-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support private helm (deps) repositories #36
Comments
I'll have a look at this. We should work out how to support it. I could make ARGOCD_ENV_GIT_ work as alternatives for 2.4. If you can token authenticate with your repo, you could define your repo as https://@/path and I'm pretty sure that would work. It isn't ideal. I will add user+password support though. |
Thanks @Joibel, I ll try your workaround. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Would still like to fix this. |
This would be really useful feature to have. |
@Joibel could you give a more detailed example? I've been trying to configure a remote base for kustomize, to no avail (because local bases don't work). Given a private GitHub repo I've tried a number of different combinations of https with access token and ssh with ssh key, none of them seem to work. Some examples that don't work:
Weirdly enough, Thanks! 🙏🏼 |
|
oh, that won't work for obvious reasons out of the box :( can't really store a token in git, and there is no CI or any scripting in front of it. Maybe some preprocessing would work, but that sounds complicated. Don't you guys have requirements for inclusion of bases? Curious what others are doing and how they're solving this issue. |
I don't use bases myself, no. |
@Tyrion85 One workaround for now would be to download the dependency chart and put in the charts folder. |
The problem with using ArgoCD secrets that it has for access to private repos is that lovely doesn't implement projects, and access to those secrets is guarded by project membership. I'll investigate project detection, but I really suspect this won't work. As a workaround, given that only admins should have access to the application object itself, is to provide to lovely a list of secrets that it may use as secrets for repositories, then we can use argocd's secrets instead of implementing our own. |
Hi, i couldn't find any information about a plugin could access the repository settings. But - just an idea here: maybe it would be possible to use the Argocd "internal" helm integration to pull the charts via the repository settings. |
Also running into this trying to use remote resource bases in a private github repo with kustomize. For other plugins, I've been able to work around this by using a git_askpass script as described here. Basically have a script in a configmap:
and apply patches to the repo server:
And an example cmp that then is able to successfully use kustomize with remote private bases:
I tried throwing the |
So this of course is just a quick change to test with what I already had configured - github creds in a kubernetes secret, askpass script in configmap, all mounted to the repo server. I found that setting |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Poke stalebot |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
How can I connect the plugin to ECR? In my organisation, helm charts and docker images are mirrored in ECR. We also have our own custom charts and docker images. |
Public ECR repositories work. This issue is still open as there is no support for private repos in lovely of any kind. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
There is discussion around a credentials service becoming part of ArgoCD, which would enable this to be implemented. |
We are facing the same issue. We cannot access our Nexus Helm Repositories with this as the credentials are not used |
My use case is to connect to private Artifactory which is the same as everyone above. One thing lovely could possibly do is read from a standard named Kubernetes Secret (Ex: TBH this private repository stuff has been the bane of my existence for the last week. Vanilla applications work but can't be customized (which this plugin does) and kustomization helmCharts can be customzied but don't work with private repositories because credentials can't be set. |
@aguckenber-chwy For our usecase we managed to get rid of lovely for this feature by integrating https://external-secrets.io |
As a side note to future passersby. Came here after argocd-vault-plugin which can't work with builtin helm and force you to do all the helm heavy lifting Now looking at https://external-secrets.io/ too. |
Sadly due to CMP plugin approach, we ended up giving up in favor of external-secrets. |
External secrets is the right answer long term anyway. |
Hello,
looking at the code below, I assume private repositories are not supported
I was wondering if we could provide a limited support by leveraging ArgoCD env variables like: GIT_USERNAME and GIT_PASSWORD, assuming the same credentials for source repo, and all other repo found underneath.
It would work in my case but maybe too limited for community.
++
thanks
The text was updated successfully, but these errors were encountered: