Skip to content

Conversation

YustinaKvr
Copy link
Contributor

  1. Kustomization files
  2. 3 cronjobs

LukasCuperDT and others added 6 commits September 3, 2025 14:27
* Initial commit with dumped and adapted values file for ArgoCD

* temp commit

* Self-managed ArgoCD by ArgoCD App in app

* Creation of ArgoCD app in app
- dumped and addapted ArgoCD values file, including best security practices
- re-organized folder structure to use local & upstream helm charts
- migrated and modified upstream helm charts correspondingly to the folder structure
- introduced ArgoCD's applicationSets for the usage of two or more applications together
- additional of argocd clusters as a sealed secrets manifests
- added configManagementPlugin

* Templating all kustomize apps
- added manifests for argocd projects, applications, applicationsSets
- added manifests for kustomize applicationSet, which includes all applications within kustomize folder
- added `app-config.yaml` to each kustomize apps to define target namespace, argocd project, syncPolicy and server destination
- removed root-of-app-of-apps
- ToDo: missing swift-proxy-swiss kustomize app

* Updating Argocd values files based on ansible playbook manifest and removing argocd plugins templates

* feat: add preprod cluster support for ArgoCD and monitoring stack

- Add preprod cluster to ArgoCD ApplicationSets for argocd, cert-manager, prometheus, and victoria-metrics
- Add preprod cluster support for grafana, victoria-metrics-auth, promtail, and cert-exporter applications
- Create preprod configuration files for all monitoring components:
  - ArgoCD with OIDC integration and vault plugin support
  - Grafana with Keycloak authentication and datasource configs
  - Prometheus stack with alerting and ingress configuration
  - Victoria Metrics cluster and auth components
  - Promtail for log forwarding to Loki
- Fix prometheus additional manifests to use cluster-specific values
- Remove commented out application configurations to clean up codebase

* Fixing helm templating

* Re-using vault plugin template

* Addition of vault upstream helm chart

* Adapted ArgoCD values file for intengration with vault

* Updating cert-manager

* Removing leftovers from value-preprod.yaml of argocd

* Creating templates and values file for argocd clusters

* fixing up cert-manager additional manifests

* Testing commit

* Testing templating of cluser-secrets

* Fixing up templating of cluster secrets

* ANother fix of cluster secrets template

* Amother try

* And another fix

* Another try

* working example

* test

* test

* test

* test

* test

* Fixed template of cluster secret

* Partial preprod readiness:
- adapted multiple configs to desired use cases
- cleanup of unnecessary files/fodlers
- restructuralization
- upgraded version of cert-manager

* Addition of adapted aplictionSet manifests and appliations values file

* Adding argocd unpacked helm chart

* Testing out another solution with seperated chart section

* Changing argocd application template

* Reverting changes

* Addition of argocd-additional-manifest values file and helm templates

* WiP: Partial values files of applications and applicationSets

* adapting the applciation template for kustomize usage

* Removing unnecessary data form kustomize subfolders and using first kustomize app in argocd applications

* Changing eco to eco-preprod endpoints

* Addition of preprod cluster

* Fix of the cluster template

* Fixing up clusters template and renaming the argocd templates

* Test

* Final fix if cluster templating

* Renaming some templates

* Moving out repositories manifest and creating separated values file

* Changes after rebase
* Enabling openapi-validator

* Removing netpol

* Addition of argocd-vault-kustomize plugin

* fixing up role bindings

* fixin up openapi validator

* fixin up rolebindings

* Watching working branch in some of the the applications

* updating version  of openapi-validator

* updating version  of openapi-validator

* moving to 0.3.1

* adding reportportal references

---------

Co-authored-by: Vladimir Hasko <[email protected]>
* Enabling secret reference in stead of configmap with plain text

* Fixing up clusterissuers

* Updating the rbac roles of Argocd

* Fixing up rbac roles in argocd

* Removing not necessary manifests
* Update openapi validator to 0.3.2

* Update to 0.3.2
@LukasCuperDT LukasCuperDT changed the base branch from main to Helm_charts_restructure&Pre-Prod_setup September 5, 2025 12:08
vladimirhasko and others added 3 commits September 5, 2025 15:28
* Update openapi to 0.3.3

* Update to 0.3.3
* Init commit

* Finalisation of outline helm chart
- addition of outline argocd app updated with parameters
- adapted values file to use values from parameters
- prefinal version ready

* Fixing up parametrizastion in plugin

* Stable values-preprod file of upstream's Argocd

* Fixing indentations

* another fix of k patcher

* Excluding patch of the secret if it exists

* rolling back kubectl patcher

* Fixing up outline

* Fixing up otuline pvc

* Fix helm template validation errors for Outline

- Add minimal Redis configuration to satisfy chart template requirements
- Set Redis host to 'redis-disabled' to prevent connection attempts
- Use dummy Redis password for template validation
- This resolves the 'Redis password is required' template error

* Fix nginx ingress pathType for ACME challenges

- Change pathType from ImplementationSpecific to Prefix
- This resolves ACME challenge validation errors with nginx admission webhook
- Error: 'path /.well-known/acme-challenge/... cannot be used with pathType Exact'

* Update Redis configuration to use minimal instance

* Addition of local helm chart for outline
@LukasCuperDT LukasCuperDT force-pushed the giji_first_build branch 3 times, most recently from 67cd4a1 to c9905a3 Compare September 11, 2025 15:50
Copy link

gitguardian bot commented Sep 11, 2025

️✅ There are no secrets present in this pull request anymore.

If these secrets were true positive and are still valid, we highly recommend you to revoke them.
While these secrets were previously flagged, we no longer have a reference to the
specific commits where they were detected. Once a secret has been leaked into a git
repository, you should consider it compromised, even if it was deleted immediately.
Find here more information about risks.


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@LukasCuperDT LukasCuperDT force-pushed the Helm_charts_restructure&Pre-Prod_setup branch 6 times, most recently from 5d13bd9 to 2770532 Compare September 26, 2025 09:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants