Skip to content

Commit c87950d

Browse files
committed
update checklist
Signed-off-by: arielev <[email protected]>
1 parent 4c50184 commit c87950d

File tree

3 files changed

+40
-3
lines changed

3 files changed

+40
-3
lines changed

charts/argo-cd/Chart.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ appVersion: v3.2.6
33
kubeVersion: ">=1.25.0-0"
44
description: A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.
55
name: argo-cd
6-
version: 9.3.7
6+
version: 9.3.8
77
home: https://github.com/argoproj/argo-helm
88
icon: https://argo-cd.readthedocs.io/en/stable/assets/logo.png
99
sources:
@@ -26,5 +26,5 @@ annotations:
2626
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
2727
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
2828
artifacthub.io/changes: |
29-
- kind: changed
30-
description: Bump redis_exporter to v1.80.2
29+
- kind: added
30+
description: Add AWS TargetGroupConfiguration support for Gateway API HTTPS backends

charts/argo-cd/README.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1210,6 +1210,11 @@ NAME: my-release
12101210
| server.autoscaling.minReplicas | int | `1` | Minimum number of replicas for the Argo CD server [HPA] |
12111211
| server.autoscaling.targetCPUUtilizationPercentage | int | `50` | Average CPU utilization percentage for the Argo CD server [HPA] |
12121212
| server.autoscaling.targetMemoryUtilizationPercentage | int | `50` | Average memory utilization percentage for the Argo CD server [HPA] |
1213+
| server.aws.targetGroupConfiguration.annotations | object | `{}` | Additional TargetGroupConfiguration annotations |
1214+
| server.aws.targetGroupConfiguration.defaultConfiguration | object | `{}` (See [values.yaml]) | Default target group configuration |
1215+
| server.aws.targetGroupConfiguration.enabled | bool | `false` | Enable TargetGroupConfiguration resource for Argo CD server (AWS Gateway API) |
1216+
| server.aws.targetGroupConfiguration.labels | object | `{}` | Additional TargetGroupConfiguration labels |
1217+
| server.aws.targetGroupConfiguration.routeConfigurations | list | `[]` (See [values.yaml]) | Route-specific configurations |
12131218
| server.backendTLSPolicy.annotations | object | `{}` | Additional BackendTLSPolicy annotations |
12141219
| server.backendTLSPolicy.enabled | bool | `false` | Enable BackendTLSPolicy resource for Argo CD server (Gateway API) |
12151220
| server.backendTLSPolicy.labels | object | `{}` | Additional BackendTLSPolicy labels |

charts/argo-cd/README.md.gotmpl

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,38 @@ server:
329329
wellKnownCACertificates: System
330330
```
331331

332+
#### AWS ALB Gateway API with HTTPS backend
333+
334+
AWS Load Balancer Controller does **NOT** support the standard Gateway API `BackendTLSPolicy`. Instead, use the AWS-specific `TargetGroupConfiguration` CRD for HTTPS backend communication.
335+
336+
> **Note:**
337+
> Reference: [AWS Load Balancer Controller Gateway API documentation](https://kubernetes-sigs.github.io/aws-load-balancer-controller/latest/guide/gateway/l7gateway/)
338+
339+
```yaml
340+
configs:
341+
params:
342+
server.insecure: false # HTTPS backend
343+
344+
server:
345+
httproute:
346+
enabled: true
347+
parentRefs:
348+
- name: example-gateway
349+
namespace: gateway-system
350+
351+
aws:
352+
targetGroupConfiguration:
353+
enabled: true
354+
defaultConfiguration:
355+
protocol: HTTPS
356+
protocolVersion: HTTP1
357+
healthCheck:
358+
protocol: HTTPS
359+
path: /healthz
360+
intervalSeconds: 15
361+
timeoutSeconds: 5
362+
```
363+
332364
## Setting the initial admin password via Argo CD Application CR
333365

334366
> **Note:** When deploying the `argo-cd` chart via an Argo CD `Application` CR, define your bcrypt-hashed admin password under `helm.values`not `helm.parameters`—because Argo CD performs variable substitution on `parameters`, which will mangle any `$…` in your hash.

0 commit comments

Comments
 (0)