Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update chart to 5.16.0 #5

Merged
merged 50 commits into from
Feb 2, 2023
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
50 commits
Select commit Hold shift + click to select a range
7e30521
feat(argo-cd): Upgrade Argo CD to 2.5.0 (#1568)
pdrastil Oct 25, 2022
77de11b
chore(github): Bump GitHub actions versions (#1575)
pdrastil Oct 25, 2022
5c8681b
fix(argo-cd): Chart NOTES nil references (#1582)
horjulf Oct 26, 2022
aa66902
docs(argo-cd): Improve documentation (#1584)
pdrastil Oct 26, 2022
55b8b34
fix(argo-workflows): serviceaccount rbac when sso is enabled (#1586)
nxf5025 Oct 27, 2022
563e1b3
Fix incorrect applicationSet property in README (#1590)
ashlineldridge Oct 27, 2022
229ca39
fix(argo-cd): Remove AWS volume from server (#1591)
pdrastil Oct 28, 2022
2cdd2ba
chore(argo-cd): Cleanup Redis manifest (#1577)
pdrastil Oct 28, 2022
90aa896
fix(argo-cd): Fix migration path for server configs (#1585)
pdrastil Oct 29, 2022
3eaad42
fix(argo-cd): Type conversion for ConfigMaps values (#1594)
pdrastil Oct 29, 2022
38a8957
feat(argo-cd): Add probes for ApplicationSet controller (#1532)
pdrastil Oct 30, 2022
4110069
chore(argo-cd): Remove liveness probe from application controller (#1…
pdrastil Oct 30, 2022
b249ebf
chore(github): Add dependabot.yml (#1595)
pdrastil Oct 30, 2022
3d9e2f3
feat(argo-cd): Set container security contexts (#1579)
pdrastil Oct 30, 2022
9819da3
feat(argo-cd): Support custom TLS certificates for Dex (#1477)
pdrastil Oct 30, 2022
caf1f4d
feat(argo-cd): Support manually managed TLS certificate for Server (#…
pdrastil Oct 30, 2022
02463f3
fix(argo-cd): Don't install CRDs for disabled components (#1596)
mkilchhofer Oct 30, 2022
48ab48a
fix(argo-cd): update network policy port name (#1603)
ecimin0 Oct 31, 2022
82b726b
chore(argo-workflows): Update ArgoWorkflows to v3.4.3 (#1610)
yu-croco Nov 1, 2022
579f114
fix(argo-cd): Replace coalesce with merge for old config values (#1612)
pdrastil Nov 1, 2022
1b2e7ca
feat(argo-cd): Add revisionHistoryLimit (#1599)
pdrastil Nov 1, 2022
06343a9
Upgrade Argo Image to the latest (#1614)
wd Nov 2, 2022
91f051a
chore(argo-cd): Update redis-ha (#1617)
yu-croco Nov 3, 2022
22496be
fix(argo-cd): Add /tmp voulmeMount to extensions container (#1620)
tvandewalle Nov 6, 2022
48360ee
fix(argo-cd): Add missing ClusterRole permissions to argo-cd-server t…
EladDolev Nov 6, 2022
e22ee52
fix(argo-cd): Use Dex non-distroless image (#1626)
pdrastil Nov 7, 2022
c82b03e
chore(argo-cd): Upgrade Argo CD to 2.5.2 (#1628)
pdrastil Nov 8, 2022
826ae0f
Allow to add custom artifact repository (#1453)
maxkochubey Nov 10, 2022
1f42ea7
fix(argo-cd): Use raw json for cluster credentials for Vault compatib…
pdrastil Nov 10, 2022
07c6fc3
fix(argo-cd): Cluster credentials config should be a string (#1636)
pdrastil Nov 11, 2022
050027a
fix(argo-workflows): Added missing attribute for sso (#1641)
yu-croco Nov 14, 2022
cde6e84
docs(argo-cd): Improve changelog information (#1652)
pdrastil Nov 17, 2022
6f3c468
chore(argo-cd): Consolidated GnuPG configuration (#1609)
pdrastil Nov 20, 2022
7105de1
fix(argo-cd): Invalid argocd-gpg-keys-cm template (#1656)
AllexVeldman Nov 21, 2022
16cf7af
feat(argo-workflows): Allow controller to whitelist secrets (#1646)
emmayylu Nov 23, 2022
062417e
feat(argo-workflows): Add labels for ServiceAccounts (#1665)
EugeneLugovtsov Nov 25, 2022
a93c45c
fix(argo-cd): deprecate server.extraArgs."--insecure" (#1669)
aslafy-z Nov 25, 2022
77d8a11
chore(argo-workflows): Support workflow retention (#1668)
yu-croco Nov 26, 2022
ca66f88
feat(argo-cd): Upgrade argocd to v2.5.3 (#1671)
smcavallo Nov 28, 2022
a918b83
fix helm install md (#1672)
fengshunli Nov 29, 2022
c935502
feat(argo-cd): Add Repo Server strict TLS cert support (#1673)
karlparry Nov 29, 2022
9ae4579
chore(argo-workflows): Update Argo Workflows to v3.4.4 (#1674)
yu-croco Nov 30, 2022
a0784fd
fix(argo-cd): Rename tls secret to include the -secret suffix (#1676)
karlparry Nov 30, 2022
f25cda3
chore(argo-cd): Remove duplicate ApplicationSet features (#1598)
pdrastil Nov 30, 2022
b97e652
feat(argo-cd): Add ability to annotate Deployments and StatefulSets (…
jstewart612 Nov 30, 2022
120af43
try update
ilia-medvedev-codefresh Jan 25, 2023
fb96efa
chart update WIP
ilia-medvedev-codefresh Jan 25, 2023
df14eed
backport applicationset
ilia-medvedev-codefresh Jan 25, 2023
0ca7eb4
backport applicationset
ilia-medvedev-codefresh Jan 25, 2023
e896635
argocd 2.5.5
ilia-medvedev-codefresh Feb 2, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
feat(argo-cd): Support manually managed TLS certificate for Server (a…
…rgoproj#1534)

Signed-off-by: Petr Drastil <petr.drastil@gmail.com>
  • Loading branch information
pdrastil authored Oct 30, 2022
commit caf1f4de023e2140127f928e99573b507ca78ae0
6 changes: 3 additions & 3 deletions charts/argo-cd/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ appVersion: v2.5.0
kubeVersion: ">=1.22.0-0"
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
name: argo-cd
version: 5.11.0
version: 5.12.0
home: https://github.com/argoproj/argo-helm
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
sources:
Expand All @@ -23,5 +23,5 @@ dependencies:
condition: redis-ha.enabled
annotations:
artifacthub.io/changes: |
- "[Added]: Added option to use custom TLS certs for Dex"
- "[Security]: TLS strict mode is enforced for custom Dex certificates"
- "[Added]: New TLS server configuration via server.certificateSecret"
- "[Deprecated]: TLS configuration via configs.secret.argocdServerTlsConfig"
12 changes: 8 additions & 4 deletions charts/argo-cd/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -414,7 +414,6 @@ NAME: my-release
| configs.secret.annotations | object | `{}` | Annotations to be added to argocd-secret |
| configs.secret.argocdServerAdminPassword | string | `""` | Bcrypt hashed admin password |
| configs.secret.argocdServerAdminPasswordMtime | string | `""` (defaults to current time) | Admin password modification time. Eg. `"2006-01-02T15:04:05Z"` |
| configs.secret.argocdServerTlsConfig | object | `{}` | Argo TLS Data |
| configs.secret.bitbucketServerSecret | string | `""` | Shared secret for authenticating BitbucketServer webhook events |
| configs.secret.bitbucketUUID | string | `""` | UUID for authenticating Bitbucket webhook events |
| configs.secret.createSecret | bool | `true` | Create the argocd-secret |
Expand Down Expand Up @@ -586,9 +585,9 @@ NAME: my-release
| server.autoscaling.minReplicas | int | `1` | Minimum number of replicas for the Argo CD server [HPA] |
| server.autoscaling.targetCPUUtilizationPercentage | int | `50` | Average CPU utilization percentage for the Argo CD server [HPA] |
| server.autoscaling.targetMemoryUtilizationPercentage | int | `50` | Average memory utilization percentage for the Argo CD server [HPA] |
| server.certificate.additionalHosts | list | `[]` | Certificate manager additional hosts |
| server.certificate.additionalHosts | list | `[]` | Certificate Subject Alternate Names (SANs) |
| server.certificate.domain | string | `"argocd.example.com"` | Certificate primary domain (commonName) |
| server.certificate.duration | string | `""` | The requested 'duration' (i.e. lifetime) of the Certificate. Value must be in units accepted by Go time.ParseDuration |
| server.certificate.duration | string | `""` (defaults to 2160h = 90d if not specified) | The requested 'duration' (i.e. lifetime) of the certificate. |
| server.certificate.enabled | bool | `false` | Deploy a Certificate resource (requires cert-manager) |
| server.certificate.issuer.group | string | `""` | Certificate issuer group. Set if using an external issuer. Eg. `cert-manager.io` |
| server.certificate.issuer.kind | string | `""` | Certificate issuer kind. Either `Issuer` or `ClusterIssuer` |
Expand All @@ -597,8 +596,13 @@ NAME: my-release
| server.certificate.privateKey.encoding | string | `"PKCS1"` | The private key cryptography standards (PKCS) encoding for private key. Either: `PCKS1` or `PKCS8` |
| server.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never` or `Always` |
| server.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
| server.certificate.renewBefore | string | `""` | How long before the currently issued certificate's expiry cert-manager should renew the certificate. Value must be in units accepted by Go time.ParseDuration |
| server.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
| server.certificate.secretName | string | `"argocd-server-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
| server.certificateSecret.annotations | object | `{}` | Annotations to be added to argocd-server-tls secret |
| server.certificateSecret.crt | string | `""` | Certificate data |
| server.certificateSecret.enabled | bool | `false` | Create argocd-server-tls secret |
| server.certificateSecret.key | string | `""` | Private Key of the certificate |
| server.certificateSecret.labels | object | `{}` | Labels to be added to argocd-server-tls secret |
| server.clusterAdminAccess.enabled | bool | `true` | Enable RBAC for local cluster deployments |
| server.containerPort | int | `8080` | Configures the server port |
| server.containerSecurityContext | object | See [values.yaml] | Server container-level security context |
Expand Down
3 changes: 3 additions & 0 deletions charts/argo-cd/templates/NOTES.txt
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,9 @@ DEPRECATED option server.config - Use configs.cm
{{- if or .Values.server.rbacConfig (hasKey .Values.server "rbacConfigCreate") .Values.server.rbacConfigAnnotations }}
DEPRECATED option server.rbacConfig - Use configs.rbac
{{- end }}
{{- if .Values.configs.secret.argocdServerTlsConfig }}
DEPRECATED option config.secret.argocdServerTlsConfig - Use server.certificate or server.certificateSecret
{{- end }}
{{- if .Values.controller.service }}
REMOVED option controller.service - Use controller.metrics
{{- end }}
Expand Down
21 changes: 21 additions & 0 deletions charts/argo-cd/templates/argocd-configs/argocd-server-tls.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
{{- if and .Values.server.certificateSecret.enabled (not .Values.server.certificate.enabled) }}
apiVersion: v1
kind: Secret
metadata:
name: argocd-server-tls
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.server.name "name" "server-tls") | nindent 4 }}
{{- with .Values.server.certificateSecret.labels }}
{{- toYaml . | nindent 4 }}
{{- end }}
{{- with .Values.server.certificateSecret.annotations }}
annotations:
{{- range $key, $value := . }}
{{ $key }}: {{ $value | quote }}
{{- end }}
{{- end }}
type: kubernetes.io/tls
data:
tls.crt: {{ .Values.server.certificateSecret.crt | b64enc | quote }}
tls.key: {{ .Values.server.certificateSecret.key | b64enc | quote }}
{{- end }}
10 changes: 5 additions & 5 deletions charts/argo-cd/templates/argocd-server/certificate.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,11 @@
apiVersion: {{ include "argo-cd.apiVersion.cert-manager" . }}
kind: Certificate
metadata:
name: {{ template "argo-cd.server.fullname" . }}
name: {{ include "argo-cd.server.fullname" . }}
labels:
{{- include "argo-cd.labels" (dict "context" . "component" .Values.server.name "name" .Values.server.name) | nindent 4 }}
spec:
secretName: {{ .Values.server.certificate.secretName }}
commonName: {{ .Values.server.certificate.domain | quote }}
dnsNames:
- {{ .Values.server.certificate.domain | quote }}
Expand All @@ -15,6 +16,9 @@ spec:
{{- with .Values.server.certificate.duration }}
duration: {{ . | quote }}
{{- end }}
{{- with .Values.server.certificate.renewBefore }}
renewBefore: {{ . | quote }}
{{- end }}
issuerRef:
{{- with .Values.server.certificate.issuer.group }}
group: {{ . | quote }}
Expand All @@ -25,8 +29,4 @@ spec:
privateKey:
{{- toYaml . | nindent 4 }}
{{- end }}
{{- with .Values.server.certificate.renewBefore }}
renewBefore: {{ . | quote }}
{{- end }}
secretName: {{ .Values.server.certificate.secretName | quote }}
{{- end }}
67 changes: 41 additions & 26 deletions charts/argo-cd/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -415,16 +415,10 @@ configs:
# LDAP_PASSWORD: "mypassword"

# -- Argo TLS Data
argocdServerTlsConfig:
{}
# key:
# crt: |
# -----BEGIN CERTIFICATE-----
# <cert data>
# -----END CERTIFICATE-----
# -----BEGIN CERTIFICATE-----
# <ca cert data>
# -----END CERTIFICATE-----
# DEPRECATED - Use server.certificate or server.certificateSecret
# argocdServerTlsConfig:
# key: ''
# crt: ''

# -- Bcrypt hashed admin password
## Argo expects the password in the secret to be bcrypt hashed. You can create this hash with
Expand Down Expand Up @@ -1433,16 +1427,34 @@ server:
# cpu: 50m
# memory: 64Mi

## Certificate configuration
# TLS certificate configuration via cert-manager
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-certificates-used-by-argocd-server
certificate:
# -- Deploy a Certificate resource (requires cert-manager)
enabled: false
# -- The name of the Secret that will be automatically created and managed by this Certificate resource
secretName: argocd-server-tls
# -- Certificate primary domain (commonName)
domain: argocd.example.com
# -- The requested 'duration' (i.e. lifetime) of the Certificate. Value must be in units accepted by Go time.ParseDuration
# -- Certificate Subject Alternate Names (SANs)
additionalHosts: []
# -- The requested 'duration' (i.e. lifetime) of the certificate.
# @default -- `""` (defaults to 2160h = 90d if not specified)
## Ref: https://cert-manager.io/docs/usage/certificate/#renewal
duration: ""
# -- How long before the currently issued certificate's expiry cert-manager should renew the certificate. Value must be in units accepted by Go time.ParseDuration
# -- How long before the expiry a certificate should be renewed.
# @default -- `""` (defaults to 360h = 15d if not specified)
## Ref: https://cert-manager.io/docs/usage/certificate/#renewal
renewBefore: ""
# Certificate issuer
## Ref: https://cert-manager.io/docs/concepts/issuer
issuer:
# -- Certificate issuer group. Set if using an external issuer. Eg. `cert-manager.io`
group: ""
# -- Certificate issuer kind. Either `Issuer` or `ClusterIssuer`
kind: ""
# -- Certificate isser name. Eg. `letsencrypt`
name: ""
# Private key of the certificate
privateKey:
# -- Rotation policy of private key when certificate is re-issued. Either: `Never` or `Always`
Expand All @@ -1453,17 +1465,20 @@ server:
algorithm: RSA
# -- Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored.
size: 2048
issuer:
# -- Certificate issuer group. Set if using an external issuer. Eg. `cert-manager.io`
group: ""
# -- Certificate issuer kind. Either `Issuer` or `ClusterIssuer`
kind: ""
# -- Certificate isser name. Eg. `letsencrypt`
name: ""
# -- Certificate manager additional hosts
additionalHosts: []
# -- The name of the Secret that will be automatically created and managed by this Certificate resource
secretName: argocd-server-tls

# TLS certificate configuration via Secret
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/tls/#tls-certificates-used-by-argocd-server
certificateSecret:
# -- Create argocd-server-tls secret
enabled: false
# -- Annotations to be added to argocd-server-tls secret
annotations: {}
# -- Labels to be added to argocd-server-tls secret
labels: {}
# -- Private Key of the certificate
key: ''
# -- Certificate data
crt: ''

## Server service configuration
service:
Expand Down Expand Up @@ -1591,7 +1606,7 @@ server:
# -- Ingress TLS configuration
tls:
[]
# - secretName: argocd-tls-certificate
# - secretName: your-certificate-name
# hosts:
# - argocd.example.com

Expand Down Expand Up @@ -1657,7 +1672,7 @@ server:
# -- Ingress TLS configuration for dedicated [gRPC-ingress]
tls:
[]
# - secretName: argocd-tls-certificate
# - secretName: your-certificate-name
# hosts:
# - argocd.example.com

Expand Down