It was getting its own argocd.k-space.ee via CR. and probably it failed to update it since in reality ingress.tls.enable was false. Maybe also diff ArgoCD versions.
110 lines
3.6 KiB
YAML
110 lines
3.6 KiB
YAML
global:
|
|
logLevel: warn
|
|
domain: argocd.k-space.ee
|
|
|
|
dex:
|
|
enabled: false
|
|
|
|
redis:
|
|
enabled: false
|
|
redis-ha:
|
|
enabled: false
|
|
externalRedis:
|
|
host: argocd-redis
|
|
existingSecret: argocd-redis
|
|
|
|
server:
|
|
ingress:
|
|
enabled: true
|
|
annotations:
|
|
external-dns.alpha.kubernetes.io/target: traefik.k-space.ee
|
|
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
|
hosts:
|
|
- argocd.k-space.ee
|
|
extraTls:
|
|
- hosts:
|
|
- "*.k-space.ee"
|
|
|
|
metrics:
|
|
enabled: true
|
|
|
|
# We don't use ApplicationSet CRD-s (yet)
|
|
applicationSet:
|
|
enabled: false
|
|
|
|
repoServer:
|
|
metrics:
|
|
enabled: true
|
|
|
|
notifications:
|
|
metrics:
|
|
enabled: true
|
|
|
|
controller:
|
|
metrics:
|
|
enabled: true
|
|
|
|
configs:
|
|
params:
|
|
server.insecure: true
|
|
rbac:
|
|
policy.default: role:admin
|
|
policy.csv: |
|
|
# Map AD groups to ArgoCD roles
|
|
g, Developers, role:developers
|
|
g, ArgoCD Admins, role:admin
|
|
# Allow developers to read objects
|
|
p, role:developers, applications, get, */*, allow
|
|
p, role:developers, certificates, get, *, allow
|
|
p, role:developers, clusters, get, *, allow
|
|
p, role:developers, repositories, get, *, allow
|
|
p, role:developers, projects, get, *, allow
|
|
p, role:developers, accounts, get, *, allow
|
|
p, role:developers, gpgkeys, get, *, allow
|
|
p, role:developers, logs, get, */*, allow
|
|
p, role:developers, applications, restart, default/camtiler, allow
|
|
p, role:developers, applications, override, default/camtiler, allow
|
|
p, role:developers, applications, action/apps/Deployment/restart, default/camtiler, allow
|
|
p, role:developers, applications, sync, default/camtiler, allow
|
|
p, role:developers, applications, update, default/camtiler, allow
|
|
# argocd-image-updater
|
|
p, role:image-updater, applications, get, */*, allow
|
|
p, role:image-updater, applications, update, */*, allow
|
|
g, image-updater, role:image-updater
|
|
cm:
|
|
kustomize.buildOptions: --enable-helm
|
|
admin.enabled: "false"
|
|
resource.customizations: |
|
|
# https://github.com/argoproj/argo-cd/issues/1704
|
|
networking.k8s.io/Ingress:
|
|
health.lua: |
|
|
hs = {}
|
|
hs.status = "Healthy"
|
|
return hs
|
|
apiextensions.k8s.io/CustomResourceDefinition:
|
|
ignoreDifferences: |
|
|
jsonPointers:
|
|
- "x-kubernetes-validations"
|
|
oidc.config: |
|
|
name: OpenID Connect
|
|
issuer: https://auth.k-space.ee/
|
|
clientID: $oidc-client-argocd-owner-secrets:OIDC_CLIENT_ID
|
|
cliClientID: $oidc-client-argocd-owner-secrets:OIDC_CLIENT_ID
|
|
clientSecret: $oidc-client-argocd-owner-secrets:OIDC_CLIENT_SECRET
|
|
requestedIDTokenClaims:
|
|
groups:
|
|
essential: true
|
|
requestedScopes:
|
|
- openid
|
|
- profile
|
|
- email
|
|
- groups
|
|
secret:
|
|
createSecret: false
|
|
ssh:
|
|
knownHosts: |
|
|
# Copy-pasted from `ssh-keyscan git.k-space.ee`
|
|
git.k-space.ee ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCF1+/TDRXuGwsu4SZQQwQuJusb7W1OciGAQp/ZbTTvKD+0p7fV6dXyUlWjdFmITrFNYDreDnMiOS+FvE62d2Z0=
|
|
git.k-space.ee ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsLyRuubdIUnTKEqOipu+9x+FforrC8+oxulVrl0ECgdIRBQnLQXIspTNwuC3MKJ4z+DPbndSt8zdN33xWys8UNEs3V5/W6zsaW20tKiaX75WK5eOL4lIDJi/+E97+c0aZBXamhxTrgkRVJ5fcAkY6C5cKEmVM5tlke3v3ihLq78/LpJYv+P947NdnthYE2oc+XGp/elZ0LNfWRPnd///+ykbwWirvQm+iiDz7PMVKkb+Q7l3vw4+zneKJWAyFNrm+aewyJV9lFZZJuHliwlHGTriSf6zhMAWyJzvYqDAN6iT5yi9KGKw60J6vj2GLuK4ULVblTyP9k9+3iELKSWW5
|
|
git.k-space.ee ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL1jaIn/5dZcqN+cwcs/c2xMVJH/ReA84v8Mm73jqDAG
|