Configure myks with global repoURL pointing to Forgejo, in-cluster destination, and disabled placeholder cluster Secret. Implement App of Apps pattern with a root Application that syncs all child apps. Add argocd-deploy-key-init Job that generates an ed25519 SSH keypair, registers it as a deploy key via Forgejo API, and creates the ArgoCD repository secret with insecure host key verification (avoids chicken-and-egg with ArgoCD managing its own known hosts ConfigMap). Additional changes: - Ignore /status field diffs globally (K8s 1.32 compat) - Add Replace=true sync option on Jobs (immutable resource compat) - Switch job images from bitnami/kubectl to alpine/k8s - Update CLAUDE.md with ArgoCD status and no-bitnami rule Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
34 lines
916 B
YAML
34 lines
916 B
YAML
apiVersion: networking.k8s.io/v1
|
|
kind: Ingress
|
|
metadata:
|
|
annotations:
|
|
a8r.io/repository: ssh://git@git.tr1ceracop.de:222/gitea_admin/k8s-and-chill.git
|
|
cert-manager.io/cluster-issuer: letsencrypt
|
|
labels:
|
|
app.kubernetes.io/component: server
|
|
app.kubernetes.io/instance: argo-cd
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: argocd-server
|
|
app.kubernetes.io/part-of: argocd
|
|
app.kubernetes.io/version: v2.14.10
|
|
helm.sh/chart: argo-cd-7.8.26
|
|
name: argo-cd-argocd-server
|
|
namespace: argocd
|
|
spec:
|
|
ingressClassName: traefik
|
|
rules:
|
|
- host: argocd.tr1ceracop.de
|
|
http:
|
|
paths:
|
|
- backend:
|
|
service:
|
|
name: argo-cd-argocd-server
|
|
port:
|
|
number: 80
|
|
path: /
|
|
pathType: Prefix
|
|
tls:
|
|
- hosts:
|
|
- argocd.tr1ceracop.de
|
|
secretName: argocd-server-tls
|