Skip to content

Conversation

@cjcocokrisp
Copy link
Contributor

Adds the Kubernetes manifests to expose the webhook feature. Created a service and ingress to expose the webhook server. Environment variables for CLI command flags related to the feature have been added to the container spec in the deployment as well.

One other thing I noticed while testing the manifests was that when using the webhook command the health port was different so it would show up as failed within the cluster. So in the webhook command I realized I never actually set up the health and metrics server due to the webhook server having a health endpoint. So I removed the command flags for that in the webhook command.

…lter deployment env spec to add new cil flags

Signed-off-by: Christopher Coco <[email protected]>

remove flags for health and metrics in webhook server

Signed-off-by: Christopher Coco <[email protected]>
@codecov-commenter
Copy link

codecov-commenter commented Aug 1, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 63.08%. Comparing base (fa2de9b) to head (e900e01).

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #1198      +/-   ##
==========================================
- Coverage   63.10%   63.08%   -0.03%     
==========================================
  Files          23       23              
  Lines        3144     3142       -2     
==========================================
- Hits         1984     1982       -2     
  Misses       1050     1050              
  Partials      110      110              

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@chengfang
Copy link
Collaborator

so with this PR, the new image-updater and service and ingress will always be installed after applying the install manifest file, either if the users do not enable it?

How about not including them in the install, but providing the service and ingress manifests as a reference?

…cd-image-updater-secret

Signed-off-by: Christopher Coco <[email protected]>

make manifests

Signed-off-by: Christopher Coco <[email protected]>
@cjcocokrisp
Copy link
Contributor Author

cjcocokrisp commented Aug 1, 2025

so with this PR, the new image-updater and service and ingress will always be installed after applying the install manifest file, either if the users do not enable it?

How about not including them in the install, but providing the service and ingress manifests as a reference?

Yeah I think this would be a good idea. So should they just be removed from the base kustomization.yaml file? Then mention in the docs that you can find them in the location?

@chengfang
Copy link
Collaborator

yes.

@chengfang chengfang merged commit 9fc3c14 into argoproj-labs:master Aug 4, 2025
11 checks passed
@cjcocokrisp cjcocokrisp deleted the manifests/webhook branch August 4, 2025 13:27
chansuke pushed a commit to chansuke/argocd-image-updater that referenced this pull request Aug 9, 2025
dkarpele pushed a commit to dkarpele/argocd-image-updater that referenced this pull request Aug 10, 2025
Signed-off-by: Christopher Coco <[email protected]>
(cherry picked from commit 9fc3c14)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants