feat(argo-cd): Make redis secret initialization optional (#2713)
* Make redis secret initialization optional Signed-off-by: michaelvl <mvl.gh@network42.dk> * Remove artifacthub.io/changes from previous change Signed-off-by: michaelvl <mvl.gh@network42.dk> --------- Signed-off-by: michaelvl <mvl.gh@network42.dk>
This commit is contained in:
parent
e6776415a4
commit
728b6e7326
7 changed files with 9 additions and 6 deletions
|
@ -3,7 +3,7 @@ appVersion: v2.11.1
|
||||||
kubeVersion: ">=1.23.0-0"
|
kubeVersion: ">=1.23.0-0"
|
||||||
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
|
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
|
||||||
name: argo-cd
|
name: argo-cd
|
||||||
version: 6.10.2
|
version: 6.11.0
|
||||||
home: https://github.com/argoproj/argo-helm
|
home: https://github.com/argoproj/argo-helm
|
||||||
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
|
||||||
sources:
|
sources:
|
||||||
|
@ -27,4 +27,4 @@ annotations:
|
||||||
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
|
||||||
artifacthub.io/changes: |
|
artifacthub.io/changes: |
|
||||||
- kind: added
|
- kind: added
|
||||||
description: Added priorityClassName for the redis secret init job
|
description: Made Redis secret initialization optional with default enabled
|
||||||
|
|
|
@ -1359,6 +1359,7 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
|
||||||
| Key | Type | Default | Description |
|
| Key | Type | Default | Description |
|
||||||
|-----|------|---------|-------------|
|
|-----|------|---------|-------------|
|
||||||
| redisSecretInit.containerSecurityContext | object | See [values.yaml] | Application controller container-level security context |
|
| redisSecretInit.containerSecurityContext | object | See [values.yaml] | Application controller container-level security context |
|
||||||
|
| redisSecretInit.enabled | bool | `true` | Enable Redis secret initialization. If disabled, secret must be provisioned by alternative methods |
|
||||||
| redisSecretInit.image.imagePullPolicy | string | `""` (defaults to global.image.imagePullPolicy) | Image pull policy for the Redis secret-init Job |
|
| redisSecretInit.image.imagePullPolicy | string | `""` (defaults to global.image.imagePullPolicy) | Image pull policy for the Redis secret-init Job |
|
||||||
| redisSecretInit.image.repository | string | `""` (defaults to global.image.repository) | Repository to use for the Redis secret-init Job |
|
| redisSecretInit.image.repository | string | `""` (defaults to global.image.repository) | Repository to use for the Redis secret-init Job |
|
||||||
| redisSecretInit.image.tag | string | `""` (defaults to global.image.tag) | Tag to use for the Redis secret-init Job |
|
| redisSecretInit.image.tag | string | `""` (defaults to global.image.tag) | Tag to use for the Redis secret-init Job |
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{{- if not .Values.externalRedis.host }}
|
{{- if and .Values.redisSecretInit.enabled (not .Values.externalRedis.host) }}
|
||||||
apiVersion: batch/v1
|
apiVersion: batch/v1
|
||||||
kind: Job
|
kind: Job
|
||||||
metadata:
|
metadata:
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{{- if not .Values.externalRedis.host }}
|
{{- if and .Values.redisSecretInit.enabled (not .Values.externalRedis.host) }}
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: Role
|
kind: Role
|
||||||
metadata:
|
metadata:
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{{- if not .Values.externalRedis.host }}
|
{{- if and .Values.redisSecretInit.enabled (not .Values.externalRedis.host) }}
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: RoleBinding
|
kind: RoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{{- if not .Values.externalRedis.host }}
|
{{- if and .Values.redisSecretInit.enabled (not .Values.externalRedis.host) }}
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ServiceAccount
|
kind: ServiceAccount
|
||||||
automountServiceAccountToken: {{ .Values.redisSecretInit.serviceAccount.automountServiceAccountToken }}
|
automountServiceAccountToken: {{ .Values.redisSecretInit.serviceAccount.automountServiceAccountToken }}
|
||||||
|
|
|
@ -1601,6 +1601,8 @@ externalRedis:
|
||||||
secretAnnotations: {}
|
secretAnnotations: {}
|
||||||
|
|
||||||
redisSecretInit:
|
redisSecretInit:
|
||||||
|
# -- Enable Redis secret initialization. If disabled, secret must be provisioned by alternative methods
|
||||||
|
enabled: true
|
||||||
# -- Redis secret-init name
|
# -- Redis secret-init name
|
||||||
name: redis-secret-init
|
name: redis-secret-init
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue