Use the clusterAdminAccess setting now to enable the cluster role binding of the applicaitonset controller.

Signed-off-by: Boris Smidt <boris.smidt@restore.eu>

Signed-off-by: Boris Smidt <boris.smidt@restore.eu>
This commit is contained in:
Boris Smidt 2023-08-21 17:11:28 +02:00
parent 05234984e3
commit 3809be02dc
4 changed files with 4 additions and 6 deletions

View file

@ -27,4 +27,4 @@ annotations:
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
artifacthub.io/changes: |
- kind: fixed
description: Add a cluster role to make namespaced application set controller work.
description: clusterAdminAccess now creates a cluster role for thhe applicationset controller to support multiple namespaces

View file

@ -1,5 +1,4 @@
{{- $config := .Values.controller.clusterAdminAccess | default dict -}}
{{- if hasKey $config "enabled" | ternary $config.enabled .Values.createClusterRoles }}
{{- if .Values.createClusterRoles }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:

View file

@ -1,5 +1,4 @@
{{- $config := .Values.controller.clusterAdminAccess | default dict -}}
{{- if hasKey $config "enabled" | ternary $config.enabled .Values.createClusterRoles }}
{{- if .Values.createClusterRoles }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:

View file

@ -1,4 +1,4 @@
{{- $config := .Values.controller.clusterAdminAccess | default dict -}}
{{- $config := .Values.applicationSet.clusterRole | default dict -}}
{{- if hasKey $config "enabled" | ternary $config.enabled .Values.createClusterRoles }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding