You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: charts/argo-cd/README.md
+27-3Lines changed: 27 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -278,6 +278,31 @@ For full list of changes please check ArtifactHub [changelog].
278
278
279
279
Highlighted versions provide information about additional steps that should be performed by user when upgrading to newer version.
280
280
281
+
### 7.0.0
282
+
283
+
We changed the type of `.Values.configs.clusterCredentials` from `list` to `object`.
284
+
If you used the value, please migrate like below.
285
+
286
+
```yaml
287
+
# before
288
+
configs:
289
+
clusterCredentials:
290
+
- mycluster:
291
+
server: https://mycluster.example.com
292
+
labels: {}
293
+
annotations: {}
294
+
# ...
295
+
296
+
# after
297
+
configs:
298
+
clusterCredentials:
299
+
mycluster:
300
+
server: https://mycluster.example.com
301
+
labels: {}
302
+
annotations: {}
303
+
# ...
304
+
```
305
+
281
306
### 6.10.0
282
307
283
308
This version introduces authentication for Redis to mitigate GHSA-9766-5277-j5hr.
@@ -967,7 +992,7 @@ NAME: my-release
967
992
| server.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never`or `Always` |
968
993
| server.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
969
994
| server.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
970
-
| server.certificate.secretName | string | `"argocd-server-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
995
+
| server.certificate.secretTemplateAnnotations | object | `{}` | Annotations that allow the certificate to be composed from data residing in existing Kubernetes Resources |
971
996
| server.certificate.usages | list | `[]` | Usages for the certificate |
972
997
| server.certificateSecret.annotations | object | `{}` | Annotations to be added to argocd-server-tls secret |
973
998
| server.certificateSecret.crt | string | `""` | Certificate data |
@@ -1347,7 +1372,7 @@ If you want to use an existing Redis (eg. a managed service from a cloud provide
1347
1372
1348
1373
| Key | Type | Default | Description |
1349
1374
|-----|------|---------|-------------|
1350
-
| externalRedis.existingSecret | string | `""` | The name of an existing secret with Redis credentials (must contain key `redis-password`). When it's set, the `externalRedis.password` parameter is ignored |
1375
+
| externalRedis.existingSecret | string | `""` | The name of an existing secret with Redis (must contain key `redis-password`) and Sentinel credentials. When it's set, the `externalRedis.password` parameter is ignored |
| externalRedis.port | int | `6379` | External Redis server port |
@@ -1401,7 +1426,6 @@ If you use an External Redis (See Option 3 above), this Job is not deployed.
1401
1426
| applicationSet.certificate.privateKey.rotationPolicy | string | `"Never"` | Rotation policy of private key when certificate is re-issued. Either: `Never`or `Always` |
1402
1427
| applicationSet.certificate.privateKey.size | int | `2048` | Key bit size of the private key. If algorithm is set to `Ed25519`, size is ignored. |
1403
1428
| applicationSet.certificate.renewBefore | string | `""` (defaults to 360h = 15d if not specified) | How long before the expiry a certificate should be renewed. |
1404
-
| applicationSet.certificate.secretName | string | `"argocd-applicationset-controller-tls"` | The name of the Secret that will be automatically created and managed by this Certificate resource |
1405
1429
| applicationSet.containerPorts.metrics | int | `8080` | Metrics container port |
1406
1430
| applicationSet.containerPorts.probe | int | `8081` | Probe container port |
1407
1431
| applicationSet.containerPorts.webhook | int | `7000` | Webhook container port |
1. kubectl port-forward service/{{ include "argo-cd.fullname" . }}-server -n {{ include "argo-cd.namespace" . }} 8080:443
4
4
5
5
and then open the browser on http://localhost:8080 and accept the certificate
6
6
@@ -12,7 +12,7 @@ In order to access the server UI you have the following options:
12
12
{{ if eq (toString (index .Values.configs.cm "admin.enabled")) "true" -}}
13
13
After reaching the UI the first time you can login with username: admin and the random password generated during the installation. You can find the password by running:
kubectl -n {{ include "argo-cd.namespace" . }} get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d
16
16
17
17
(You should delete the initial secret afterwards as suggested by the Getting Started Guide: https://argo-cd.readthedocs.io/en/stable/getting_started/#4-login-using-the-cli)
18
18
{{ else if or (index .Values.configs.cm "dex.config") (index .Values.configs.cm "oidc.config") -}}
0 commit comments