46 lines
1.3 KiB
YAML
46 lines
1.3 KiB
YAML
argo-cd:
|
|
|
|
global:
|
|
revisionHistoryLimit: 1
|
|
image:
|
|
repository: registry.durp.info/argoproj/argocd
|
|
imagePullPolicy: Always
|
|
|
|
configs:
|
|
cm:
|
|
create: true
|
|
annotations: {}
|
|
url: "argocd.internal.durp.info"
|
|
|
|
dex.config: |
|
|
connectors:
|
|
- config:
|
|
issuer: https://authentik.durp.info/application/o/argocd
|
|
clientID: dbb8ffc06104fb6e7fac3e4ae7fafb1d90437625
|
|
clientSecret: $client-secret:clientSecret
|
|
insecureEnableGroups: true
|
|
scopes:
|
|
- openid
|
|
- profile
|
|
- email
|
|
- groups
|
|
name: authentik
|
|
type: oidc
|
|
id: authentik
|
|
|
|
rbac:
|
|
create: true
|
|
policy.csv: |
|
|
g, ArgoCD Admins, role:admin
|
|
scopes: "[groups]"
|
|
tls:
|
|
secret:
|
|
createSecret: true
|
|
# -- add additional secrets to be added to argocd-secret
|
|
## Custom secrets. Useful for injecting SSO secrets into environment variables.
|
|
## Ref: https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#sensitive-data-and-sso-client-secrets
|
|
## Note that all values must be non-empty.
|
|
extra:
|
|
{}
|
|
# LDAP_PASSWORD: "mypassword"
|