6
6
# -- Enable redis
7
7
enabled : false
8
8
externalRedis :
9
- host : 10.1.40.3
9
+ host : r-7goqq5xexvafy15m2q.redis.rds.aliyuncs.com
10
10
# existingSecret: argocd-redis
11
11
controller :
12
12
replicas : 3
@@ -102,7 +102,7 @@ repoServer:
102
102
- list
103
103
- watch
104
104
apiGroups :
105
- - ' '
105
+ - " "
106
106
resources :
107
107
- secrets
108
108
- configmaps
@@ -133,11 +133,11 @@ repoServer:
133
133
# argocd-vault-plugin with plain YAML
134
134
- name : avp-kustomize
135
135
command :
136
- - /var/run/argocd/argocd-cmp-server
137
- - --loglevel
138
- - debug
139
- - --logformat
140
- - json
136
+ - /var/run/argocd/argocd-cmp-server
137
+ - --loglevel
138
+ - debug
139
+ - --logformat
140
+ - json
141
141
image : quay.io/argoproj/argocd:v2.13.3
142
142
resources :
143
143
requests :
@@ -217,12 +217,12 @@ configs:
217
217
userIDKey: email
218
218
userNameKey: email
219
219
# OIDC configuration as an alternative to dex (optional).
220
- # oidc.config: |
221
- # name: nsl
222
- # issuer: https://account.naturalselectionlabs.com/auth/realms/google
223
- # clientID: argocd
224
- # clientSecret: $oidc.keycloak.clientSecret
225
- # requestedScopes: ["openid", "profile", "email", "roles"]
220
+ # oidc.config: |
221
+ # name: nsl
222
+ # issuer: https://account.naturalselectionlabs.com/auth/realms/google
223
+ # clientID: argocd
224
+ # clientSecret: $oidc.keycloak.clientSecret
225
+ # requestedScopes: ["openid", "profile", "email", "roles"]
226
226
# rootCA: |
227
227
# -----BEGIN CERTIFICATE-----
228
228
# ... encoded certificate data here ...
@@ -234,11 +234,11 @@ configs:
234
234
# - openid
235
235
# - profile
236
236
# - email
237
- # resource.customizations.ignoreDifferences.all: |
238
- # managedFieldsManagers:
239
- # - kube-controller-manager
240
- # jqPathExpressions:
241
- # - .spec.replicas
237
+ # resource.customizations.ignoreDifferences.all: |
238
+ # managedFieldsManagers:
239
+ # - kube-controller-manager
240
+ # jqPathExpressions:
241
+ # - .spec.replicas
242
242
resource.customizations.ignoreDifferences.apps_Deployment : |
243
243
jqPathExpressions:
244
244
- .spec.template.spec.initContainers[].resources
@@ -271,7 +271,7 @@ configs:
271
271
command :
272
272
- sh
273
273
- " -c"
274
- - " kustomize edit set annotation \ " github.com/url:${ARGOCD_ENV_APP_REPO}\ " ; kustomize edit set image ${ARGOCD_ENV_IMAGE_NAME}:${ARGOCD_ENV_IMAGE_TAG}; kustomize build --enable-helm . | argocd-vault-plugin -s ${ARGOCD_ENV_AVP_SECRET} generate -"
274
+ - ' kustomize edit set annotation "github.com/url:${ARGOCD_ENV_APP_REPO}"; kustomize edit set image ${ARGOCD_ENV_IMAGE_NAME}:${ARGOCD_ENV_IMAGE_TAG}; kustomize build --enable-helm . | argocd-vault-plugin -s ${ARGOCD_ENV_AVP_SECRET} generate -'
275
275
lockRepo : false
276
276
rbac :
277
277
# -- Create the argocd-rbac-cm configmap with ([Argo CD RBAC policy]) definitions.
@@ -280,11 +280,11 @@ configs:
280
280
create : true
281
281
282
282
# -- Annotations to be added to argocd-rbac-cm configmap
283
- annotations : { }
283
+ annotations : {}
284
284
285
285
# -- The name of the default role which Argo CD will falls back to, when authorizing API requests (optional).
286
286
# If omitted or empty, users may be still be able to login, but will see no apps, projects, etc...
287
- policy.default : ' role:readonly'
287
+ policy.default : " role:readonly"
288
288
289
289
# -- File containing user-defined policies and role definitions.
290
290
# @default -- `''` (See [values.yaml])
@@ -351,4 +351,4 @@ configs:
351
351
img.sidebar__logo__character {
352
352
width: 60px !important;
353
353
content: url("https://avatars.githubusercontent.com/u/152575164?s=200&v=4") !important;
354
- }
354
+ }
0 commit comments