed Deployments |
| global.deploymentStrategy | object | `{}` | Deployment strategy for the all deployed Deployments |
| global.domain | string | `"argocd.example.com"` | Default domain used by all components |
| global.dualStack.ipFamilies | list | `[]` | IP families that should be supported and the order in which they should be applied to ClusterIP as well. Can be IPv4 and/or IPv6. |
@ -824,7 +798,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| configs.params."controller.self.heal.timeout.seconds" | int | `5` | Specifies timeout between application self heal attempts |
| configs.params."controller.status.processors" | int | `20` | Number of application status processors |
| configs.params."controller.sync.timeout.seconds" | int | `0` | Specifies the timeout after which a sync would be terminated. 0 means no timeout |
| configs.params."hydrator.enabled" | bool | `false` | Enable the hydrator feature (hydrator is in Alpha phase) |
| configs.params."otlp.address" | string | `""` | Open-Telemetry collector address: (e.g. "otel-collector:4317") |
| configs.params."reposerver.parallelism.limit" | int | `0` | Limit on number of concurrent manifests generate requests. Any value less the 1 means no limit. |
| configs.params."server.basehref" | string | `"/"` | Value for base href in index.html. Used if Argo CD is running behind reverse proxy under subpath different from / |
@ -878,7 +851,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| controller.containerPorts.metrics | int | `8082` | Metrics container port |
| controller.containerSecurityContext | object | See [values.yaml] | Application controller container-level security context |
| controller.deploymentAnnotations | object | `{}` | Annotations for the application controller Deployment |
| controller.deploymentLabels | object | `{}` | Labels for the application controller Deployment |
| controller.dnsConfig | object | `{}` | [DNS configuration] |
| controller.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for application controller pods |
| controller.dynamicClusterDistribution | bool | `false` | Enable dynamic cluster distribution (alpha) Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/dynamic-cluster-distribution |
@ -922,7 +894,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| controller.metrics.serviceMonitor.selector | object | `{}` | Prometheus ServiceMonitor selector |
| controller.metrics.serviceMonitor.tlsConfig | object | `{}` | Prometheus ServiceMonitor tlsConfig |
| controller.name | string | `"application-controller"` | Application controller name string |
| controller.networkPolicy.create | bool | `false` (defaults to global.networkPolicy.create) | Default network policy rules used by application controller |
| controller.nodeSelector | object | `{}` (defaults to global.nodeSelector) | [Node selector] |
| controller.pdb.annotations | object | `{}` | Annotations to be added to application controller pdb |
| controller.pdb.enabled | bool | `false` | Deploy a [PodDisruptionBudget] for the application controller |
@ -978,7 +949,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| repoServer.containerPorts.server | int | `8081` | Repo server container port |
| repoServer.containerSecurityContext | object | See [values.yaml] | Repo server container-level security context |
| repoServer.deploymentAnnotations | object | `{}` | Annotations to be added to repo server Deployment |
| repoServer.deploymentLabels | object | `{}` | Labels for the repo server Deployment |
| repoServer.deploymentStrategy | object | `{}` | Deployment strategy to be added to the repo server Deployment |
| repoServer.dnsConfig | object | `{}` | [DNS configuration] |
| repoServer.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for Repo server pods |
@ -1020,7 +990,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| repoServer.metrics.serviceMonitor.selector | object | `{}` | Prometheus ServiceMonitor selector |
| repoServer.metrics.serviceMonitor.tlsConfig | object | `{}` | Prometheus ServiceMonitor tlsConfig |
| repoServer.name | string | `"repo-server"` | Repo server name |
| repoServer.networkPolicy.create | bool | `false` (defaults to global.networkPolicy.create) | Default network policy rules used by repo server |
| repoServer.nodeSelector | object | `{}` (defaults to global.nodeSelector) | [Node selector] |
| repoServer.pdb.annotations | object | `{}` | Annotations to be added to repo server pdb |
| repoServer.pdb.enabled | bool | `false` | Deploy a [PodDisruptionBudget] for the repo server |
@ -1043,7 +1012,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| repoServer.service.labels | object | `{}` | Repo server service labels |
| repoServer.service.port | int | `8081` | Repo server service port |
| repoServer.service.portName | string | `"tcp-repo-server"` | Repo server service port name |
| repoServer.service.trafficDistribution | string | `""` | Traffic distribution preference for the repo server service. If the field is not set, the implementation will apply its default routing strategy. |
| repoServer.serviceAccount.annotations | object | `{}` | Annotations applied to created service account |
| repoServer.serviceAccount.automountServiceAccountToken | bool | `true` | Automount API credentials for the Service Account |
| repoServer.serviceAccount.create | bool | `true` | Create repo server service account |
@ -1095,7 +1063,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| server.containerPorts.server | int | `8080` | Server container port |
| server.containerSecurityContext | object | See [values.yaml] | Server container-level security context |
| server.deploymentAnnotations | object | `{}` | Annotations to be added to server Deployment |
| server.deploymentLabels | object | `{}` | Labels for the server Deployment |
| server.deploymentStrategy | object | `{}` | Deployment strategy to be added to the server Deployment |
| server.dnsConfig | object | `{}` | [DNS configuration] |
| server.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for Server pods |
@ -1174,7 +1141,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| server.metrics.serviceMonitor.selector | object | `{}` | Prometheus ServiceMonitor selector |
| server.metrics.serviceMonitor.tlsConfig | object | `{}` | Prometheus ServiceMonitor tlsConfig |
| server.name | string | `"server"` | Argo CD server name |
| server.networkPolicy.create | bool | `false` (defaults to global.networkPolicy.create) | Default network policy rules used by ArgoCD Server |
| server.nodeSelector | object | `{}` (defaults to global.nodeSelector) | [Node selector] |
| server.pdb.annotations | object | `{}` | Annotations to be added to Argo CD server pdb |
| server.pdb.enabled | bool | `false` | Deploy a [PodDisruptionBudget] for the Argo CD server |
@ -1241,7 +1207,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| dex.containerPorts.metrics | int | `5558` | Metrics container port |
| dex.containerSecurityContext | object | See [values.yaml] | Dex container-level security context |
| dex.deploymentAnnotations | object | `{}` | Annotations to be added to the Dex server Deployment |
| dex.deploymentLabels | object | `{}` | Labels for the Dex server Deployment |
| dex.deploymentStrategy | object | `{}` | Deployment strategy to be added to the Dex server Deployment |
| dex.dnsConfig | object | `{}` | [DNS configuration] |
| dex.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for Dex server pods |
@ -1253,7 +1218,7 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| dex.extraContainers | list | `[]` | Additional containers to be added to the dex pod |
| dex.image.imagePullPolicy | string | `""` (defaults to global.image.imagePullPolicy) | Dex imagePullPolicy |
| dex.image.repository | string | `"ghcr.io/dexidp/dex"` | Dex image repository |
| dex.image.tag | string | `"v2.43.1"` | Dex image tag |
| dex.image.tag | string | `"v2.42.1"` | Dex image tag |
| dex.imagePullSecrets | list | `[]` (defaults to global.imagePullSecrets) | Secrets with credentials to pull images from a private registry |
| dex.initContainers | list | `[]` | Init containers to add to the dex pod |
| dex.initImage.imagePullPolicy | string | `""` (defaults to global.image.imagePullPolicy) | Argo CD init image imagePullPolicy |
@ -1285,7 +1250,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| dex.metrics.serviceMonitor.selector | object | `{}` | Prometheus ServiceMonitor selector |
| dex.metrics.serviceMonitor.tlsConfig | object | `{}` | Prometheus ServiceMonitor tlsConfig |
| dex.name | string | `"dex-server"` | Dex name |
| dex.networkPolicy.create | bool | `false` (defaults to global.networkPolicy.create) | Default network policy rules used by Dex server |
| dex.nodeSelector | object | `{}` (defaults to global.nodeSelector) | [Node selector] |
| dex.pdb.annotations | object | `{}` | Annotations to be added to Dex server pdb |
| dex.pdb.enabled | bool | `false` | Deploy a [PodDisruptionBudget] for the Dex server |
@ -1333,7 +1297,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| redis.containerPorts.redis | int | `6379` | Redis container port |
| redis.containerSecurityContext | object | See [values.yaml] | Redis container-level security context |
| redis.deploymentAnnotations | object | `{}` | Annotations to be added to the Redis server Deployment |
| redis.deploymentLabels | object | `{}` | Labels for the Redis server Deployment |
| redis.dnsConfig | object | `{}` | [DNS configuration] |
| redis.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for Redis server pods |
| redis.enabled | bool | `true` | Enable redis |
@ -1344,7 +1307,7 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| redis.exporter.env | list | `[]` | Environment variables to pass to the Redis exporter |
| redis.exporter.image.imagePullPolicy | string | `""` (defaults to global.image.imagePullPolicy) | Image pull policy for the redis-exporter |
| redis.exporter.image.repository | string | `"ghcr.io/oliver006/redis_exporter"` | Repository to use for the redis-exporter |
| redis.exporter.image.tag | string | `"v1.74.0"` | Tag to use for the redis-exporter |
| redis.exporter.image.tag | string | `"v1.71.0"` | Tag to use for the redis-exporter |
| redis.exporter.livenessProbe.enabled | bool | `false` | Enable Kubernetes liveness probe for Redis exporter |
| redis.exporter.livenessProbe.failureThreshold | int | `5` | Minimum consecutive failures for the [probe] to be considered failed after having succeeded |
| redis.exporter.livenessProbe.initialDelaySeconds | int | `30` | Number of seconds after the container has started before [probe] is initiated |
@ -1361,7 +1324,7 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| redis.extraArgs | list | `[]` | Additional command line arguments to pass to redis-server |
| redis.extraContainers | list | `[]` | Additional containers to be added to the redis pod |
| redis.image.imagePullPolicy | string | `""` (defaults to global.image.imagePullPolicy) | Redis image pull policy |
| redis.image.repository | string | `"ecr-public.aws.com/docker/library/redis"` | Redis repository |
| redis.image.repository | string | `"public.ecr.aws/docker/library/redis"` | Redis repository |
| redis.image.tag | string | `"7.2.8-alpine"` | Redis tag |
| redis.imagePullSecrets | list | `[]` (defaults to global.imagePullSecrets) | Secrets with credentials to pull images from a private registry |
| redis.initContainers | list | `[]` | Init containers to add to the redis pod |
@ -1390,7 +1353,6 @@ NOTE: Any values you put under `.Values.configs.cm` are passed to argocd-cm Conf
| redis.metrics.serviceMonitor.selector | object | `{}` | Prometheus ServiceMonitor selector |
| redis.metrics.serviceMonitor.tlsConfig | object | `{}` | Prometheus ServiceMonitor tlsConfig |
| redis.name | string | `"redis"` | Redis name |
| redis.networkPolicy.create | bool | `false` (defaults to global.networkPolicy.create) | Default network policy rules used by redis |
| redis.nodeSelector | object | `{}` (defaults to global.nodeSelector) | [Node selector] |
| redis.pdb.annotations | object | `{}` | Annotations to be added to Redis pdb |
| redis.pdb.enabled | bool | `false` | Deploy a [PodDisruptionBudget] for the Redis |
@ -1444,12 +1406,11 @@ The main options are listed here:
| redis-ha.haproxy.containerSecurityContext | object | See [values.yaml] | HAProxy container-level security context |
| redis-ha.haproxy.enabled | bool | `true` | Enabled HAProxy LoadBalancing/Proxy |
| redis-ha.haproxy.hardAntiAffinity | bool | `true` | Whether the haproxy pods should be forced to run on separate nodes. |
| redis-ha.haproxy.image.repository | string | `"ecr-public.aws.com/docker/library/haproxy"` | HAProxy Image Repository |
| redis-ha.haproxy.labels | object | `{"app.kubernetes.io/name":"argocd-redis-ha-haproxy"}` | Custom labels for the haproxy pod. This is relevant for Argo CD CLI. |
| redis-ha.haproxy.metrics.enabled | bool | `true` | HAProxy enable prometheus metric scraping |
| redis-ha.haproxy.tolerations | list | `[]` | [Tolerations] for use with node taints for haproxy pods. |
| redis-ha.hardAntiAffinity | bool | `true` | Whether the Redis server pods should be forced to run on separate nodes. |
| redis-ha.image.repository | string | `"ecr-public.aws.com/docker/library/redis"` | Redis repository |
| redis-ha.image.repository | string | `"public.ecr.aws/docker/library/redis"` | Redis repository |
| redis-ha.image.tag | string | `"7.2.8-alpine"` | Redis tag |
| redis-ha.persistentVolume.enabled | bool | `false` | Configures persistence on Redis nodes |
| redis-ha.redis.config | object | See [values.yaml] | Any valid redis config options in this section will be applied to each server (see `redis-ha` chart) |
@ -1473,7 +1434,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| externalRedis.existingSecret | string | `""` | The name of an existing secret with Redis (must contain key `redis-password`. And should contain `redis-username` if username is not `default`) and Sentinel credentials. When it's set, the `externalRedis.username` and `externalRedis.password` parameters are ignored |
| externalRedis.existingSecret | string | `""` | The name of an existing secret with Redis (must contain key `redis-password`) and Sentinel credentials. When it's set, the `externalRedis.password` parameter is ignored |
| externalRedis.host | string | `""` | External Redis server host |
| externalRedis.password | string | `""` | External Redis password |
| externalRedis.port | int | `6379` | External Redis server port |
@ -1533,7 +1494,6 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
| applicationSet.containerPorts.webhook | int | `7000` | Webhook container port |
| applicationSet.containerSecurityContext | object | See [values.yaml] | ApplicationSet controller container-level security context |
| applicationSet.deploymentAnnotations | object | `{}` | Annotations to be added to ApplicationSet controller Deployment |
| applicationSet.deploymentLabels | object | `{}` | Labels for the ApplicationSet controller Deployment |
| applicationSet.deploymentStrategy | object | `{}` | Deployment strategy to be added to the ApplicationSet controller Deployment |
| applicationSet.dnsConfig | object | `{}` | [DNS configuration] |
| applicationSet.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for ApplicationSet controller pods |
@ -1587,7 +1547,6 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
| applicationSet.metrics.serviceMonitor.selector | object | `{}` | Prometheus ServiceMonitor selector |
| applicationSet.metrics.serviceMonitor.tlsConfig | object | `{}` | Prometheus ServiceMonitor tlsConfig |
| applicationSet.name | string | `"applicationset-controller"` | ApplicationSet controller name string |
| applicationSet.networkPolicy.create | bool | `false` (defaults to global.networkPolicy.create) | Default network policy rules used by ApplicationSet controller |
| applicationSet.nodeSelector | object | `{}` (defaults to global.nodeSelector) | [Node selector] |
| applicationSet.pdb.annotations | object | `{}` | Annotations to be added to ApplicationSet controller pdb |
| applicationSet.pdb.enabled | bool | `false` | Deploy a [PodDisruptionBudget] for the ApplicationSet controller |
@ -1633,7 +1592,6 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
| notifications.containerSecurityContext | object | See [values.yaml] | Notification controller container-level security Context |
| notifications.context | object | `{}` | Define user-defined context |
| notifications.deploymentAnnotations | object | `{}` | Annotations to be applied to the notifications controller Deployment |
| notifications.deploymentLabels | object | `{}` | Labels for the notifications controller Deployment |
| notifications.deploymentStrategy | object | `{"type":"Recreate"}` | Deployment strategy to be added to the notifications controller Deployment |
| notifications.dnsConfig | object | `{}` | [DNS configuration] |
| notifications.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for notifications controller Pods |
@ -1672,7 +1630,6 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
| notifications.metrics.serviceMonitor.selector | object | `{}` | Prometheus ServiceMonitor selector |
| notifications.metrics.serviceMonitor.tlsConfig | object | `{}` | Prometheus ServiceMonitor tlsConfig |
| notifications.name | string | `"notifications-controller"` | Notifications controller name string |
| notifications.networkPolicy.create | bool | `false` (defaults to global.networkPolicy.create) | Default network policy rules used by notifications controller |
| notifications.nodeSelector | object | `{}` (defaults to global.nodeSelector) | [Node selector] |
| notifications.notifiers | object | See [values.yaml] | Configures notification services such as slack, email or custom webhook |
| notifications.pdb.annotations | object | `{}` | Annotations to be added to notifications controller pdb |
@ -1720,7 +1677,6 @@ To read more about this component, please read [Argo CD Manifest Hydrator] and [
| commitServer.automountServiceAccountToken | bool | `false` | Automount API credentials for the Service Account into the pod. |
| commitServer.containerSecurityContext | object | See [values.yaml] | commit server container-level security context |
| commitServer.deploymentAnnotations | object | `{}` | Annotations to be added to commit server Deployment |
| commitServer.deploymentLabels | object | `{}` | Labels for the commit server Deployment |
| commitServer.deploymentStrategy | object | `{}` | Deployment strategy to be added to the commit server Deployment |
| commitServer.dnsConfig | object | `{}` | [DNS configuration] |
| commitServer.dnsPolicy | string | `"ClusterFirst"` | Alternative DNS policy for commit server pods |
@ -1746,7 +1702,6 @@ To read more about this component, please read [Argo CD Manifest Hydrator] and [
| commitServer.metrics.service.servicePort | int | `8087` | Metrics service port |
| commitServer.metrics.service.type | string | `"ClusterIP"` | Metrics service type |
| commitServer.name | string | `"commit-server"` | Commit server name |
| commitServer.networkPolicy.create | bool | `false` (defaults to global.networkPolicy.create) | Default network policy rules used by commit server |
| commitServer.nodeSelector | object | `{}` (defaults to global.nodeSelector) | [Node selector] |
| commitServer.podAnnotations | object | `{}` | Annotations for the commit server pods |
| commitServer.podLabels | object | `{}` | Labels for the commit server pods |
@ -1760,8 +1715,6 @@ To read more about this component, please read [Argo CD Manifest Hydrator] and [
| commitServer.runtimeClassName | string | `""` (defaults to global.runtimeClassName) | Runtime class name for the commit server |
| commitServer.service.annotations | object | `{}` | commit server service annotations |
| commitServer.service.labels | object | `{}` | commit server service labels |
| commitServer.service.port | int | `8086` | commit server service port |
| commitServer.service.portName | string | `"server"` | commit server service port name |
| commitServer.serviceAccount.annotations | object | `{}` | Annotations applied to created service account |
| commitServer.serviceAccount.automountServiceAccountToken | bool | `true` | Automount API credentials for the Service Account |
| commitServer.serviceAccount.create | bool | `true` | Create commit server service account |

View File

@ -236,31 +236,6 @@ server:
enabled: true
```
## Setting the initial admin password via Argo CD Application CR
> **Note:** When deploying the `argo-cd` chart via an Argo CD `Application` CR, define your bcrypt-hashed admin password under `helm.values`—not `helm.parameters`—because Argo CD performs variable substitution on `parameters`, which will mangle any `$…` in your hash.
```yaml
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: argocd-testing
spec:
destination:
namespace: testing
server: https://kubernetes.default.svc
project: default
source:
chart: argo-cd
repoURL: https://argoproj.github.io/argo-helm
targetRevision: 3.21.0
helm:
values: |
configs:
secret:
argocdServerAdminPassword: $2a$10$H1a30nMr9v2QE2nkyz0BoOD2J0I6FQFMtHS0csEg12RBWzfRuuoE6
```
## Synchronizing Changes from Original Repository

View File

@ -12,13 +12,10 @@ DEPRECATED option dex.logFormat - Use `configs.params."dexserver.log.format"`
{{- end }}
In order to access the server UI you have the following options:
{{ $rootpath := default "" (index .Values "configs" "params" "server.rootpath") -}}
1. kubectl port-forward service/{{ include "argo-cd.fullname" . }}-server -n {{ include "argo-cd.namespace" . }} 8080:443
{{ if $rootpath }}
and then open the browser on http://localhost:8080/{{ $rootpath }} and accept the certificate
{{ else }}
and then open the browser on http://localhost:8080 and accept the certificate
{{ end }}
2. enable ingress in the values file `server.ingress.enabled` and either
- Add the annotation for ssl passthrough: https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/#option-1-ssl-passthrough
- Set the `configs.params."server.insecure"` in the values file and terminate SSL at your ingress: https://argo-cd.readthedocs.io/en/stable/operator-manual/ingress/#option-2-multiple-ingress-objects-and-hosts

View File

@ -238,10 +238,7 @@ NOTE: Configuration keys must be stored as dict because YAML treats dot as separ
{{- $_ := set $presets "server.dex.server" (include "argo-cd.dex.server" .) -}}
{{- $_ := set $presets "server.dex.server.strict.tls" .Values.dex.certificateSecret.enabled -}}
{{- end -}}
{{- if .Values.commitServer.enabled -}}
{{- $_ := set $presets "commit.server" (printf "%s:%s" (include "argo-cd.commitServer.fullname" .) (.Values.commitServer.service.port | toString)) -}}
{{- end -}}
{{- range $component := tuple "applicationsetcontroller" "controller" "server" "reposerver" "notificationscontroller" "dexserver" "commitserver" -}}
{{- range $component := tuple "applicationsetcontroller" "controller" "server" "reposerver" "notificationscontroller" "dexserver" -}}
{{- $_ := set $presets (printf "%s.log.format" $component) $.Values.global.logging.format -}}
{{- $_ := set $presets (printf "%s.log.level" $component) $.Values.global.logging.level -}}
{{- end -}}

View File

@ -12,9 +12,6 @@ metadata:
namespace: {{ include "argo-cd.namespace" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.controller.name "name" .Values.controller.name) | nindent 4 }}
{{- with (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.controller.deploymentLabels) }}
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
replicas: {{ .Values.controller.replicas }}
revisionHistoryLimit: {{ .Values.controller.revisionHistoryLimit | default .Values.global.revisionHistoryLimit }}
@ -184,12 +181,6 @@ spec:
name: argocd-cmd-params-cm
key: controller.self.heal.backoff.cap.seconds
optional: true
- name: ARGOCD_APPLICATION_CONTROLLER_SELF_HEAL_BACKOFF_COOLDOWN_SECONDS
valueFrom:
configMapKeyRef:
name: argocd-cmd-params-cm
key: controller.self.heal.backoff.cooldown.seconds
optional: true
- name: ARGOCD_APPLICATION_CONTROLLER_SYNC_TIMEOUT
valueFrom:
configMapKeyRef:
@ -342,12 +333,6 @@ spec:
name: argocd-cmd-params-cm
key: controller.cluster.cache.events.processing.interval
optional: true
- name: ARGOCD_APPLICATION_CONTROLLER_COMMIT_SERVER
valueFrom:
configMapKeyRef:
name: argocd-cmd-params-cm
key: commit.server
optional: true
{{- with .Values.controller.envFrom }}
envFrom:
{{- toYaml . | nindent 10 }}

View File

@ -1,4 +1,4 @@
{{- if or .Values.controller.networkPolicy.create .Values.global.networkPolicy.create }}
{{- if .Values.global.networkPolicy.create }}
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:

View File

@ -180,12 +180,6 @@ spec:
name: argocd-cmd-params-cm
key: controller.self.heal.backoff.cap.seconds
optional: true
- name: ARGOCD_APPLICATION_CONTROLLER_SELF_HEAL_BACKOFF_COOLDOWN_SECONDS
valueFrom:
configMapKeyRef:
name: argocd-cmd-params-cm
key: controller.self.heal.backoff.cooldown.seconds
optional: true
- name: ARGOCD_APPLICATION_CONTROLLER_SYNC_TIMEOUT
valueFrom:
configMapKeyRef:
@ -344,12 +338,6 @@ spec:
name: argocd-cmd-params-cm
key: controller.cluster.cache.events.processing.interval
optional: true
- name: ARGOCD_APPLICATION_CONTROLLER_COMMIT_SERVER
valueFrom:
configMapKeyRef:
name: argocd-cmd-params-cm
key: commit.server
optional: true
- name: KUBECACHEDIR
value: /tmp/kubecache
{{- with .Values.controller.envFrom }}

View File

@ -11,9 +11,6 @@ metadata:
namespace: {{ include "argo-cd.namespace" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.applicationSet.name "name" .Values.applicationSet.name) | nindent 4 }}
{{- with (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.applicationSet.deploymentLabels) }}
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
{{- with include "argo-cd.strategy" (mergeOverwrite (deepCopy .Values.global.deploymentStrategy) .Values.applicationSet.deploymentStrategy) }}
strategy:

View File

@ -1,4 +1,4 @@
{{- if and (or .Values.applicationSet.networkPolicy.create .Values.global.networkPolicy.create) (or .Values.applicationSet.metrics.enabled .Values.applicationSet.ingress.enabled) }}
{{- if and .Values.global.networkPolicy.create (or .Values.applicationSet.metrics.enabled .Values.applicationSet.ingress.enabled) }}
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:

View File

@ -12,9 +12,6 @@ metadata:
namespace: {{ include "argo-cd.namespace" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.commitServer.name "name" .Values.commitServer.name) | nindent 4 }}
{{- with (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.commitServer.deploymentLabels) }}
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
{{- with include "argo-cd.strategy" (mergeOverwrite (deepCopy .Values.global.deploymentStrategy) .Values.commitServer.deploymentStrategy) }}
strategy:

View File

@ -1,4 +1,4 @@
{{- if and .Values.commitServer.enabled (or .Values.commitServer.networkPolicy.create .Values.global.networkPolicy.create)}}
{{- if and .Values.commitServer.enabled .Values.global.networkPolicy.create }}
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:

View File

@ -17,10 +17,10 @@ metadata:
{{- end }}
spec:
ports:
- name: {{ .Values.commitServer.service.portName }}
- name: server
protocol: TCP
port: {{ .Values.commitServer.service.port }}
targetPort: server
port: 8086
targetPort: 8086
selector:
{{- include "argo-cd.selectorLabels" (dict "context" . "name" .Values.commitServer.name) | nindent 4 }}
{{- end }}

View File

@ -12,9 +12,6 @@ metadata:
namespace: {{ include "argo-cd.namespace" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.notifications.name "name" .Values.notifications.name) | nindent 4 }}
{{- with (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.notifications.deploymentLabels) }}
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
replicas: 1
revisionHistoryLimit: {{ .Values.global.revisionHistoryLimit }}

View File

@ -1,4 +1,4 @@
{{- if and .Values.notifications.enabled (or .Values.notifications.networkPolicy.create .Values.global.networkPolicy.create) .Values.notifications.metrics.enabled }}
{{- if and .Values.notifications.enabled .Values.global.networkPolicy.create .Values.notifications.metrics.enabled }}
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:

View File

@ -11,9 +11,6 @@ metadata:
namespace: {{ include "argo-cd.namespace" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.repoServer.name "name" .Values.repoServer.name) | nindent 4 }}
{{- with (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.repoServer.deploymentLabels) }}
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
{{- with include "argo-cd.strategy" (mergeOverwrite (deepCopy .Values.global.deploymentStrategy) .Values.repoServer.deploymentStrategy) }}
strategy:

View File

@ -1,4 +1,4 @@
{{- if or .Values.repoServer.networkPolicy.create .Values.global.networkPolicy.create }}
{{- if .Values.global.networkPolicy.create }}
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:

View File

@ -23,6 +23,3 @@ spec:
targetPort: repo-server
selector:
{{- include "argo-cd.selectorLabels" (dict "context" . "name" .Values.repoServer.name) | nindent 4 }}
{{- if .Values.repoServer.service.trafficDistribution }}
trafficDistribution: {{ .Values.repoServer.service.trafficDistribution }}
{{- end }}

3
charts/argo-cd/templates/argocd-server/deployment.yaml Normal file → Executable file
View File

@ -11,9 +11,6 @@ metadata:
namespace: {{ include "argo-cd.namespace" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.server.name "name" .Values.server.name) | nindent 4 }}
{{- with (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.server.deploymentLabels) }}
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
{{- with include "argo-cd.strategy" (mergeOverwrite (deepCopy .Values.global.deploymentStrategy) .Values.server.deploymentStrategy) }}
strategy:

View File

@ -1,4 +1,4 @@
{{- if or .Values.server.networkPolicy.create .Values.global.networkPolicy.create }}
{{- if .Values.global.networkPolicy.create }}
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:

3
charts/argo-cd/templates/dex/deployment.yaml Normal file → Executable file
View File

@ -12,9 +12,6 @@ metadata:
namespace: {{ include "argo-cd.namespace" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.dex.name "name" .Values.dex.name) | nindent 4 }}
{{- with (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.dex.deploymentLabels) }}
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
{{- with include "argo-cd.strategy" (mergeOverwrite (deepCopy .Values.global.deploymentStrategy) .Values.dex.deploymentStrategy) }}
strategy:

View File

@ -1,4 +1,4 @@
{{- if and (or .Values.dex.networkPolicy.create .Values.global.networkPolicy.create) .Values.dex.enabled }}
{{- if and .Values.global.networkPolicy.create .Values.dex.enabled }}
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:

3
charts/argo-cd/templates/redis/deployment.yaml Normal file → Executable file
View File

@ -13,9 +13,6 @@ metadata:
namespace: {{ include "argo-cd.namespace" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.redis.name "name" .Values.redis.name) | nindent 4 }}
{{- with (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.redis.deploymentLabels) }}
{{- toYaml . | nindent 4 }}
{{- end }}
spec:
replicas: 1
revisionHistoryLimit: {{ .Values.global.revisionHistoryLimit }}

View File

@ -1,5 +1,5 @@
{{- $redisHa := (index .Values "redis-ha") -}}
{{- if and (or .Values.redis.networkPolicy.create .Values.global.networkPolicy.create) .Values.redis.enabled (not $redisHa.enabled) }}
{{- if and .Values.global.networkPolicy.create .Values.redis.enabled (not $redisHa.enabled) }}
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:

View File

@ -35,7 +35,7 @@ crds:
keep: true
# -- Annotations to be added to all CRDs
annotations: {}
# -- Additional labels to be added to all CRDs
# -- Addtional labels to be added to all CRDs
additionalLabels: {}
## Globally shared configuration
@ -79,9 +79,6 @@ global:
# -- Annotations for the all deployed Deployments
deploymentAnnotations: {}
# -- Labels for the all deployed Deployments
deploymentLabels: {}
# -- Annotations for the all deployed pods
podAnnotations: {}
@ -422,8 +419,6 @@ configs:
server.enable.gzip: true
# -- Enable proxy extension feature. (proxy extension is in Alpha phase)
server.enable.proxy.extension: false
# -- Enable the hydrator feature (hydrator is in Alpha phase)
hydrator.enabled: false
# -- Set X-Frame-Options header in HTTP responses to value. To disable, set to "".
server.x.frame.options: sameorigin
@ -892,9 +887,6 @@ controller:
# -- Annotations for the application controller Deployment
deploymentAnnotations: {}
# -- Labels for the application controller Deployment
deploymentLabels: {}
# -- Annotations to be added to application controller pods
podAnnotations: {}
@ -1090,12 +1082,6 @@ controller:
# -- List of custom rules for the application controller's ClusterRole resource
rules: []
# Default application controller's network policy
networkPolicy:
# -- Default network policy rules used by application controller
# @default -- `false` (defaults to global.networkPolicy.create)
create: false
## Dex
dex:
# -- Enable dex
@ -1167,7 +1153,7 @@ dex:
# -- Dex image repository
repository: ghcr.io/dexidp/dex
# -- Dex image tag
tag: v2.43.1
tag: v2.42.1
# -- Dex imagePullPolicy
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy: ""
@ -1249,9 +1235,6 @@ dex:
# -- Annotations to be added to the Dex server Deployment
deploymentAnnotations: {}
# -- Labels for the Dex server Deployment
deploymentLabels: {}
# -- Annotations to be added to the Dex server pods
podAnnotations: {}
@ -1395,12 +1378,6 @@ dex:
# maxSurge: 25%
# maxUnavailable: 25%
# Default Dex server's network policy
networkPolicy:
# -- Default network policy rules used by Dex server
# @default -- `false` (defaults to global.networkPolicy.create)
create: false
# DEPRECATED - Use configs.params to override
# -- Dex log format. Either `text` or `json`
# @default -- `""` (defaults to global.logging.format)
@ -1439,7 +1416,7 @@ redis:
## Redis image
image:
# -- Redis repository
repository: ecr-public.aws.com/docker/library/redis
repository: public.ecr.aws/docker/library/redis
# -- Redis tag
## Do not upgrade to >= 7.4.0, otherwise you are no longer using an open source version of Redis
tag: 7.2.8-alpine
@ -1458,7 +1435,7 @@ redis:
# -- Repository to use for the redis-exporter
repository: ghcr.io/oliver006/redis_exporter
# -- Tag to use for the redis-exporter
tag: v1.74.0
tag: v1.71.0
# -- Image pull policy for the redis-exporter
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy: ""
@ -1579,9 +1556,6 @@ redis:
# -- Annotations to be added to the Redis server Deployment
deploymentAnnotations: {}
# -- Labels for the Redis server Deployment
deploymentLabels: {}
# -- Annotations to be added to the Redis server pods
podAnnotations: {}
@ -1721,12 +1695,6 @@ redis:
# -- Prometheus ServiceMonitor annotations
annotations: {}
# Default redis's network policy
networkPolicy:
# -- Default network policy rules used by redis
# @default -- `false` (defaults to global.networkPolicy.create)
create: false
## Redis-HA subchart replaces custom redis deployment when `redis-ha.enabled=true`
# Ref: https://github.com/DandyDeveloper/charts/blob/master/charts/redis-ha/values.yaml
redis-ha:
@ -1735,7 +1703,7 @@ redis-ha:
## Redis image
image:
# -- Redis repository
repository: ecr-public.aws.com/docker/library/redis
repository: public.ecr.aws/docker/library/redis
# -- Redis tag
## Do not upgrade to >= 7.4.0, otherwise you are no longer using an open source version of Redis
tag: 7.2.8-alpine
@ -1767,9 +1735,6 @@ redis-ha:
# -- Custom labels for the haproxy pod. This is relevant for Argo CD CLI.
labels:
app.kubernetes.io/name: argocd-redis-ha-haproxy
image:
# -- HAProxy Image Repository
repository: ecr-public.aws.com/docker/library/haproxy
metrics:
# -- HAProxy enable prometheus metric scraping
enabled: true
@ -1834,8 +1799,8 @@ externalRedis:
password: ""
# -- External Redis server port
port: 6379
# -- The name of an existing secret with Redis (must contain key `redis-password`. And should contain `redis-username` if username is not `default`) and Sentinel credentials.
# When it's set, the `externalRedis.username` and `externalRedis.password` parameters are ignored
# -- The name of an existing secret with Redis (must contain key `redis-password`) and Sentinel credentials.
# When it's set, the `externalRedis.password` parameter is ignored
existingSecret: ""
# -- External Redis Secret annotations
secretAnnotations: {}
@ -2123,9 +2088,6 @@ server:
# -- Annotations to be added to server Deployment
deploymentAnnotations: {}
# -- Labels for the server Deployment
deploymentLabels: {}
# -- Annotations to be added to server pods
podAnnotations: {}
@ -2593,12 +2555,6 @@ server:
# -- List of custom rules for the server's ClusterRole resource
rules: []
# Default ArgoCD Server's network policy
networkPolicy:
# -- Default network policy rules used by ArgoCD Server
# @default -- `false` (defaults to global.networkPolicy.create)
create: false
## Repo Server
repoServer:
# -- Repo server name
@ -2780,9 +2736,6 @@ repoServer:
# -- Annotations to be added to repo server Deployment
deploymentAnnotations: {}
# -- Labels for the repo server Deployment
deploymentLabels: {}
# -- Annotations to be added to repo server pods
podAnnotations: {}
@ -2913,8 +2866,6 @@ repoServer:
port: 8081
# -- Repo server service port name
portName: tcp-repo-server
# -- Traffic distribution preference for the repo server service. If the field is not set, the implementation will apply its default routing strategy.
trafficDistribution: ""
## Repo server metrics service configuration
metrics:
@ -2998,12 +2949,6 @@ repoServer:
# - list
# - watch
# Default repo server's network policy
networkPolicy:
# -- Default network policy rules used by repo server
# @default -- `false` (defaults to global.networkPolicy.create)
create: false
## ApplicationSet controller
applicationSet:
# -- ApplicationSet controller name string
@ -3161,9 +3106,6 @@ applicationSet:
# -- Annotations to be added to ApplicationSet controller Deployment
deploymentAnnotations: {}
# -- Labels for the ApplicationSet controller Deployment
deploymentLabels: {}
# -- Annotations for the ApplicationSet controller pods
podAnnotations: {}
@ -3376,13 +3318,6 @@ applicationSet:
# - argocd-applicationset.example.com
# -- Enable ApplicationSet in any namespace feature
allowAnyNamespace: false
# Default ApplicationSet controller's network policy
networkPolicy:
# -- Default network policy rules used by ApplicationSet controller
# @default -- `false` (defaults to global.networkPolicy.create)
create: false
## Notifications controller
notifications:
# -- Enable notifications controller
@ -3553,9 +3488,6 @@ notifications:
# -- Annotations to be applied to the notifications controller Deployment
deploymentAnnotations: {}
# -- Labels for the notifications controller Deployment
deploymentLabels: {}
# -- Annotations to be applied to the notifications controller Pods
podAnnotations: {}
@ -3952,12 +3884,6 @@ notifications:
# defaultTriggers: |
# - on-sync-status-unknown
# Default notifications controller's network policy
networkPolicy:
# -- Default network policy rules used by notifications controller
# @default -- `false` (defaults to global.networkPolicy.create)
create: false
commitServer:
# -- Enable commit server
enabled: false
@ -4026,10 +3952,6 @@ commitServer:
annotations: {}
# -- commit server service labels
labels: {}
# -- commit server service port
port: 8086
# -- commit server service port name
portName: server
# -- Automount API credentials for the Service Account into the pod.
automountServiceAccountToken: false
@ -4049,9 +3971,6 @@ commitServer:
# -- Annotations to be added to commit server Deployment
deploymentAnnotations: {}
# -- Labels for the commit server Deployment
deploymentLabels: {}
# -- Annotations for the commit server pods
podAnnotations: {}
@ -4144,9 +4063,3 @@ commitServer:
# -- Priority class for the commit server pods
# @default -- `""` (defaults to global.priorityClassName)
priorityClassName: ""
# Default commit server's network policy
networkPolicy:
# -- Default network policy rules used by commit server
# @default -- `false` (defaults to global.networkPolicy.create)
create: false

View File

@ -1,8 +1,8 @@
apiVersion: v2
appVersion: v1.9.7
appVersion: v1.9.6
description: A Helm chart for Argo Events, the event-driven workflow automation framework
name: argo-events
version: 2.4.16
version: 2.4.15
home: https://github.com/argoproj/argo-helm
icon: https://avatars.githubusercontent.com/u/30269780?s=200&v=4
keywords:
@ -19,4 +19,4 @@ annotations:
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
artifacthub.io/changes: |
- kind: changed
description: Bump argo-events to v1.9.7
description: Bump argo-events to v1.9.6

View File

@ -1,8 +1,8 @@
apiVersion: v2
appVersion: v1.8.3
appVersion: v1.8.2
description: A Helm chart for Argo Rollouts
name: argo-rollouts
version: 2.40.3
version: 2.39.5
home: https://github.com/argoproj/argo-helm
icon: https://argoproj.github.io/argo-rollouts/assets/logo.png
keywords:
@ -18,5 +18,5 @@ annotations:
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
artifacthub.io/changes: |
- kind: added
description: support dnsConfig for controller and dashboard pods
- kind: fixed
description: argo-rollouts will re-deploy if changes are made to the argo-rollouts configmap.

View File

@ -51,14 +51,12 @@ For full list of changes please check ArtifactHub [changelog].
| fullnameOverride | string | `nil` | String to fully override "argo-rollouts.fullname" template |
| global.deploymentAnnotations | object | `{}` | Annotations for all deployed Deployments |
| global.deploymentLabels | object | `{}` | Labels for all deployed Deployments |
| global.dnsConfig | object | `{}` | Specifies the deployment DNS configuration for controller and dashboard. |
| global.revisionHistoryLimit | int | `10` | Number of old deployment ReplicaSets to retain. The rest will be garbage collected. |
| imagePullSecrets | list | `[]` | Secrets with credentials to pull images from a private registry. Registry secret names as an array. |
| installCRDs | bool | `true` | Install and upgrade CRDs |
| keepCRDs | bool | `true` | Keep CRD's on helm uninstall |
| kubeVersionOverride | string | `""` | Override the Kubernetes version, which is used to evaluate certain manifests |
| nameOverride | string | `nil` | String to partially override "argo-rollouts.fullname" template |
| namespaceOverride | string | `.Release.Namespace` | Override the namespace |
| notifications.configmap.create | bool | `true` | Whether to create notifications configmap |
| notifications.notifiers | object | `{}` | Configures notification services |
| notifications.secret.annotations | object | `{}` | Annotations to be added to the notifications secret |

View File

@ -4,5 +4,3 @@ installCRDs: false
dashboard:
enabled: true
ingress:
enabled: true

View File

@ -417,10 +417,3 @@ Return the rules for controller's Role and ClusterRole
{{- end }}
{{- end }}
{{- end -}}
{{/*
Expand the namespace of the release.
*/}}
{{- define "argo-rollouts.namespace" -}}
{{- default .Release.Namespace .Values.namespaceOverride | trunc 63 | trimSuffix "-" -}}
{{- end }}

View File

@ -13,5 +13,5 @@ roleRef:
subjects:
- kind: ServiceAccount
name: {{ include "argo-rollouts.serviceAccountName" . }}
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
{{- end }}

View File

@ -2,7 +2,7 @@ apiVersion: v1
kind: ConfigMap
metadata:
name: argo-rollouts-config
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.controller.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}

View File

@ -8,7 +8,7 @@ metadata:
{{- end }}
{{- end }}
name: {{ include "argo-rollouts.fullname" . }}
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
{{- range $key, $value := (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.controller.deploymentLabels) }}
{{ $key }}: {{ $value | quote }}
@ -112,10 +112,6 @@ spec:
tolerations:
{{- toYaml .Values.controller.tolerations | nindent 8 }}
{{- end }}
{{- with .Values.global.dnsConfig }}
dnsConfig:
{{- toYaml . | nindent 8 }}
{{- end }}
{{- if .Values.controller.affinity }}
affinity:
{{- toYaml .Values.controller.affinity | nindent 8 }}

View File

@ -3,7 +3,7 @@ apiVersion: v1
kind: Service
metadata:
name: {{ include "argo-rollouts.fullname" . }}-metrics
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.controller.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}

View File

@ -3,7 +3,7 @@ apiVersion: v1
kind: ConfigMap
metadata:
name: argo-rollouts-notification-configmap
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.controller.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}

View File

@ -3,7 +3,7 @@ apiVersion: v1
kind: Secret
metadata:
name: argo-rollouts-notification-secret
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
{{- with .Values.notifications.secret.annotations }}
annotations:
{{- range $key, $value := . }}

View File

@ -3,7 +3,7 @@ apiVersion: {{ include "argo-rollouts.podDisruptionBudget.apiVersion" . }}
kind: PodDisruptionBudget
metadata:
name: {{ template "argo-rollouts.fullname" . }}
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
{{- include "argo-rollouts.labels" . | nindent 4 }}
{{- with .Values.controller.pdb.labels }}

View File

@ -3,7 +3,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: {{ include "argo-rollouts.fullname" . }}
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.controller.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}

View File

@ -3,7 +3,7 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ include "argo-rollouts.fullname" . }}
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.controller.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}
@ -14,5 +14,5 @@ roleRef:
subjects:
- kind: ServiceAccount
name: {{ include "argo-rollouts.serviceAccountName" . }}
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
{{- end }}

View File

@ -3,7 +3,7 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ include "argo-rollouts.serviceAccountName" . }}
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.controller.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}

View File

@ -3,7 +3,7 @@ apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
name: {{ include "argo-rollouts.fullname" . }}
namespace: {{ default (include "argo-rollouts.namespace" .) .Values.controller.metrics.serviceMonitor.namespace | quote }}
namespace: {{ default .Release.Namespace .Values.controller.metrics.serviceMonitor.namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.controller.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}

View File

@ -13,5 +13,5 @@ roleRef:
subjects:
- kind: ServiceAccount
name: {{ include "argo-rollouts.serviceAccountName" . }}-dashboard
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
{{- end }}

View File

@ -9,7 +9,7 @@ metadata:
{{- end }}
{{- end }}
name: {{ include "argo-rollouts.fullname" . }}-dashboard
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
{{- range $key, $value := (mergeOverwrite (deepCopy .Values.global.deploymentLabels) .Values.dashboard.deploymentLabels) }}
{{ $key }}: {{ $value | quote }}
@ -81,10 +81,6 @@ spec:
tolerations:
{{- toYaml .Values.dashboard.tolerations | nindent 8 }}
{{- end }}
{{- with .Values.global.dnsConfig }}
dnsConfig:
{{- toYaml . | nindent 8 }}
{{- end }}
{{- if .Values.dashboard.affinity }}
affinity:
{{- toYaml .Values.dashboard.affinity | nindent 8 }}

View File

@ -14,7 +14,7 @@ metadata:
{{- end }}
{{- end }}
name: {{ template "argo-rollouts.fullname" . }}-dashboard
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
{{- include "argo-rollouts.labels" . | nindent 4 }}
{{- if .Values.dashboard.ingress.labels }}
@ -45,10 +45,10 @@ spec:
service:
name: {{ $serviceName }}
port:
{{- if kindIs "string" $servicePort }}
name: {{ $servicePort }}
{{- else }}
{{- if kindIs "float64" $servicePort }}
number: {{ $servicePort }}
{{- else }}
name: {{ $servicePort }}
{{- end }}
{{- else }}
serviceName: {{ $serviceName }}
@ -72,10 +72,10 @@ spec:
service:
name: {{ $serviceName }}
port:
{{- if kindIs "string" $servicePort }}
name: {{ $servicePort }}
{{- else }}
{{- if kindIs "float64" $servicePort }}
number: {{ $servicePort }}
{{- else }}
name: {{ $servicePort }}
{{- end }}
{{- else }}
serviceName: {{ $serviceName }}

View File

@ -3,7 +3,7 @@ apiVersion: {{ include "argo-rollouts.podDisruptionBudget.apiVersion" . }}
kind: PodDisruptionBudget
metadata:
name: {{ template "argo-rollouts.fullname" . }}-dashboard
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
{{- include "argo-rollouts.labels" . | nindent 4 }}
{{- with .Values.dashboard.pdb.labels }}

View File

@ -3,7 +3,7 @@ apiVersion: v1
kind: Service
metadata:
name: {{ include "argo-rollouts.fullname" . }}-dashboard
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.dashboard.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}

View File

@ -3,7 +3,7 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ include "argo-rollouts.serviceAccountName" . }}-dashboard
namespace: {{ include "argo-rollouts.namespace" . | quote }}
namespace: {{ .Release.Namespace | quote }}
labels:
app.kubernetes.io/component: {{ .Values.dashboard.component }}
{{- include "argo-rollouts.labels" . | nindent 4 }}

View File

@ -15,10 +15,6 @@ nameOverride:
# -- String to fully override "argo-rollouts.fullname" template
fullnameOverride:
# -- Override the namespace
# @default -- `.Release.Namespace`
namespaceOverride: ""
## Override APIVersions
## If you want to template helm charts but cannot access k8s API server
## you can set api versions here
@ -49,18 +45,6 @@ global:
deploymentLabels: {}
# -- Number of old deployment ReplicaSets to retain. The rest will be garbage collected.
revisionHistoryLimit: 10
# -- Specifies the deployment DNS configuration for controller and dashboard.
dnsConfig: {}
# nameservers:
# - 1.2.3.4
# searches:
# - ns1.svc.cluster-domain.example
# - my.dns.search.suffix
# options:
# - name: ndots
# value: "1"
# - name: attempts
# value: "3"
controller:
# -- Value of label `app.kubernetes.io/component`

View File

@ -1,9 +1,9 @@
apiVersion: v2
appVersion: v3.7.0
appVersion: v3.6.7
name: argo-workflows
description: A Helm chart for Argo Workflows
type: application
version: 0.45.21
version: 0.45.14
icon: https://argo-workflows.readthedocs.io/en/stable/assets/logo.png
home: https://github.com/argoproj/argo-helm
sources:
@ -17,4 +17,4 @@ annotations:
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
artifacthub.io/changes: |
- kind: changed
description: Bump argo-workflows to v3.7.0
description: Improve argo-workflow controller clusterrole policy

View File

@ -187,7 +187,6 @@ Fields to note:
| controller.metricsConfig.port | int | `9090` | Port is the port where metrics are emitted |
| controller.metricsConfig.portName | string | `"metrics"` | Container metrics port name |
| controller.metricsConfig.relabelings | list | `[]` | ServiceMonitor relabel configs to apply to samples before scraping |
| controller.metricsConfig.scheme | string | `"http"` | serviceMonitor scheme |
| controller.metricsConfig.secure | bool | `false` | Flag that use a self-signed cert for TLS |
| controller.metricsConfig.servicePort | int | `8080` | Service metrics port |
| controller.metricsConfig.servicePortName | string | `"metrics"` | Service metrics port name |
@ -233,7 +232,6 @@ Fields to note:
| controller.telemetryConfig.metricsTTL | string | `""` | How often custom metrics are cleared from memory |
| controller.telemetryConfig.path | string | `"/telemetry"` | telemetry path |
| controller.telemetryConfig.port | int | `8081` | telemetry container port |
| controller.telemetryConfig.scheme | string | `"http"` | telemetry serviceMonitor scheme to use |
| controller.telemetryConfig.secure | bool | `false` | Flag that use a self-signed cert for TLS |
| controller.telemetryConfig.servicePort | int | `8081` | telemetry service port |
| controller.telemetryConfig.servicePortName | string | `"telemetry"` | telemetry service port name |

View File

@ -35,7 +35,6 @@ rules:
- ""
resources:
- configmaps
- namespaces
verbs:
- get
- watch

View File

@ -25,7 +25,6 @@ spec:
{{- toYaml . | nindent 8 }}
{{- end }}
honorLabels: {{ .Values.controller.metricsConfig.honorLabels }}
scheme: {{ .Values.controller.metricsConfig.scheme}}
{{- end }}
{{- if .Values.controller.telemetryConfig.enabled }}
- port: telemetry
@ -40,7 +39,6 @@ spec:
{{- toYaml . | nindent 8 }}
{{- end }}
honorLabels: {{ .Values.controller.metricsConfig.honorLabels }}
scheme: {{ .Values.controller.telemetryConfig.scheme }}
{{- end }}
{{- with .Values.controller.metricsConfig.targetLabels }}
targetLabels:

View File

@ -667,25 +667,6 @@ spec:
type: array
type: object
metadata:
properties:
annotations:
additionalProperties:
type: string
type: object
finalizers:
items:
type: string
type: array
generateName:
type: string
labels:
additionalProperties:
type: string
type: object
name:
type: string
namespace:
type: string
type: object
workflowTemplateRef:
properties:

View File

@ -1,4 +1,4 @@
{{- if and .Values.server.enabled .Values.server.GKEbackendConfig.enabled }}
{{- if .Values.server.GKEbackendConfig.enabled }}
apiVersion: {{ include "argo-workflows.apiVersions.cloudgoogle" . }}
kind: BackendConfig
metadata:

View File

@ -1,4 +1,4 @@
{{- if and .Values.server.enabled .Values.server.GKEfrontendConfig.enabled }}
{{- if .Values.server.GKEfrontendConfig.enabled }}
apiVersion: networking.gke.io/v1beta1
kind: FrontendConfig
metadata:

View File

@ -1,4 +1,4 @@
{{- if and .Values.server.enabled .Values.server.GKEmanagedCertificate.enabled }}
{{- if .Values.server.GKEmanagedCertificate.enabled }}
apiVersion: networking.gke.io/v1
kind: ManagedCertificate
metadata:

View File

@ -27,14 +27,9 @@ spec:
{{- with .Values.server.podLabels }}
{{- toYaml . | nindent 8 }}
{{- end }}
{{- if or .Values.server.podAnnotations .Values.controller.configMap.create }}
{{- with .Values.server.podAnnotations }}
annotations:
{{- with .Values.server.podAnnotations }}
{{- toYaml . | nindent 8 }}
{{- end }}
{{- if .Values.controller.configMap.create }}
checksum/cm: {{ include (print $.Template.BasePath "/controller/workflow-controller-config-map.yaml") . | sha256sum }}
{{- end }}
{{- end }}
spec:
serviceAccountName: {{ template "argo-workflows.serverServiceAccountName" . }}

View File

@ -1,4 +1,4 @@
{{- if and .Values.server.enabled .Values.server.ingress.enabled -}}
{{- if .Values.server.ingress.enabled -}}
{{- $serviceName := include "argo-workflows.server.fullname" . -}}
{{- $servicePort := .Values.server.servicePort -}}
{{- $paths := .Values.server.ingress.paths -}}
@ -45,10 +45,10 @@ spec:
service:
name: {{ $serviceName }}
port:
{{- if kindIs "string" $servicePort }}
name: {{ $servicePort }}
{{- else }}
{{- if kindIs "float64" $servicePort }}
number: {{ $servicePort }}
{{- else }}
name: {{ $servicePort }}
{{- end }}
{{- else }}
serviceName: {{ $serviceName }}
@ -72,10 +72,10 @@ spec:
service:
name: {{ $serviceName }}
port:
{{- if kindIs "string" $servicePort }}
name: {{ $servicePort }}
{{- else }}
{{- if kindIs "float64" $servicePort }}
number: {{ $servicePort }}
{{- else }}
name: {{ $servicePort }}
{{- end }}
{{- else }}
serviceName: {{ $serviceName }}

View File

@ -149,8 +149,6 @@ controller:
servicePort: 8080
# -- Service metrics port name
servicePortName: metrics
# -- serviceMonitor scheme
scheme: http
# -- Flag to enable headless service
headlessService: false
# -- When true, honorLabels preserves the metrics labels when they collide with the targets labels.
@ -165,7 +163,6 @@ controller:
# -- ServiceMonitor will add labels from the service to the Prometheus metric
## Ref: https://github.com/prometheus-operator/prometheus-operator/blob/main/Documentation/api.md#servicemonitorspec
targetLabels: []
# -- the controller container's securityContext
securityContext:
readOnlyRootFilesystem: true
@ -259,8 +256,6 @@ controller:
servicePort: 8081
# -- telemetry service port name
servicePortName: telemetry
# -- telemetry serviceMonitor scheme to use
scheme: http
serviceMonitor:
# -- Enable a prometheus ServiceMonitor
enabled: false
@ -268,7 +263,6 @@ controller:
additionalLabels: {}
# -- Prometheus ServiceMonitor namespace
namespace: "" # "monitoring"
serviceAccount:
# -- Create a service account for the controller
create: true
@ -869,7 +863,7 @@ artifactRepository:
# keyFormat: "{{ \"{{workflow.namespace}}/{{workflow.name}}/{{pod.name}}\" }}"
# # serviceAccountKeySecret is a secret selector.
# # It references the k8s secret named 'my-gcs-credentials'.
# # This secret is expected to have the key 'serviceAccountKey',
# # This secret is expected to have have the key 'serviceAccountKey',
# # containing the base64 encoded credentials
# # to the bucket.
# #
@ -886,7 +880,7 @@ artifactRepository:
# blobNameFormat: path/in/container
# # accountKeySecret is a secret selector.
# # It references the k8s secret named 'my-azure-storage-credentials'.
# # This secret is expected to have the key 'account-access-key',
# # This secret is expected to have have the key 'account-access-key',
# # containing the base64 encoded credentials to the storage account.
# # If a managed identity has been assigned to the machines running the
# # workflow (e.g., https://docs.microsoft.com/en-us/azure/aks/use-managed-identity)
@ -942,7 +936,7 @@ artifactRepositoryRef: {}
# bucket: $mybucket
# # accessKeySecret and secretKeySecret are secret selectors.
# # It references the k8s secret named 'bucket-workflow-artifect-credentials'.
# # This secret is expected to have the keys 'accessKey'
# # This secret is expected to have have the keys 'accessKey'
# # and 'secretKey', containing the base64 encoded credentials
# # to the bucket.
# accessKeySecret:

View File

@ -2,7 +2,7 @@ apiVersion: v2
name: argocd-image-updater
description: A Helm chart for Argo CD Image Updater, a tool to automatically update the container images of Kubernetes workloads which are managed by Argo CD
type: application
version: 0.12.3
version: 0.12.1
appVersion: v0.16.0
home: https://github.com/argoproj-labs/argocd-image-updater
icon: https://argocd-image-updater.readthedocs.io/en/stable/assets/logo.png
@ -18,5 +18,5 @@ annotations:
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
artifacthub.io/changes: |
- kind: added
description: Support priorityClassName
- kind: changed
description: Bump argocd-image-updater to v0.16.0

View File

@ -71,7 +71,7 @@ The `config.registries` value can be used exactly as it looks in the documentati
| affinity | object | `{}` | Kubernetes affinity settings for the deployment |
| authScripts.enabled | bool | `false` | Whether to mount the defined scripts that can be used to authenticate with a registry, the scripts will be mounted at `/scripts` |
| authScripts.name | string | `"argocd-image-updater-authscripts"` | Name of the authentication scripts ConfigMap |
| authScripts.scripts | object | `{}` | Map of key-value pairs where the key consists of the name of the script and the value the contents. |
| authScripts.scripts | object | `{}` | Map of key-value pairs where the key consists of the name of the script and the value the contents |
| config.applicationsAPIKind | string | `""` | API kind that is used to manage Argo CD applications (`kubernetes` or `argocd`) |
| config.argocd.grpcWeb | bool | `true` | Use the gRPC-web protocol to connect to the Argo CD API |
| config.argocd.insecure | bool | `false` | If specified, the certificate of the Argo CD API server is not verified. |
@ -88,14 +88,14 @@ The `config.registries` value can be used exactly as it looks in the documentati
| config.gitCommitUser | string | `""` | Username to use for Git commits |
| config.logLevel | string | `"info"` | Argo CD Image Update log level |
| config.name | string | `"argocd-image-updater-config"` | Name of the ConfigMap |
| config.registries | list | `[]` | Argo CD Image Updater registries list configuration. More information [here](https://argocd-image-updater.readthedocs.io/en/stable/configuration/registries/). |
| config.sshConfig.config | string | `""` | Argo CD Image Updater ssh client parameter configuration |
| config.registries | list | `[]` | Argo CD Image Updater registries list configuration. More information [here](https://argocd-image-updater.readthedocs.io/en/stable/configuration/registries/) |
| config.sshConfig.config | string | `""` | Argo CD Image Updater ssh client parameter configuration. |
| config.sshConfig.name | string | `"argocd-image-updater-ssh-config"` | Name of the sshConfig ConfigMap |
| createClusterRoles | bool | `true` | Create cluster roles for cluster-wide installation. |
| extraArgs | list | `[]` | Extra arguments for argocd-image-updater not defined in `config.argocd`. If a flag contains both key and value, they need to be split to a new entry. |
| extraEnv | list | `[]` | Extra environment variables for argocd-image-updater. |
| extraArgs | list | `[]` | Extra arguments for argocd-image-updater not defined in `config.argocd`. If a flag contains both key and value, they need to be split to a new entry |
| extraEnv | list | `[]` | Extra environment variables for argocd-image-updater |
| extraEnvFrom | list | `[]` | Extra envFrom to pass to argocd-image-updater |
| extraObjects | list | `[]` | Extra K8s manifests to deploy for argocd-image-updater. |
| extraObjects | list | `[]` | Extra K8s manifests to deploy for argocd-image-updater |
| fullnameOverride | string | `""` | Global fullname (argocd-image-updater.fullname in _helpers.tpl) override |
| image.pullPolicy | string | `"Always"` | Default image pull policy |
| image.repository | string | `"quay.io/argoprojlabs/argocd-image-updater"` | Default image repository |
@ -119,7 +119,6 @@ The `config.registries` value can be used exactly as it looks in the documentati
| podAnnotations | object | `{}` | Pod Annotations for the deployment |
| podLabels | object | `{}` | Pod Labels for the deployment |
| podSecurityContext | object | `{}` | Pod security context settings for the deployment |
| priorityClassName | string | `""` | Priority class for the deployment |
| rbac.enabled | bool | `true` | Enable RBAC creation |
| replicaCount | int | `1` | Replica count for the deployment. It is not advised to run more than one replica. |
| resources | object | `{}` | Pod memory and cpu resource settings for the deployment |
@ -127,7 +126,7 @@ The `config.registries` value can be used exactly as it looks in the documentati
| serviceAccount.annotations | object | `{}` | Annotations to add to the service account |
| serviceAccount.create | bool | `true` | Specifies whether a service account should be created |
| serviceAccount.labels | object | `{}` | Labels to add to the service account |
| serviceAccount.name | string | `""` | The name of the service account to use. If not set and create is true, a name is generated using the fullname template. |
| serviceAccount.name | string | `""` | The name of the service account to use. If not set and create is true, a name is generated using the fullname template |
| tolerations | list | `[]` | Kubernetes toleration settings for the deployment |
| updateStrategy | object | `{"type":"Recreate"}` | The deployment strategy to use to replace existing pods with new ones |
| volumeMounts | list | `[]` | Additional volumeMounts to the image updater main container |

View File

@ -1,5 +0,0 @@
# Test with extraObjects enabled
# Do not deploy the CRDs as they are already present from the previous test
installCRDs: false
priorityClassName: system-node-critical

View File

@ -225,6 +225,3 @@ spec:
initContainers:
{{- toYaml . | nindent 6 }}
{{- end }}
{{- with .Values.priorityClassName }}
priorityClassName: {{ . }}
{{- end }}

View File

@ -26,7 +26,7 @@ namespaceOverride: ""
createClusterRoles: true
# -- Extra arguments for argocd-image-updater not defined in `config.argocd`.
# If a flag contains both key and value, they need to be split to a new entry.
# If a flag contains both key and value, they need to be split to a new entry
extraArgs: []
# - --disable-kubernetes
# - --dry-run
@ -44,15 +44,10 @@ extraArgs: []
# - --registries-conf-path
# - /app/config/registries.conf
# -- Extra environment variables for argocd-image-updater.
## These variables are also available to the authentication scripts mounted under /scripts, provided 'authScripts.enabled' is set to 'true'.
# -- Extra environment variables for argocd-image-updater
extraEnv: []
# - name: AWS_REGION
# value: "us-west-1"
# - name: ACR1_NAME
# value: "acr1.azurecr.io"
# - name: ACR1_CLIENT_ID
# value: "00000000-0000-0000-0000-000000000000"
# -- Extra envFrom to pass to argocd-image-updater
extraEnvFrom: []
@ -61,8 +56,8 @@ extraEnvFrom: []
# - secretRef:
# name: secret-name
# -- Extra K8s manifests to deploy for argocd-image-updater.
## Note: Supports use of custom Helm templates.
# -- Extra K8s manifests to deploy for argocd-image-updater
## Note: Supports use of custom Helm templates
extraObjects: []
# - apiVersion: secrets-store.csi.x-k8s.io/v1
# kind: SecretProviderClass
@ -102,10 +97,6 @@ initContainers: []
# - mountPath: /custom-tools
# name: custom-tools
# -- Priority class for the deployment
# @default -- `""`
priorityClassName: ""
# -- Additional volumeMounts to the image updater main container
volumeMounts: []
@ -163,7 +154,7 @@ config:
# -- Argo CD Image Update log level
logLevel: "info"
# -- Argo CD Image Updater registries list configuration. More information [here](https://argocd-image-updater.readthedocs.io/en/stable/configuration/registries/).
# -- Argo CD Image Updater registries list configuration. More information [here](https://argocd-image-updater.readthedocs.io/en/stable/configuration/registries/)
registries: []
# - name: Docker Hub
# api_url: https://registry-1.docker.io
@ -187,34 +178,25 @@ config:
# insecure: no
# credentials: ext:/scripts/auth1.sh
# credsexpire: 10h
# - name: Azure Container Registry
# api_url: https://acr1.azurecr.io
# prefix: acr1.azurecr.io
# ping: yes
# credentials: ext:/scripts/azure-workload-identity.sh
# credsexpire: 1h
sshConfig:
# -- Name of the sshConfig ConfigMap
name: argocd-image-updater-ssh-config
# -- Argo CD Image Updater ssh client parameter configuration
# -- Argo CD Image Updater ssh client parameter configuration.
config: ""
# config: |
# Host *
# PubkeyAcceptedAlgorithms +ssh-rsa
# HostkeyAlgorithms +ssh-rsa
# whether to mount authentication scripts, if enabled, the authentication scripts will be mounted on /scripts that can be used to authenticate with registries (Azure, ECR)
# whether to mount authentication scripts, if enabled, the authentication scripts will be mounted on /scripts that can be used to authenticate with registries (ECR)
# refer to https://argocd-image-updater.readthedocs.io/en/stable/configuration/registries/#specifying-credentials-for-accessing-container-registries for more info
authScripts:
# -- Whether to mount the defined scripts that can be used to authenticate with a registry, the scripts will be mounted at `/scripts`
enabled: false
# -- Name of the authentication scripts ConfigMap
name: argocd-image-updater-authscripts
# -- Map of key-value pairs where the key consists of the name of the script and the value the contents.
## Expect the script to output Docker credentials in the form: <username>:<password>
## Authentication scripts can be used for various cloud providers like ECR or Azure Workload Identity.
## For Azure Workload Identity, you can place your authentication script here to handle token acquisition.
# -- Map of key-value pairs where the key consists of the name of the script and the value the contents
scripts: {}
# auth1.sh: |
# #!/bin/sh
@ -222,26 +204,16 @@ authScripts:
# auth2.sh: |
# #!/bin/sh
# echo "auth script 2 here"
# azure-workload-identity.sh: |
# #!/bin:sh
# # Example script for Azure Workload Identity.
# # This script would typically use environment variables set by the workload identity
# # to acquire an Azure AD token and authenticate with Azure Container Registry (ACR).
# # It should output the Docker username and password on stdout, e.g., '00000000-0000-0000-0000-000000000000:<token>'
serviceAccount:
# -- Specifies whether a service account should be created
create: true
# -- Annotations to add to the service account
annotations: {}
# Example for Azure Workload Identity:
# azure.workload.identity/client-id: "xxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
# -- Labels to add to the service account
labels: {}
# Example for Azure Workload Identity:
# azure.workload.identity/use: "true"
# -- The name of the service account to use.
# If not set and create is true, a name is generated using the fullname template.
# If not set and create is true, a name is generated using the fullname template
name: ""
# -- Pod Annotations for the deployment
@ -249,7 +221,6 @@ podAnnotations: {}
# -- Pod Labels for the deployment
podLabels: {}
# azure.workload.identity/use: "true"
# -- Pod security context settings for the deployment
podSecurityContext: {}

View File

@ -99,7 +99,7 @@
},
{
"matchPackageNames": [
"ecr-public.aws.com/docker/library/redis"
"public.ecr.aws/docker/library/redis"
],
"matchDatasources": [
"docker"