You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/operator-manual/declarative-setup.md
+63-15Lines changed: 63 additions & 15 deletions
Original file line number
Diff line number
Diff line change
@@ -362,6 +362,10 @@ The following keys are valid to refer to credential secrets:
362
362
* `githubAppEnterpriseBaseUrl` refers to the base api URL for GitHub Enterprise (e.g. `https://ghe.example.com/api/v3`)
363
363
* `tlsClientCertData` and `tlsClientCertKey` refer to secrets where a TLS client certificate (`tlsClientCertData`) and the corresponding private key `tlsClientCertKey` are stored for accessing GitHub Enterprise if custom certificates are used.
364
364
365
+
#### Helm Chart repositories
366
+
367
+
See the [Helm](#helm) section for the properties that apply to Helm repositories and charts sourced from OCI registries.
368
+
365
369
### Repositories using self-signed TLS certificates (or are signed by custom CA)
366
370
367
371
You can manage the TLS certificates used to verify the authenticity of your repository servers in a ConfigMap object named `argocd-tls-certs-cm`. The data section should contain a map, with the repository server's hostname part (not the complete URL) as key, and the certificate(s) in PEM format as data. So, if you connect to a repository with the URL `https://server.example.com/repos/my-repo`, you should use `server.example.com` as key. The certificate data should be either the server's certificate (in case of self-signed certificate) or the certificate of the CA that was used to sign the server's certificate. You can configure multiple certificates for each server, e.g. if you are having a certificate roll-over planned.
@@ -1100,27 +1104,54 @@ stringData:
1100
1104
}
1101
1105
```
1102
1106
1103
-
## Helm Chart Repositories
1107
+
## Helm
1104
1108
1105
-
Non standard Helm Chart repositories have to be registered explicitly.
1106
-
Each repository must have `url`, `type` and `name` fields. For private Helm repos you may need to configure access credentials and HTTPS settings using `username`, `password`,
1107
-
`tlsClientCertData`and `tlsClientCertKey` fields.
1109
+
Helm charts can be sourced from a Helm repository or OCI registry.
1108
1110
1109
-
Example:
1111
+
This is an example of a Helm chart being sourced from a Helm repository. The `releaseName` property is used to customize the name of the Helm _release_.
repoURL: registry-1.docker.io/bitnamicharts # note: the oci:// syntax is not included.
1144
+
targetRevision: 15.9.0
1145
+
destination:
1146
+
name: "in-cluster"
1147
+
namespace: nginx
1148
+
```
1149
+
1150
+
Helm charts located in sources that require additional configuration, such as authentication or TLS connection details, are defined within a _repository_ Secret. Each Secret must specify the `url`, `type` and `name` fields. Additional fields including `username`, `password`, `tlsClientCertData` and `tlsClientCertKey` can be specified as desired.
1151
+
1152
+
Helm Chart Repository:
1153
+
1154
+
```yaml
1124
1155
apiVersion: v1
1125
1156
kind: Secret
1126
1157
metadata:
@@ -1138,6 +1169,23 @@ stringData:
1138
1169
tlsClientCertKey: ...
1139
1170
```
1140
1171
1172
+
Helm charts sourced from OCI registries should utilize the fields described previously as well as set the `enableOCI` field as `true`.
1173
+
1174
+
```yaml
1175
+
apiVersion: v1
1176
+
kind: Secret
1177
+
metadata:
1178
+
name: oci-helm-chart
1179
+
namespace: oci-helm-chart
1180
+
labels:
1181
+
argocd.argoproj.io/secret-type: repository
1182
+
stringData:
1183
+
name: oci-helm-chart
1184
+
url: myregistry.example.com
1185
+
type: helm
1186
+
enableOCI: "true"
1187
+
```
1188
+
1141
1189
## Resource Exclusion/Inclusion
1142
1190
1143
1191
Resources can be excluded from discovery and sync so that Argo CD is unaware of them. For example, the apiGroup/kind `events.k8s.io/*`, `metrics.k8s.io/*` and `coordination.k8s.io/Lease` are always excluded. Use cases:
Copy file name to clipboardExpand all lines: docs/user-guide/helm.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ spec:
45
45
!!! note "When using Helm there are multiple ways to provide values"
46
46
Order of precedence is `parameters > valuesObject > values > valueFiles > helm repository values.yaml` (see [Here](./helm.md#helm-value-precedence) for a more detailed example)
47
47
48
-
See [here](../operator-manual/declarative-setup.md#helm-chart-repositories) for more info about how to configure private Helm repositories.
48
+
See [here](../operator-manual/declarative-setup.md#helm) for more info about how to configure private Helm repositories and private OCI registries.
Copy file name to clipboardExpand all lines: docs/user-guide/private-repositories.md
+45Lines changed: 45 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -435,6 +435,51 @@ It is possible to add and remove SSH known hosts entries using the ArgoCD web UI
435
435
436
436
You can also manage SSH known hosts entries in a declarative, self-managed ArgoCD setup. All SSH public host keys are stored in the ConfigMap object `argocd-ssh-known-hosts-cm`. For more details, please refer to the [Operator Manual](../operator-manual/declarative-setup.md#ssh-known-host-public-keys).
437
437
438
+
## Helm
439
+
440
+
Helm charts can be sourced from protected Helm repositories or OCI registries. You can configure access to protected Helm charts by using either the CLI or the UI by speciying `helm` as the _type_ of HTTPS based repository.
441
+
442
+
Using the CLI:
443
+
444
+
Specify the `--type` flag of the `argocd repo add` command:
5. Click `Connect` to test the connection and have the repository added
465
+
466
+
Helm charts stored in protected OCI registries should use the steps described previously as well as explicitly specifying that the source is an Helm chart stored in an OCI registry.
467
+
468
+
Using CLI:
469
+
470
+
Specify the `--enable-oci` flag of the `argocd repo add` command:
The protocol, such as `oci://` should be omitted when referencing an OCI registry
478
+
479
+
Using the UI:
480
+
481
+
Select the _Enable OCI_ checkbox when adding a HTTPS based _helm_ repository.
482
+
438
483
## Git Submodules
439
484
440
485
Submodules are supported and will be picked up automatically. If the submodule repository requires authentication then the credentials will need to match the credentials of the parent repository. Set ARGOCD_GIT_MODULES_ENABLED=false to disable submodule support
0 commit comments