Argo/Charts/argo-cd/values.yaml

83 lines
2.2 KiB
YAML
Raw Normal View History

2023-02-07 09:17:49 +01:00
argo-cd:
dex:
2022-12-05 15:18:00 +01:00
enabled: true
2023-02-07 09:17:49 +01:00
server:
rbacConfig:
policy.csv: |
g, roxedus, role:admin
2022-12-05 15:18:00 +01:00
g, ArgoCD Admins, role:admin
2023-02-07 09:17:49 +01:00
service:
type: NodePort
extraArgs:
- --insecure
2022-12-05 15:41:09 +01:00
ingress:
enabled: true
ingressClassName: traefik
annotations:
cert-manager.io/acme-challenge-type: dns01
cert-manager.io/cluster-issuer: roxedus.com-cloudflare
hosts:
2022-12-05 15:47:33 +01:00
- argo.roxedus.com
2022-12-05 15:41:09 +01:00
tls:
- hosts:
2022-12-05 15:47:33 +01:00
- argo.roxedus.com
secretName: argo-roxedus-com-cert
2022-12-05 15:41:09 +01:00
2023-02-07 09:17:49 +01:00
config:
accounts.roxedus: apiKey, login
2022-12-07 13:59:04 +01:00
accounts.admin.enabled: "false"
2023-02-07 09:17:49 +01:00
repositories: |
- type: helm
name: argo-cd
url: https://argoproj.github.io/argo-helm
2022-12-05 14:24:52 +01:00
configs:
cm:
2022-12-05 16:00:26 +01:00
admin.enabled: false
2022-12-05 15:18:00 +01:00
url: https://argo.roxedus.com
2022-12-05 14:40:48 +01:00
resource.customizations.health.networking.k8s.io_Ingress: |
hs = {}
hs.status = "Healthy"
return hs
2022-12-05 14:33:10 +01:00
2022-12-05 14:40:48 +01:00
resource.customizations.health.cert-manager.io_Certificate: |
hs = {}
if obj.status ~= nil then
if obj.status.conditions ~= nil then
for i, condition in ipairs(obj.status.conditions) do
if condition.type == "Ready" and condition.status == "False" then
hs.status = "Degraded"
hs.message = condition.message
return hs
end
if condition.type == "Ready" and condition.status == "True" then
hs.status = "Healthy"
hs.message = condition.message
return hs
2022-12-05 14:33:10 +01:00
end
end
end
2022-12-05 14:40:48 +01:00
end
2022-12-05 14:33:10 +01:00
2022-12-05 14:40:48 +01:00
hs.status = "Progressing"
hs.message = "Waiting for certificate"
return hs
2022-12-05 15:18:00 +01:00
dex.config: |
connectors:
- config:
2022-12-05 23:53:28 +01:00
issuer: https://authentik.roxedus.com/application/o/argo/
2022-12-05 15:18:00 +01:00
clientID: 509095b1ecd5117c95b9a2879d1cbcd5adc0b5d9
clientSecret: $authentik-sso:oidc.auth0.clientSecret
insecureEnableGroups: true
scopes:
- openid
- profile
- email
- groups
name: authentik
type: oidc
id: authentik