@@ -6,48 +6,44 @@ argocd:
66 releaseName : argocd
77 defaultVersion : " 7.7.8"
88 chartRepository : " https://argoproj.github.io/argo-helm"
9+ additionalResources :
10+ path : " charts/argocd-ingress"
11+ type : " ingress"
12+ helm :
13+ releaseName : ingress
14+ valuesObject :
15+ ingressClass :
16+ useAutomode : ' {{default "false" (index .metadata.annotations "enable_automode")}}'
17+ ingress :
18+ domain : ' {{default "" (index .metadata.annotations "argocd_dns")}}'
19+ privateCertificate : ' {{default "" (index .metadata.annotations "argocd_ingress_certificate")}}'
20+ rules :
21+ - host : ' {{default "argocd.example.com" (index .metadata.annotations "argocd_dns")}}'
922 selector :
1023 matchExpressions :
1124 - key : enable_argocd
1225 operator : In
13- values : ['true']
14- route53-chart :
15- enabled : true
16- enableAckPodIdentity : false
17- namespace : ack-system
18- chartName : route53-chart
19- defaultVersion : " 0.0.20"
20- chartNamespace : aws-controllers-k8s
21- chartRepository : public.ecr.aws
22- selector :
23- matchExpressions :
24- - key : enable_route53_controller
25- operator : In
26- values : ['true']
26+ values : ["true"]
2727 valuesObject :
28- aws :
29- region : ' {{.metadata.annotations.aws_region}}'
30- serviceAccount :
31- name : ' route53-controller'
32- annotations :
33- eks.amazonaws.com/role-arn : ' {{default "" (index .metadata.annotations "ack_route53_controller_role_arn")}}'
28+ global :
29+ domain : ' {{default "" (index .metadata.annotations "argocd_dns")}}'
3430external-secrets :
3531 enabled : true
3632 enableAckPodIdentity : false
3733 namespace : external-secrets
3834 chartName : external-secrets
39- defaultVersion : " 0.10.3 "
35+ defaultVersion : " 0.17.0 "
4036 chartRepository : " https://charts.external-secrets.io"
4137 additionalResources :
4238 path : " charts/fleet-secret"
4339 type : " ecr-token"
4440 helm :
45- releaseName : ecr-token
41+ releaseName : ecr-token
4642 selector :
4743 matchExpressions :
4844 - key : enable_external_secrets
4945 operator : In
50- values : [' true' ]
46+ values : [" true" ]
5147 valuesObject :
5248 serviceAccount :
5349 name : " external-secrets-sa"
@@ -63,22 +59,22 @@ aws-load-balancer-controller:
6359 matchExpressions :
6460 - key : enable_aws_load_balancer_controller
6561 operator : In
66- values : [' true' ]
62+ values : [" true" ]
6763 valuesObject :
6864 serviceAccount :
69- name : " aws-load-balancer-controller-sa"
70- vpcId : ' {{.metadata.annotations.aws_vpc_id}}'
71- clusterName : ' {{.name}}'
65+ name : " aws-load-balancer-controller-sa"
66+ vpcId : " {{.metadata.annotations.aws_vpc_id}}"
67+ clusterName : " {{.name}}"
7268 ignoreDifferences :
7369 - kind : Secret
7470 name : aws-load-balancer-tls
7571 jsonPointers : [/data]
7672 - group : admissionregistration.k8s.io
7773 kind : MutatingWebhookConfiguration
78- jqPathExpressions : [' .webhooks[].clientConfig.caBundle' ]
74+ jqPathExpressions : [" .webhooks[].clientConfig.caBundle" ]
7975 - group : admissionregistration.k8s.io
8076 kind : ValidatingWebhookConfiguration
81- jqPathExpressions : [' .webhooks[].clientConfig.caBundle' ]
77+ jqPathExpressions : [" .webhooks[].clientConfig.caBundle" ]
8278metrics-server :
8379 enabled : true
8480 enableAckPodIdentity : false
@@ -89,12 +85,12 @@ metrics-server:
8985 matchExpressions :
9086 - key : enable_metrics_server
9187 operator : In
92- values : [' true' ]
88+ values : [" true" ]
9389karpenter :
9490 enabled : false
9591 enableAckPodIdentity : false
9692 releaseName : karpenter
97- namespace : ' kube-system'
93+ namespace : " kube-system"
9894 chartNamespace : karpenter
9995 chartName : karpenter
10096 chartRepository : public.ecr.aws
@@ -103,10 +99,10 @@ karpenter:
10399 matchExpressions :
104100 - key : enable_karpenter
105101 operator : In
106- values : [' true' ]
102+ values : [" true" ]
107103 valuesObject :
108104 settings :
109- clusterName : ' {{.metadata.annotations.aws_cluster_name}}'
105+ clusterName : " {{.metadata.annotations.aws_cluster_name}}"
110106 interruptionQueue : ' {{default "" (index .metadata.annotations "karpenter_sqs_queue_name")}}'
111107 serviceAccount :
112108 name : ' {{default "karpenter" (index .metadata.annotations "karpenter_service_account")}}'
@@ -124,7 +120,7 @@ aws_efs_csi_driver:
124120 matchExpressions :
125121 - key : enable_aws_efs_csi_driver
126122 operator : In
127- values : [' true' ]
123+ values : [" true" ]
128124 valuesObject :
129125 controller :
130126 serviceAccount :
@@ -148,7 +144,7 @@ cert_manager:
148144 matchExpressions :
149145 - key : enable_cert_manager
150146 operator : In
151- values : [' true' ]
147+ values : [" true" ]
152148 valuesObject :
153149 installCRDs : true
154150 serviceAccount :
@@ -162,19 +158,18 @@ external-dns:
162158 namespace : ' {{default "external-dns" (index .metadata.annotations "external_dns_namespace") }}'
163159 chartName : external-dns
164160 chartRepository : https://kubernetes-sigs.github.io/external-dns
165- defaultVersion : " 1.14.3 "
161+ defaultVersion : " 1.16.1 "
166162 selector :
167163 matchExpressions :
168164 - key : enable_external_dns
169165 operator : In
170- values : [' true' ]
166+ values : [" true" ]
171167 valuesObject :
172168 provider : aws
173169 serviceAccount :
174170 name : ' {{default "" (index .metadata.annotations "external_dns_service_account") }}'
175171 annotations :
176- eks.amazonaws.com/role-arn : ' {{default "" (index .metadata.annotations "external_dns_iam_role_arn") }}'
177- domainFilters : ' {{.metadata.annotations.external_dns_domain_filters}}'
178- txtOwnerId : ' {{.metadata.annotations.aws_cluster_name}}'
179- policy : ' {{default "upsert-only" .metadata.annotations.external_dns_policy}}'
180- extraArgs : ' {{default "[]" .metadata.annotations.external_dns_extra_args}}'
172+ eks.amazonaws.com/role-arn : ' {{default "" (index .metadata.annotations "external_dns_iam_role_arn")}}'
173+ domainFilters : ["{{.metadata.annotations.external_dns_domain_filters}}"]
174+ txtOwnerId : " {{.metadata.annotations.aws_cluster_name}}"
175+ policy : ' {{default "upsert-only" (index .metadata.annotations "external_dns_policy")}}'
0 commit comments