feat: allow custom secrets to be added to argocd-secret (#199)
This commit is contained in:
parent
0eb28119e8
commit
4b22128b4c
4 changed files with 12 additions and 2 deletions
|
@ -2,7 +2,7 @@ apiVersion: v1
|
||||||
appVersion: "1.3.6"
|
appVersion: "1.3.6"
|
||||||
description: A Helm chart for ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes.
|
description: A Helm chart for ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes.
|
||||||
name: argo-cd
|
name: argo-cd
|
||||||
version: 1.5.3
|
version: 1.6.0
|
||||||
home: https://github.com/argoproj/argo-helm
|
home: https://github.com/argoproj/argo-helm
|
||||||
icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png
|
icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png
|
||||||
keywords:
|
keywords:
|
||||||
|
|
|
@ -46,6 +46,7 @@ Helm v3 has removed the `install-crds` hook so CRDs are now populated by files i
|
||||||
| configs.secret.githubSecret | GitHub incoming webhook secret | `""` |
|
| configs.secret.githubSecret | GitHub incoming webhook secret | `""` |
|
||||||
| configs.secret.gitlabSecret | GitLab incoming webhook secret | `""` |
|
| configs.secret.gitlabSecret | GitLab incoming webhook secret | `""` |
|
||||||
| configs.tlsCerts.data."argocd.example.com" | TLS certificate | See [values.yaml](values.yaml) |
|
| configs.tlsCerts.data."argocd.example.com" | TLS certificate | See [values.yaml](values.yaml) |
|
||||||
|
| configs.secret.extra | add additional secrets to be added to argocd-secret | `{}` |
|
||||||
|
|
||||||
## ArgoCD Controller
|
## ArgoCD Controller
|
||||||
|
|
||||||
|
|
|
@ -11,7 +11,7 @@ metadata:
|
||||||
app.kubernetes.io/part-of: argocd
|
app.kubernetes.io/part-of: argocd
|
||||||
app.kubernetes.io/component: {{ .Values.server.name }}
|
app.kubernetes.io/component: {{ .Values.server.name }}
|
||||||
type: Opaque
|
type: Opaque
|
||||||
{{- if or .Values.configs.secret.githubSecret (or .Values.configs.secret.gitlabSecret .Values.configs.secret.bitbucketUUID .Values.configs.secret.bitbucketServerSecret .Values.configs.secret.gogsSecret .Values.configs.secret.argocdServerAdminPassword .Values.configs.secret.argocdServerTlsConfig) }}
|
{{- if or .Values.configs.secret.githubSecret (or .Values.configs.secret.gitlabSecret .Values.configs.secret.bitbucketUUID .Values.configs.secret.bitbucketServerSecret .Values.configs.secret.gogsSecret .Values.configs.secret.argocdServerAdminPassword .Values.configs.secret.argocdServerTlsConfig .Values.configs.secret.extra) }}
|
||||||
# Setting a blank data again will wipe admin password/key/cert
|
# Setting a blank data again will wipe admin password/key/cert
|
||||||
data:
|
data:
|
||||||
{{- if .Values.configs.secret.githubSecret }}
|
{{- if .Values.configs.secret.githubSecret }}
|
||||||
|
@ -37,5 +37,8 @@ data:
|
||||||
admin.password: {{ .Values.configs.secret.argocdServerAdminPassword | b64enc }}
|
admin.password: {{ .Values.configs.secret.argocdServerAdminPassword | b64enc }}
|
||||||
admin.passwordMtime: {{ date "2006-01-02T15:04:05Z" now | b64enc }}
|
admin.passwordMtime: {{ date "2006-01-02T15:04:05Z" now | b64enc }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- range $key, $value := .Values.configs.secret.extra }}
|
||||||
|
{{ $key }}: {{ $value | b64enc }}
|
||||||
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
|
@ -689,6 +689,12 @@ configs:
|
||||||
bitbucketUUÌD: ""
|
bitbucketUUÌD: ""
|
||||||
gogsSecret: ""
|
gogsSecret: ""
|
||||||
|
|
||||||
|
# Custom secrets. Useful for injecting SSO secrets into environment variables.
|
||||||
|
# Ref: https://argoproj.github.io/argo-cd/operator-manual/sso/
|
||||||
|
# Note that all values must be non-empty.
|
||||||
|
extra: {}
|
||||||
|
# LDAP_PASSWORD: "mypassword"
|
||||||
|
|
||||||
# Argo TLS Data.
|
# Argo TLS Data.
|
||||||
argocdServerTlsConfig:
|
argocdServerTlsConfig:
|
||||||
{}
|
{}
|
||||||
|
|
Loading…
Reference in a new issue