Make redis secret initialization optional

Signed-off-by: michaelvl <mvl.gh@network42.dk>
This commit is contained in:
michaelvl 2024-05-23 10:25:31 +02:00
parent e6776415a4
commit ad09f9cac9
No known key found for this signature in database
GPG key ID: D7297BEC8866083C
7 changed files with 10 additions and 5 deletions

View file

@ -3,7 +3,7 @@ appVersion: v2.11.1
kubeVersion: ">=1.23.0-0"
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
name: argo-cd
version: 6.10.2
version: 6.11.0
home: https://github.com/argoproj/argo-helm
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
sources:
@ -28,3 +28,5 @@ annotations:
artifacthub.io/changes: |
- kind: added
description: Added priorityClassName for the redis secret init job
- kind: added
description: Made Redis secret initialization optional with default enabled

View file

@ -1359,6 +1359,7 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| redisSecretInit.containerSecurityContext | object | See [values.yaml] | Application controller container-level security context |
| redisSecretInit.enabled | bool | `true` | Enable Redis secret initialization. If disabled, secret must be provisioned by alternative methods |
| redisSecretInit.image.imagePullPolicy | string | `""` (defaults to global.image.imagePullPolicy) | Image pull policy for the Redis secret-init Job |
| redisSecretInit.image.repository | string | `""` (defaults to global.image.repository) | Repository to use for the Redis secret-init Job |
| redisSecretInit.image.tag | string | `""` (defaults to global.image.tag) | Tag to use for the Redis secret-init Job |

View file

@ -1,4 +1,4 @@
{{- if not .Values.externalRedis.host }}
{{- if and .Values.redisSecretInit.enabled (not .Values.externalRedis.host) }}
apiVersion: batch/v1
kind: Job
metadata:

View file

@ -1,4 +1,4 @@
{{- if not .Values.externalRedis.host }}
{{- if and .Values.redisSecretInit.enabled (not .Values.externalRedis.host) }}
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:

View file

@ -1,4 +1,4 @@
{{- if not .Values.externalRedis.host }}
{{- if and .Values.redisSecretInit.enabled (not .Values.externalRedis.host) }}
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:

View file

@ -1,4 +1,4 @@
{{- if not .Values.externalRedis.host }}
{{- if and .Values.redisSecretInit.enabled (not .Values.externalRedis.host) }}
apiVersion: v1
kind: ServiceAccount
automountServiceAccountToken: {{ .Values.redisSecretInit.serviceAccount.automountServiceAccountToken }}

View file

@ -1601,6 +1601,8 @@ externalRedis:
secretAnnotations: {}
redisSecretInit:
# -- Enable Redis secret initialization. If disabled, secret must be provisioned by alternative methods
enabled: true
# -- Redis secret-init name
name: redis-secret-init