Skip to content

Commit 90c7735

Browse files
committed
Update ArgoCD v1alpha1 ref to v1beta1
Signed-off-by: Siddhesh Ghadi <sghadi1203@gmail.com>
1 parent 648539f commit 90c7735

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

docs/dex_config_guidance.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ The scope of this document is to describe the steps to Install, Configure(Setup
1919
To enable dex, set `.spec.sso.provider` to `dex` & add dex configs under `.spec.sso.dex` fields in ArgoCD CR.
2020

2121
```yaml
22-
apiVersion: argoproj.io/v1alpha1
22+
apiVersion: argoproj.io/v1beta1
2323
kind: ArgoCD
2424
metadata:
2525
name: <argocd-instance-name>
@@ -71,7 +71,7 @@ To enable it, use `.spec.sso.dex.groups` field in ArgoCD CR.
7171
For example, below will give allow only users of `foo` & `bar` group to login into Argo CD via Dex.
7272

7373
```yaml
74-
apiVersion: argoproj.io/v1alpha1
74+
apiVersion: argoproj.io/v1beta1
7575
kind: ArgoCD
7676
metadata:
7777
name: <argocd-instance-name>
@@ -108,7 +108,7 @@ For versions starting v1.10 and above,
108108
This default behavior can be modified by updating the `.spec.rbac.defaultyPolicy` in ArgoCD CR.
109109

110110
```yaml
111-
apiVersion: argoproj.io/v1alpha1
111+
apiVersion: argoproj.io/v1beta1
112112
kind: ArgoCD
113113
metadata:
114114
name: <argocd-instance-name>
@@ -126,7 +126,7 @@ Dex reads the group information of OpenShift users. This allows admin to configu
126126
For example, below will give admin level access to all the users from `foo-admins` OpenShift group.
127127

128128
```yaml
129-
apiVersion: argoproj.io/v1alpha1
129+
apiVersion: argoproj.io/v1beta1
130130
kind: ArgoCD
131131
metadata:
132132
name: <argocd-instance-name>
@@ -148,7 +148,7 @@ It is not recommended to use user level RBAC with OpenShift login as it poses se
148148
For example, below will give admin level access to a user with email `foo@example.com` & user with username `bar`
149149

150150
```yaml
151-
apiVersion: argoproj.io/v1alpha1
151+
apiVersion: argoproj.io/v1beta1
152152
kind: ArgoCD
153153
metadata:
154154
name: <argocd-instance-name>
@@ -174,7 +174,7 @@ Dex container by default gets created with following resource requests and limi
174174
Admin can modify the Dex resource requests/limits by updating `.spec.sso.dex.resources` field in ArgoCD CR.
175175

176176
```yaml
177-
apiVersion: argoproj.io/v1alpha1
177+
apiVersion: argoproj.io/v1beta1
178178
kind: ArgoCD
179179
metadata:
180180
name: <argocd-instance-name>
@@ -204,7 +204,7 @@ oc -n <namespace> patch argocd <argocd-instance-name> --type json -p='[{"op":
204204
Or
205205

206206
```yaml
207-
apiVersion: argoproj.io/v1alpha1
207+
apiVersion: argoproj.io/v1beta1
208208
kind: ArgoCD
209209
metadata:
210210
name: <argocd-instance-name>

docs/rhsso_config_guidance.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The scope of this document is to describe the steps to Install, Configure(**Setu
3636
- For a secure connection, set the value of the `rootCA` parameter as shown in the following example
3737

3838
```yaml
39-
apiVersion: argoproj.io/v1alpha1
39+
apiVersion: argoproj.io/v1beta1
4040
kind: ArgoCD
4141
metadata:
4242
name: <argocd-instance-name>
@@ -52,7 +52,7 @@ The scope of this document is to describe the steps to Install, Configure(**Setu
5252
- For an insecure connection, leave the value of the `rootCA` parameter empty and use the `oidc.tls.insecure.skip.verify` parameter as shown below
5353

5454
```yaml
55-
apiVersion: argoproj.io/v1alpha1
55+
apiVersion: argoproj.io/v1beta1
5656
kind: ArgoCD
5757
metadata:
5858
name: <argocd-instance-name>
@@ -210,7 +210,7 @@ For versions starting v1.10 and above,
210210
This default behavior can be modified by updating the `.spec.rbac.defaultyPolicy` in ArgoCD CR.
211211

212212
```yaml
213-
apiVersion: argoproj.io/v1alpha1
213+
apiVersion: argoproj.io/v1beta1
214214
kind: ArgoCD
215215
metadata:
216216
name: <argocd-instance-name>
@@ -228,7 +228,7 @@ RHSSO reads the group information of OpenShift users. This allows admin to confi
228228
For example, below will give admin level access to all the users from `foo-admins` OpenShift group.
229229

230230
```yaml
231-
apiVersion: argoproj.io/v1alpha1
231+
apiVersion: argoproj.io/v1beta1
232232
kind: ArgoCD
233233
metadata:
234234
name: <argocd-instance-name>
@@ -247,7 +247,7 @@ Admin can control access at individual user level by adding rbac configurations
247247
For example, below will give admin level access to user with email `foo@example.com`.
248248

249249
```yaml
250-
apiVersion: argoproj.io/v1alpha1
250+
apiVersion: argoproj.io/v1beta1
251251
kind: ArgoCD
252252
metadata:
253253
name: <argocd-instance-name>
@@ -274,7 +274,7 @@ RHSSO container by default gets created with following resource requests and li
274274
Admin can modify the RHSSO resource requests/limits by updating `.spec.sso.keycloak.resources` field in ArgoCD CR.
275275

276276
```yaml
277-
apiVersion: argoproj.io/v1alpha1
277+
apiVersion: argoproj.io/v1beta1
278278
kind: ArgoCD
279279
metadata:
280280
name: <argocd-instance-name>
@@ -346,7 +346,7 @@ oc -n <namespace> patch argocd <argocd-instance-name> --type json -p='[{"op":
346346
Or
347347
348348
```yaml
349-
apiVersion: argoproj.io/v1alpha1
349+
apiVersion: argoproj.io/v1beta1
350350
kind: ArgoCD
351351
metadata:
352352
name: <argocd-instance-name>

0 commit comments

Comments
 (0)