Adding oidcConfig option to argo-cd helm chart
This commit is contained in:
parent
82ab0eaa27
commit
ba4ef32c9b
2 changed files with 15 additions and 2 deletions
|
@ -20,4 +20,11 @@ data:
|
||||||
{{- if .Values.config.dexConfig }}
|
{{- if .Values.config.dexConfig }}
|
||||||
dex.config: |
|
dex.config: |
|
||||||
{{ toYaml .Values.config.dexConfig | indent 4 }}
|
{{ toYaml .Values.config.dexConfig | indent 4 }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
{{- if .Values.config.url }}
|
||||||
|
url: {{ .Values.config.url }}
|
||||||
|
{{- end }}
|
||||||
|
{{- if .Values.config.oidcConfig }}
|
||||||
|
oidc.config: |
|
||||||
|
{{ toYaml .Values.config.oidcConfig | indent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
|
|
@ -100,6 +100,12 @@ config:
|
||||||
# orgs:
|
# orgs:
|
||||||
# - name: your-github-org
|
# - name: your-github-org
|
||||||
# teams:
|
# teams:
|
||||||
|
url: # https://argocd.example.com/
|
||||||
|
oidcConfig:
|
||||||
|
# name: Okta
|
||||||
|
# issuer: https://dev-123456.oktapreview.com
|
||||||
|
# clientID: aaaabbbbccccddddeee
|
||||||
|
# clientSecret: $oidc.okta.clientSecret
|
||||||
# The following keys hold the shared secret for authenticating GitHub/GitLab/BitBucket webhook
|
# The following keys hold the shared secret for authenticating GitHub/GitLab/BitBucket webhook
|
||||||
# events. To enable webhooks, configure one or more of the following keys with the shared git
|
# events. To enable webhooks, configure one or more of the following keys with the shared git
|
||||||
# provider webhook secret. The payload URL configured in the git provider should use the
|
# provider webhook secret. The payload URL configured in the git provider should use the
|
||||||
|
@ -125,4 +131,4 @@ rbac:
|
||||||
# p, role:org-admin, repositories, delete, *, allow
|
# p, role:org-admin, repositories, delete, *, allow
|
||||||
# g, your-github-org:your-team, role:org-admin
|
# g, your-github-org:your-team, role:org-admin
|
||||||
# The default role Argo CD will fall back to, when authorizing API requests
|
# The default role Argo CD will fall back to, when authorizing API requests
|
||||||
policyDefault: #role:readonly
|
policyDefault: #role:readonly
|
||||||
|
|
Loading…
Reference in a new issue