fix(argo-cd): Fix secret name for applicationset webhook ingress (#2511)
Signed-off-by: Petr Drastil <petr.drastil@gmail.com> Co-authored-by: Aikawa <yu.croco@gmail.com>
This commit is contained in:
parent
d8c64b80fe
commit
5915340fc7
4 changed files with 9 additions and 7 deletions
|
@ -3,7 +3,7 @@ appVersion: v2.10.0
|
||||||
kubeVersion: ">=1.23.0-0"
|
kubeVersion: ">=1.23.0-0"
|
||||||
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
|
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
|
||||||
name: argo-cd
|
name: argo-cd
|
||||||
version: 6.0.12
|
version: 6.0.13
|
||||||
home: https://github.com/argoproj/argo-helm
|
home: https://github.com/argoproj/argo-helm
|
||||||
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
||||||
sources:
|
sources:
|
||||||
|
@ -26,5 +26,7 @@ annotations:
|
||||||
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
|
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
|
||||||
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
||||||
artifacthub.io/changes: |
|
artifacthub.io/changes: |
|
||||||
- kind: security
|
- kind: fixed
|
||||||
description: Argo CD repo-server cluster role is not deployed by default
|
description: Use argocd-applicationset-controller-tls secret for ApplicationSet certificate
|
||||||
|
- kind: fixed
|
||||||
|
description: Use argocd-applicationset-controller-tls secret for ApplicationSet webhook ingress
|
||||||
|
|
|
@ -1283,7 +1283,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
|
||||||
| applicationSet.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never` or `Always` |
|
| applicationSet.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never` or `Always` |
|
||||||
| applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
|
| applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
|
||||||
| applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
|
| applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
|
||||||
| applicationSet.certificate.secretName | string | `"argocd-application-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
|
| applicationSet.certificate.secretName | string | `"argocd-applicationset-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
|
||||||
| applicationSet.containerPorts.metrics | int | `8080` | Metrics container port |
|
| applicationSet.containerPorts.metrics | int | `8080` | Metrics container port |
|
||||||
| applicationSet.containerPorts.probe | int | `8081` | Probe container port |
|
| applicationSet.containerPorts.probe | int | `8081` | Probe container port |
|
||||||
| applicationSet.containerPorts.webhook | int | `7000` | Webhook container port |
|
| applicationSet.containerPorts.webhook | int | `7000` | Webhook container port |
|
||||||
|
|
|
@ -55,7 +55,7 @@ spec:
|
||||||
{{- if .Values.applicationSet.ingress.tls }}
|
{{- if .Values.applicationSet.ingress.tls }}
|
||||||
- hosts:
|
- hosts:
|
||||||
- {{ .Values.applicationSet.ingress.hostname }}
|
- {{ .Values.applicationSet.ingress.hostname }}
|
||||||
secretName: argocd-application-controller-tls
|
secretName: argocd-applicationset-controller-tls
|
||||||
{{- end }}
|
{{- end }}
|
||||||
{{- with .Values.applicationSet.ingress.extraTls }}
|
{{- with .Values.applicationSet.ingress.extraTls }}
|
||||||
{{- toYaml . | nindent 4 }}
|
{{- toYaml . | nindent 4 }}
|
||||||
|
|
|
@ -2790,7 +2790,7 @@ applicationSet:
|
||||||
# -- Deploy a Certificate resource (requires cert-manager)
|
# -- Deploy a Certificate resource (requires cert-manager)
|
||||||
enabled: false
|
enabled: false
|
||||||
# -- The name of the Secret that will be automatically created and managed by this Certificate resource
|
# -- The name of the Secret that will be automatically created and managed by this Certificate resource
|
||||||
secretName: argocd-application-controller-tls
|
secretName: argocd-applicationset-controller-tls
|
||||||
# -- Certificate primary domain (commonName)
|
# -- Certificate primary domain (commonName)
|
||||||
domain: argocd.example.com
|
domain: argocd.example.com
|
||||||
# -- Certificate Subject Alternate Names (SANs)
|
# -- Certificate Subject Alternate Names (SANs)
|
||||||
|
@ -2849,7 +2849,7 @@ applicationSet:
|
||||||
pathType: Prefix
|
pathType: Prefix
|
||||||
|
|
||||||
# -- Enable TLS configuration for the hostname defined at `applicationSet.webhook.ingress.hostname`
|
# -- Enable TLS configuration for the hostname defined at `applicationSet.webhook.ingress.hostname`
|
||||||
## TLS certificate will be retrieved from a TLS secret with name:`argocd-application-controller-tls`
|
## TLS certificate will be retrieved from a TLS secret with name:`argocd-applicationset-controller-tls`
|
||||||
tls: false
|
tls: false
|
||||||
|
|
||||||
# -- The list of additional hostnames to be covered by ingress record
|
# -- The list of additional hostnames to be covered by ingress record
|
||||||
|
|
Loading…
Reference in a new issue