Merge branch 'main' into chore/notifications-logging

Signed-off-by: Josh Baird <jbaird@galileo.io>
This commit is contained in:
Josh Baird 2023-06-26 08:34:10 -04:00 committed by GitHub
commit 3c996651a4
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
8 changed files with 71 additions and 23 deletions

View file

@ -38,7 +38,7 @@ jobs:
persist-credentials: false persist-credentials: false
- name: "Run analysis" - name: "Run analysis"
uses: ossf/scorecard-action@80e868c13c90f172d68d1f4501dee99e2479f7af # v2.1.3 uses: ossf/scorecard-action@08b4669551908b1024bb425080c797723083c031 # v2.2.0
with: with:
results_file: results.sarif results_file: results.sarif
results_format: sarif results_format: sarif

View file

@ -1044,7 +1044,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
| applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. | | applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
| applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. | | applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
| applicationSet.certificate.secretName | string | `"argocd-application-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource | | applicationSet.certificate.secretName | string | `"argocd-application-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
| applicationSet.containerPorts.metrics | int | `8085` | Metrics container port | | applicationSet.containerPorts.metrics | int | `8080` | Metrics container port |
| applicationSet.containerPorts.probe | int | `8081` | Probe container port | | applicationSet.containerPorts.probe | int | `8081` | Probe container port |
| applicationSet.containerPorts.webhook | int | `7000` | Webhook container port | | applicationSet.containerPorts.webhook | int | `7000` | Webhook container port |
| applicationSet.containerSecurityContext | object | See [values.yaml] | ApplicationSet controller container-level security context | | applicationSet.containerSecurityContext | object | See [values.yaml] | ApplicationSet controller container-level security context |
@ -1075,7 +1075,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
| applicationSet.metrics.service.clusterIP | string | `""` | Metrics service clusterIP. `None` makes a "headless service" (no virtual IP) | | applicationSet.metrics.service.clusterIP | string | `""` | Metrics service clusterIP. `None` makes a "headless service" (no virtual IP) |
| applicationSet.metrics.service.labels | object | `{}` | Metrics service labels | | applicationSet.metrics.service.labels | object | `{}` | Metrics service labels |
| applicationSet.metrics.service.portName | string | `"http-metrics"` | Metrics service port name | | applicationSet.metrics.service.portName | string | `"http-metrics"` | Metrics service port name |
| applicationSet.metrics.service.servicePort | int | `8085` | Metrics service port | | applicationSet.metrics.service.servicePort | int | `8080` | Metrics service port |
| applicationSet.metrics.service.type | string | `"ClusterIP"` | Metrics service type | | applicationSet.metrics.service.type | string | `"ClusterIP"` | Metrics service type |
| applicationSet.metrics.serviceMonitor.additionalLabels | object | `{}` | Prometheus ServiceMonitor labels | | applicationSet.metrics.serviceMonitor.additionalLabels | object | `{}` | Prometheus ServiceMonitor labels |
| applicationSet.metrics.serviceMonitor.annotations | object | `{}` | Prometheus ServiceMonitor annotations | | applicationSet.metrics.serviceMonitor.annotations | object | `{}` | Prometheus ServiceMonitor annotations |

View file

@ -2433,7 +2433,7 @@ applicationSet:
# -- Metrics service labels # -- Metrics service labels
labels: {} labels: {}
# -- Metrics service port # -- Metrics service port
servicePort: 8085 servicePort: 8080
# -- Metrics service port name # -- Metrics service port name
portName: http-metrics portName: http-metrics
serviceMonitor: serviceMonitor:
@ -2506,7 +2506,7 @@ applicationSet:
# ApplicationSet controller container ports # ApplicationSet controller container ports
containerPorts: containerPorts:
# -- Metrics container port # -- Metrics container port
metrics: 8085 metrics: 8080
# -- Probe container port # -- Probe container port
probe: 8081 probe: 8081
# -- Webhook container port # -- Webhook container port

View file

@ -3,7 +3,7 @@ appVersion: v3.4.8
name: argo-workflows name: argo-workflows
description: A Helm chart for Argo Workflows description: A Helm chart for Argo Workflows
type: application type: application
version: 0.29.2 version: 0.30.0
icon: https://argoproj.github.io/argo-workflows/assets/logo.png icon: https://argoproj.github.io/argo-workflows/assets/logo.png
home: https://github.com/argoproj/argo-helm home: https://github.com/argoproj/argo-helm
sources: sources:
@ -16,5 +16,5 @@ annotations:
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252 fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc url: https://argoproj.github.io/argo-helm/pgp_keys.asc
artifacthub.io/changes: | artifacthub.io/changes: |
- kind: added - kind: fixed
description: Add support for UI columns configuration description: artifactRepository will not be configured by default

View file

@ -0,0 +1,46 @@
# Test with artifact repository
crds:
keep: false
useStaticCredentials: true
artifactRepository:
archiveLogs: false
s3:
accessKeySecret:
name: "{{ .Release.Name }}-minio"
key: accesskey
secretKeySecret:
name: "{{ .Release.Name }}-minio"
key: secretkey
insecure: false
bucket:
endpoint:
region:
roleARN:
useSDKCreds: true
encryptionOptions:
enableEncryption: true
gcs:
bucket: project-argo
keyFormat: "{{ `{{workflow.namespace}}/{{workflow.name}}/{{pod.name}}` }}"
serviceAccountKeySecret:
name: my-gcs-credentials
key: serviceAccountKey
azure:
endpoint: https://mystorageaccountname.blob.core.windows.net
container: my-container-name
blobNameFormat: path/in/container
useSDKCreds: true
accountKeySecret:
name: my-azure-storage-credentials
key: account-access-key
customArtifactRepository:
artifactory:
repoUrl: https://artifactory.example.com/raw
usernameSecret:
name: artifactory-creds
key: username
passwordSecret:
name: artifactory-creds
key: password

View file

@ -55,6 +55,7 @@ data:
securityContext: {{- toYaml . | nindent 8 }} securityContext: {{- toYaml . | nindent 8 }}
{{- end }} {{- end }}
{{- end }} {{- end }}
{{- if or .Values.artifactRepository.s3 .Values.artifactRepository.gcs .Values.artifactRepository.azure .Values.customArtifactRepository }}
artifactRepository: artifactRepository:
{{- if .Values.artifactRepository.archiveLogs }} {{- if .Values.artifactRepository.archiveLogs }}
archiveLogs: {{ .Values.artifactRepository.archiveLogs }} archiveLogs: {{ .Values.artifactRepository.archiveLogs }}
@ -65,7 +66,7 @@ data:
{{- with .Values.artifactRepository.azure }} {{- with .Values.artifactRepository.azure }}
azure: {{- tpl (toYaml .) $ | nindent 8 }} azure: {{- tpl (toYaml .) $ | nindent 8 }}
{{- end }} {{- end }}
{{- if and (not .Values.artifactRepository.gcs) (not .Values.artifactRepository.azure) }} {{- if .Values.artifactRepository.s3 }}
s3: s3:
{{- if .Values.useStaticCredentials }} {{- if .Values.useStaticCredentials }}
accessKeySecret: accessKeySecret:
@ -98,6 +99,7 @@ data:
{{- if .Values.customArtifactRepository }} {{- if .Values.customArtifactRepository }}
{{- toYaml .Values.customArtifactRepository | nindent 6 }} {{- toYaml .Values.customArtifactRepository | nindent 6 }}
{{- end }} {{- end }}
{{- end }}
{{- if .Values.controller.metricsConfig.enabled }} {{- if .Values.controller.metricsConfig.enabled }}
metricsConfig: metricsConfig:
enabled: {{ .Values.controller.metricsConfig.enabled }} enabled: {{ .Values.controller.metricsConfig.enabled }}

View file

@ -1,4 +1,4 @@
{{- if and .Values.server.enabled .Values.server.serviceAccount.create .Values.server.rbac.create -}} {{- if and .Values.server.enabled .Values.server.rbac.create -}}
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }} {{- if .Values.singleNamespace }}
kind: RoleBinding kind: RoleBinding

View file

@ -705,17 +705,17 @@ artifactRepository:
archiveLogs: false archiveLogs: false
# -- Store artifact in a S3-compliant object store # -- Store artifact in a S3-compliant object store
# @default -- See [values.yaml] # @default -- See [values.yaml]
s3: s3: {}
# Note the `key` attribute is not the actual secret, it's the PATH to # # Note the `key` attribute is not the actual secret, it's the PATH to
# the contents in the associated secret, as defined by the `name` attribute. # # the contents in the associated secret, as defined by the `name` attribute.
accessKeySecret: # accessKeySecret:
name: "{{ .Release.Name }}-minio" # name: "{{ .Release.Name }}-minio"
key: accesskey # key: accesskey
secretKeySecret: # secretKeySecret:
name: "{{ .Release.Name }}-minio" # name: "{{ .Release.Name }}-minio"
key: secretkey # key: secretkey
# insecure will disable TLS. Primarily used for minio installs not configured with TLS # # insecure will disable TLS. Primarily used for minio installs not configured with TLS
insecure: false # insecure: false
# bucket: # bucket:
# endpoint: # endpoint:
# region: # region: