Skip to content

Commit 8fbaf3e

Browse files
committed
feat: Update apiVersion argoproj.io/v1alpha1 to v1beta1 for ArgoCD in docs and tests
Signed-off-by: Oliver Gondža <ogondza@gmail.com>
1 parent 5135028 commit 8fbaf3e

File tree

76 files changed

+133
-135
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+133
-135
lines changed

docs/developer-guide/development.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ For more infomation see [build operator images to test on a cluster.](https://ar
129129

130130
Once the operator is installed, you would need to configure an ArgoCD instance that the operator would manage. The sample instance configuration is below:
131131
``` yaml
132-
apiVersion: argoproj.io/v1alpha1
132+
apiVersion: argoproj.io/v1beta1
133133
kind: ArgoCD
134134
metadata:
135135
name: example-argocd

docs/reference/argocd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ This property maps directly to the `application.instanceLabelKey` field in the `
6060
The following example sets the default value in the `argocd-cm` ConfigMap using the `ApplicationInstanceLabelKey` property on the `ArgoCD` resource.
6161

6262
``` yaml
63-
apiVersion: argoproj.io/v1alpha1
63+
apiVersion: argoproj.io/v1beta1
6464
kind: ArgoCD
6565
metadata:
6666
name: example-argocd

docs/usage/aggregated_roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Using an aggregated cluster role enables users to easily add their own permissio
55
A user can enable creation of aggregated ClusterRole by setting `argocd.spec.aggregatedClusterRoles` field to `true`.
66

77
```yaml
8-
apiVersion: argoproj.io/v1alpha1
8+
apiVersion: argoproj.io/v1beta1
99
kind: ArgoCD
1010
metadata:
1111
name: example-argocd
@@ -121,4 +121,4 @@ rules:
121121

122122
Let's summarize this example. The `argocd-argocd-argocd-application-controller` cluster role inherits permissions from two cluster role which are `argocd-argocd-argocd-application-controller-view` for view permissions and `argocd-argocd-argocd-application-controller-admin` for admin permission. These three are operator managed. Now `argocd-argocd-argocd-application-controller-admin` inherits permissions from `my-cluster-role` which is a user defined cluster role.
123123

124-
For more details on aggregated cluster role, check the [documentation](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles).
124+
For more details on aggregated cluster role, check the [documentation](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles).

docs/usage/apps-in-any-namespace.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ In order to enable this feature, specify the namespaces where Argo CD should man
1515

1616
## Enable application creation in a specific namespace
1717
```yaml
18-
apiVersion: argoproj.io/v1alpha1
18+
apiVersion: argoproj.io/v1beta1
1919
kind: ArgoCD
2020
metadata:
2121
name: example-argocd
@@ -30,7 +30,7 @@ In this example:
3030
## Enable application creation in namespaces matching a glob pattern
3131

3232
```yaml
33-
apiVersion: argoproj.io/v1alpha1
33+
apiVersion: argoproj.io/v1beta1
3434
kind: ArgoCD
3535
metadata:
3636
name: example-argocd-wildcard-pattern
@@ -45,7 +45,7 @@ In this example:
4545
## Enable application creation in all namespaces
4646

4747
```yaml
48-
apiVersion: argoproj.io/v1alpha1
48+
apiVersion: argoproj.io/v1beta1
4949
kind: ArgoCD
5050
metadata:
5151
name: example-argocd-all-namespaces

docs/usage/basics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ See the [ArgoCD Reference][argocd_reference] for the full list of properties and
55
The following example shows the most minimal valid manifest to create a new Argo CD cluster with the default configuration.
66

77
```yaml
8-
apiVersion: argoproj.io/v1alpha1
8+
apiVersion: argoproj.io/v1beta1
99
kind: ArgoCD
1010
metadata:
1111
name: example-argocd

docs/usage/config_management_2.0.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ data:
2828
allowConcurrency: true
2929
lockRepo: true
3030
---
31-
apiVersion: argoproj.io/v1alpha1
31+
apiVersion: argoproj.io/v1beta1
3232
kind: ArgoCD
3333
metadata:
3434
name: example-argocd

docs/usage/custom_roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ as needed and have them applied across all cluster scoped instances. For example
5050
These customized ClusterRoles need to be created and referred in ClusterRoleBinding by admin. A user can disable creation of default ClusterRoles by setting `ArgoCD.Spec.DefaultClusterScopedRoleDisabled` field to `true`.
5151

5252
```yaml
53-
apiVersion: argoproj.io/v1alpha1
53+
apiVersion: argoproj.io/v1beta1
5454
kind: ArgoCD
5555
metadata:
5656
name: example-argocd
@@ -60,4 +60,4 @@ spec:
6060
defaultClusterScopedRoleDisabled: true
6161
```
6262

63-
When `defaultClusterScopedRoleDisabled` is `true`, the default ClusterRole/ClusterRoleBindings for the Argo CD instance will not be created, and the administrative user is free to create and customize these independent of the operator. The field can later be set to `false`, to recreate these resources, if needed.
63+
When `defaultClusterScopedRoleDisabled` is `true`, the default ClusterRole/ClusterRoleBindings for the Argo CD instance will not be created, and the administrative user is free to create and customize these independent of the operator. The field can later be set to `false`, to recreate these resources, if needed.

docs/usage/customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ See [upstream documentation](https://argo-cd.readthedocs.io/en/stable/operator-m
77
Both init containers and volumes can be added to the repo server using the `ArgoCD` custom resource
88

99
```yaml
10-
apiVersion: argoproj.io/v1alpha1
10+
apiVersion: argoproj.io/v1beta1
1111
kind: ArgoCD
1212
metadata:
1313
name: argocd-sample

docs/usage/dex.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Dex configuration has moved to `.spec.sso` in release v0.4.0. Dex can be enabled
2525
An example of correctly configured dex would look as follows:
2626

2727
```yaml
28-
apiVersion: argoproj.io/v1alpha1
28+
apiVersion: argoproj.io/v1beta1
2929
kind: ArgoCD
3030
metadata:
3131
name: example-argocd
@@ -43,7 +43,7 @@ The below section describes how to configure Argo CD SSO using OpenShift connect
4343
The `openShiftOAuth` property can be used to trigger the operator to auto configure the built-in OpenShift OAuth server. The `groups` property is used to mandate users to be part of one or all the groups in the groups list. The RBAC `Policy` property is used to give the admin role in the Argo CD cluster to users in the OpenShift `cluster-admins` group.
4444

4545
``` yaml
46-
apiVersion: argoproj.io/v1alpha1
46+
apiVersion: argoproj.io/v1beta1
4747
kind: ArgoCD
4848
metadata:
4949
name: example-argocd
@@ -88,7 +88,7 @@ You will very likely want to restrict logins to one or more GitHub organization.
8888
`connectors.config.orgs` list, add one or more GitHub organizations. Any member of the org will then be able to login to Argo CD to perform management tasks.
8989

9090
``` yaml
91-
apiVersion: argoproj.io/v1alpha1
91+
apiVersion: argoproj.io/v1beta1
9292
kind: ArgoCD
9393
metadata:
9494
name: example-argocd
@@ -122,7 +122,7 @@ The below section describes how to configure Argo CD's Dex to accept authenticat
122122
In the `sso.dex.env` key, add the environment variable as shown in the [example manifests for authenticating against Argo CD's Dex](https://argoproj.github.io/argo-workflows/argo-server-sso-argocd/#example-manifests-for-authenticating-against-argo-cds-dex-kustomize).
123123

124124
``` yaml
125-
apiVersion: argoproj.io/v1alpha1
125+
apiVersion: argoproj.io/v1beta1
126126
kind: ArgoCD
127127
metadata:
128128
name: example-argocd

docs/usage/extra-config.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ When `ExtraConfig` is set, the entries specified are reconciled to the live Argo
1818
## Example
1919

2020
```yaml
21-
apiVersion: argoproj.io/v1alpha1
21+
apiVersion: argoproj.io/v1beta1
2222
kind: ArgoCD
2323
metadata:
2424
name: example-argocd

0 commit comments

Comments
 (0)