forked from argoproj/argo-cd
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
docs: remove version notes - rely on docs versioning (argoproj#10338)
Signed-off-by: CI <[email protected]> Signed-off-by: CI <[email protected]>
- Loading branch information
1 parent
4719ca7
commit 73ccf16
Showing
9 changed files
with
2 additions
and
46 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -22,8 +22,6 @@ argocd repo add https://github.com/argoproj/argocd-example-apps --username <user | |
|
||
or UI: | ||
|
||
> v1.2 or later | ||
1. Navigate to `Settings/Repositories` | ||
|
||
![connect repo overview](../assets/repo-add-overview.png) | ||
|
@@ -59,8 +57,6 @@ Then, connect the repository using any non-empty string as username and the acce | |
|
||
### TLS Client Certificates for HTTPS repositories | ||
|
||
> v1.2 and later | ||
If your repository server requires you to use TLS client certificates for authentication, you can configure ArgoCD repositories to make use of them. For this purpose, `--tls-client-cert-path` and `--tls-client-cert-key-path` switches to the `argocd repo add` command can be used to specify the files on your local system containing client certificate and the corresponding key, respectively: | ||
|
||
``` | ||
|
@@ -81,8 +77,6 @@ Your TLS client certificate and corresponding key can also be configured using t | |
|
||
Private repositories that require an SSH private key have a URL that typically start with `git@` or `ssh://` rather than `https://`. | ||
|
||
> v1.2 or later | ||
You can configure your Git repository using SSH either using the CLI or the UI. | ||
|
||
!!! note | ||
|
@@ -130,12 +124,6 @@ Private repositories that are hosted on GitHub.com or GitHub Enterprise can be a | |
!!!note | ||
Ensure your application has at least `Read-only` permissions to the `Contents` of the repository. This is the minimum requirement. | ||
|
||
> previous to v1.9 | ||
GitHub App credentials are not supported. | ||
|
||
> v1.9 or later | ||
You can configure access to your Git repository hosted by GitHub.com or GitHub Enterprise using the GitHub App method by either using the CLI or the UI. | ||
|
||
Using the CLI: | ||
|
@@ -161,12 +149,6 @@ Using the UI: | |
|
||
## Credential templates | ||
|
||
> previous to v1.4 | ||
Credential templates are available only via declarative setup, see [Repository credentials](../../operator-manual/declarative-setup#repository-credentials) in Operator Manual. | ||
|
||
> v1.4 and later | ||
You can also set up credentials to serve as templates for connecting repositories, without having to repeat credential configuration. For example, if you setup credential templates for the URL prefix `https://github.com/argoproj`, these credentials will be used for all repositories with this URL as prefix (e.g. `https://github.com/argoproj/argocd-example-apps`) that do not have their own credentials configured. | ||
|
||
To set up a credential template using the Web UI, simply fill in all relevant credential information in the __Connect repo using SSH__ or __Connect repo using HTTPS__ dialogues (as described above), but select __Save as credential template__ instead of __Connect__ to save the credential template. Be sure to only enter the prefix URL (i.e. `https://github.com/argoproj`) instead of the complete repository URL (i.e. `https://github.com/argoproj/argocd-example-apps`) in the field __Repository URL__ | ||
|
@@ -208,8 +190,6 @@ FATA[0000] rpc error: code = Unknown desc = authentication required | |
|
||
## Self-signed & Untrusted TLS Certificates | ||
|
||
> v1.2 or later | ||
If you are connecting a repository on a HTTPS server using a self-signed certificate, or a certificate signed by a custom Certificate Authority (CA) which are not known to ArgoCD, the repository will not be added due to security reasons. This is indicated by an error message such as `x509: certificate signed by unknown authority`. | ||
|
||
1. You can let ArgoCD connect the repository in an insecure way, without verifying the server's certificate at all. This can be accomplished by using the `--insecure-skip-server-verification` flag when adding the repository with the `argocd` CLI utility. However, this should be done only for non-production setups, as it imposes a serious security issue through possible man-in-the-middle attacks. | ||
|
@@ -298,8 +278,6 @@ As a work-around, you can customize your Argo CD image. See [#1344](https://gith | |
|
||
If you are using a privately hosted Git service over SSH, then you have the following options: | ||
|
||
> v1.2 or later | ||
1. You can let ArgoCD connect the repository in an insecure way, without verifying the server's SSH host key at all. This can be accomplished by using the `--insecure-skip-server-verification` flag when adding the repository with the `argocd` CLI utility. However, this should be done only for non-production setups, as it imposes a serious security issue through possible man-in-the-middle attacks. | ||
|
||
2. You can make the server's SSH public key known to ArgoCD by using the `cert add-ssh` command of the `argocd` CLI utility. This is the recommended method and suitable for production use. In order to do so, you will need the server's SSH public host key, in the `known_hosts` format understood by `ssh`. You can get the server's public SSH host key e.g. by using the `ssh-keyscan` utility. | ||
|
@@ -398,8 +376,6 @@ argocd repo add [email protected]:argoproj/argocd-example-apps.git --ssh-private-ke | |
|
||
## Git Submodules | ||
|
||
> v1.4 or later | ||
Submodules are supported and will be picked up automatically. If the submodule repository requires authentication then the credentials will need to match the credentials of the parent repository. Set ARGOCD_GIT_MODULES_ENABLED=false to disable submodule support | ||
|
||
## Declarative Configuration | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters