mirror of
https://github.com/argoproj/argo-cd.git
synced 2026-02-20 01:28:45 +01:00
docs: fix typos in documentation (#25844)
Signed-off-by: ioleksiuk <ioleksiuk@users.noreply.github.com> Signed-off-by: Illia Oleksiuk <ilya.oleksiuk@gmail.com>
This commit is contained in:
@@ -80,7 +80,7 @@ For additional details, see [architecture overview](operator-manual/architecture
|
||||
* CLI for automation and CI integration
|
||||
* Webhook integration (GitHub, BitBucket, GitLab)
|
||||
* Access tokens for automation
|
||||
* PreSync, Sync, PostSync hooks to support complex application rollouts (e.g.blue/green & canary upgrades)
|
||||
* PreSync, Sync, PostSync hooks to support complex application rollouts (e.g. blue/green & canary upgrades)
|
||||
* Audit trails for application events and API calls
|
||||
* Prometheus metrics
|
||||
* Parameter overrides for overriding helm parameters in Git
|
||||
|
||||
@@ -217,7 +217,7 @@ If you want to access a private repository, you must also provide the credential
|
||||
In case of Bitbucket App Token, go with `bearerToken` section.
|
||||
* `tokenRef`: A `Secret` name and key containing the app token to use for requests.
|
||||
|
||||
In case self-signed BitBucket Server certificates, the following options can be usefully:
|
||||
In case of self-signed BitBucket Server certificates, the following options can be useful:
|
||||
* `insecure`: By default (false) - Skip checking the validity of the SCM's certificate - useful for self-signed TLS certificates.
|
||||
* `caRef`: Optional `ConfigMap` name and key containing the BitBucket server certificates to trust - useful for self-signed TLS certificates. Possibly reference the ArgoCD CM holding the trusted certs.
|
||||
|
||||
|
||||
@@ -221,7 +221,7 @@ If you want to access a private repository, you must also provide the credential
|
||||
In case of Bitbucket App Token, go with `bearerToken` section.
|
||||
* `tokenRef`: A `Secret` name and key containing the app token to use for requests.
|
||||
|
||||
In case self-signed BitBucket Server certificates, the following options can be usefully:
|
||||
In case of self-signed BitBucket Server certificates, the following options can be useful:
|
||||
* `insecure`: By default (false) - Skip checking the validity of the SCM's certificate - useful for self-signed TLS certificates.
|
||||
* `caRef`: Optional `ConfigMap` name and key containing the BitBucket server certificates to trust - useful for self-signed TLS certificates. Possibly reference the ArgoCD CM holding the trusted certs.
|
||||
|
||||
|
||||
@@ -504,7 +504,7 @@ stringData:
|
||||
username: my-username
|
||||
```
|
||||
|
||||
A note on noProxy: Argo CD uses exec to interact with different tools such as helm and kustomize. Not all of these tools support the same noProxy syntax as the [httpproxy go package](https://cs.opensource.google/go/x/net/+/internal-branch.go1.21-vendor:http/httpproxy/proxy.go;l=38-50) does. In case you run in trouble with noProxy not beeing respected you might want to try using the full domain instead of a wildcard pattern or IP range to find a common syntax that all tools support.
|
||||
A note on noProxy: Argo CD uses exec to interact with different tools such as helm and kustomize. Not all of these tools support the same noProxy syntax as the [httpproxy go package](https://cs.opensource.google/go/x/net/+/internal-branch.go1.21-vendor:http/httpproxy/proxy.go;l=38-50) does. In case you run in trouble with noProxy not being respected you might want to try using the full domain instead of a wildcard pattern or IP range to find a common syntax that all tools support.
|
||||
|
||||
## Clusters
|
||||
|
||||
@@ -630,7 +630,7 @@ This setup requires:
|
||||
3. A role created for each cluster being added to Argo CD that is assumable by the Argo CD management role
|
||||
4. An [Access Entry](https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html) within each EKS cluster added to Argo CD that gives the cluster's role (from point 3) RBAC permissions
|
||||
to perform actions within the cluster
|
||||
- Or, alternatively, an entry within the `aws-auth` ConfigMap within the cluster added to Argo CD ([depreciated by EKS](https://docs.aws.amazon.com/eks/latest/userguide/auth-configmap.html))
|
||||
- Or, alternatively, an entry within the `aws-auth` ConfigMap within the cluster added to Argo CD ([deprecated by EKS](https://docs.aws.amazon.com/eks/latest/userguide/auth-configmap.html))
|
||||
|
||||
#### Argo CD Management Role
|
||||
|
||||
@@ -880,7 +880,7 @@ associated EKS cluster.
|
||||
|
||||
**AWS Auth (Deprecated)**
|
||||
|
||||
Instead of using Access Entries, you may need to use the depreciated `aws-auth`.
|
||||
Instead of using Access Entries, you may need to use the deprecated `aws-auth`.
|
||||
|
||||
If so, the `roleARN` of each managed cluster needs to be added to each respective cluster's `aws-auth` config map (see
|
||||
[Enabling IAM principal access to your cluster](https://docs.aws.amazon.com/eks/latest/userguide/add-user-role.html)), as
|
||||
|
||||
@@ -126,7 +126,7 @@ data:
|
||||
|
||||
## Ignoring updates for untracked resources
|
||||
|
||||
ArgoCD will only apply `ignoreResourceUpdates` configuration to tracked resources of an application. This means dependant resources, such as a `ReplicaSet` and `Pod` created by a `Deployment`, will not ignore any updates and trigger a reconcile of the application for any changes.
|
||||
ArgoCD will only apply `ignoreResourceUpdates` configuration to tracked resources of an application. This means dependent resources, such as a `ReplicaSet` and `Pod` created by a `Deployment`, will not ignore any updates and trigger a reconcile of the application for any changes.
|
||||
|
||||
If you want to apply the `ignoreResourceUpdates` configuration to an untracked resource, you can add the
|
||||
`argocd.argoproj.io/ignore-resource-updates=true` annotation in the dependent resources manifest.
|
||||
|
||||
@@ -137,4 +137,4 @@ More info: [RBAC Configuration](../rbac.md)
|
||||
> [!NOTE]
|
||||
> Defining policies are not supported on ArgoCD v2.
|
||||
> To define policies, please [upgrade](../upgrading/overview.md)
|
||||
> to to v3.0.0 or later.
|
||||
> to v3.0.0 or later.
|
||||
|
||||
@@ -55,7 +55,7 @@ to reduce amount of data returned by the API server and improve the UI responsiv
|
||||
**Pagination Cursor**
|
||||
|
||||
It is proposed to add `offset` and `limit` fields for pagination support in Application List API.
|
||||
The The Watch API is a bit more complex. Both Argo CD user interface and CLI are relying on the Watch API to display real time updates of Argo CD applications.
|
||||
The Watch API is a bit more complex. Both Argo CD user interface and CLI are relying on the Watch API to display real time updates of Argo CD applications.
|
||||
The Watch API currently supports filtering by a project and an application name. In order to effectively
|
||||
implement server side pagination for the Watch API we cannot rely on the order of the applications returned by the API server. Instead of
|
||||
relying on the order it is proposed to rely on the application name and use it as a cursor for pagination. Both the Applications List and Watch
|
||||
|
||||
@@ -81,7 +81,7 @@ When you are running `v1.4.x`, you can upgrade to `v1.4.3` by simply changing th
|
||||
tags for `argocd-server`, `argocd-repo-server` and `argocd-controller` to `v1.4.3`.
|
||||
The `v1.4.3` release does not contain additional functional bug fixes.
|
||||
|
||||
Likewise, hen you are running `v1.5.x`, you can upgrade to `v1.5.2` by simply changing
|
||||
Likewise, when you are running `v1.5.x`, you can upgrade to `v1.5.2` by simply changing
|
||||
the image tags for `argocd-server`, `argocd-repo-server` and `argocd-controller` to `v1.5.2`.
|
||||
The `v1.5.2` release does not contain additional functional bug fixes.
|
||||
|
||||
|
||||
@@ -156,7 +156,7 @@ Hooks and resources are assigned to wave zero by default. The wave can be negati
|
||||
|
||||
### Send message to Slack when sync completes
|
||||
|
||||
The following example uses the Slack API to send a a Slack message when sync completes:
|
||||
The following example uses the Slack API to send a Slack message when sync completes:
|
||||
|
||||
```yaml
|
||||
apiVersion: batch/v1
|
||||
|
||||
Reference in New Issue
Block a user