Merge branch 'master' into master

This commit is contained in:
Nicholas Lockhart 2020-05-07 15:27:05 -04:00 committed by GitHub
commit 4a0002c25c
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
21 changed files with 187 additions and 39 deletions

1
.gitignore vendored
View file

@ -1,4 +1,5 @@
output output
.vscode .vscode
.DS_Store .DS_Store
.idea
**/*.tgz **/*.tgz

View file

@ -7,7 +7,7 @@
/charts/argo-events @jbehling /charts/argo-events @jbehling
# Argo Workflows # Argo Workflows
/charts/argo @benjaminws /charts/argo @benjaminws @stefansedich @paguos
# Argo Rollouts # Argo Rollouts
/charts/argo-rollouts @cabrinha /charts/argo-rollouts @cabrinha

View file

@ -1,8 +1,8 @@
apiVersion: v1 apiVersion: v1
appVersion: "1.5.2" appVersion: "1.5.4"
description: A Helm chart for ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes. description: A Helm chart for ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes.
name: argo-cd name: argo-cd
version: 2.2.8 version: 2.3.0
home: https://github.com/argoproj/argo-helm home: https://github.com/argoproj/argo-helm
icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png
keywords: keywords:

View file

@ -19,9 +19,8 @@ This chart currently installs the non-HA version of ArgoCD.
`controller.extraArgs`, `repoServer.extraArgs` and `server.extraArgs` are not arrays of strings intead of a map `controller.extraArgs`, `repoServer.extraArgs` and `server.extraArgs` are not arrays of strings intead of a map
What was What was
```yaml ```yaml
controller: server:
extraArgs: extraArgs:
insecure: "" insecure: ""
``` ```
@ -29,7 +28,7 @@ controller:
is now is now
```yaml ```yaml
controller: server:
extraArgs: extraArgs:
- --insecure - --insecure
``` ```
@ -63,7 +62,7 @@ Helm v3 has removed the `install-crds` hook so CRDs are now populated by files i
|-----|------|---------| |-----|------|---------|
| global.image.imagePullPolicy | If defined, a imagePullPolicy applied to all ArgoCD deployments. | `"IfNotPresent"` | | global.image.imagePullPolicy | If defined, a imagePullPolicy applied to all ArgoCD deployments. | `"IfNotPresent"` |
| global.image.repository | If defined, a repository applied to all ArgoCD deployments. | `"argoproj/argocd"` | | global.image.repository | If defined, a repository applied to all ArgoCD deployments. | `"argoproj/argocd"` |
| global.image.tag | If defined, a tag applied to all ArgoCD deployments. | `"v1.5.2"` | | global.image.tag | If defined, a tag applied to all ArgoCD deployments. | `"v1.5.3"` |
| global.securityContext | Toggle and define securityContext | See [values.yaml](values.yaml) | | global.securityContext | Toggle and define securityContext | See [values.yaml](values.yaml) |
| global.imagePullSecrets | If defined, uses a Secret to pull an image from a private Docker registry or repository. | `[]` | | global.imagePullSecrets | If defined, uses a Secret to pull an image from a private Docker registry or repository. | `[]` |
| global.hostAliases | Mapping between IP and hostnames that will be injected as entries in the pod's hosts files | `[]` | | global.hostAliases | Mapping between IP and hostnames that will be injected as entries in the pod's hosts files | `[]` |
@ -71,7 +70,7 @@ Helm v3 has removed the `install-crds` hook so CRDs are now populated by files i
| installCRDs | Install CRDs if you are using Helm2. | `true` | | installCRDs | Install CRDs if you are using Helm2. | `true` |
| configs.knownHosts.data.ssh_known_hosts | Known Hosts | See [values.yaml](values.yaml) | | configs.knownHosts.data.ssh_known_hosts | Known Hosts | See [values.yaml](values.yaml) |
| configs.secret.annotations | Annotations for argocd-secret | `{}` | | configs.secret.annotations | Annotations for argocd-secret | `{}` |
| configs.secret.argocdServerAdminPassword | Admin password | `null` | | configs.secret.argocdServerAdminPassword | Bcrypt hashed admin password | `null` |
| configs.secret.argocdServerAdminPasswordMtime | Admin password modification time | `date "2006-01-02T15:04:05Z" now` if configs.secret.argocdServerAdminPassword is set | | configs.secret.argocdServerAdminPasswordMtime | Admin password modification time | `date "2006-01-02T15:04:05Z" now` if configs.secret.argocdServerAdminPassword is set |
| configs.secret.bitbucketSecret | BitBucket incoming webhook secret | `""` | | configs.secret.bitbucketSecret | BitBucket incoming webhook secret | `""` |
| configs.secret.createSecret | Create the argocd-secret. | `true` | | configs.secret.createSecret | Create the argocd-secret. | `true` |
@ -79,6 +78,7 @@ Helm v3 has removed the `install-crds` hook so CRDs are now populated by files i
| configs.secret.gitlabSecret | GitLab incoming webhook secret | `""` | | configs.secret.gitlabSecret | GitLab incoming webhook secret | `""` |
| configs.tlsCerts.data."argocd.example.com" | TLS certificate | See [values.yaml](values.yaml) | | configs.tlsCerts.data."argocd.example.com" | TLS certificate | See [values.yaml](values.yaml) |
| configs.secret.extra | add additional secrets to be added to argocd-secret | `{}` | | configs.secret.extra | add additional secrets to be added to argocd-secret | `{}` |
| openshift.enabled | enables using arbitrary uid for argo repo server | `false` |
## ArgoCD Controller ## ArgoCD Controller
@ -183,6 +183,8 @@ Helm v3 has removed the `install-crds` hook so CRDs are now populated by files i
| server.autoscaling.maxReplicas | Maximum number of replicas for the server [HPA](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/) | `5` | | server.autoscaling.maxReplicas | Maximum number of replicas for the server [HPA](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/) | `5` |
| server.autoscaling.targetCPUUtilizationPercentage | Average CPU utilization percentage for the server [HPA](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/) | `50` | | server.autoscaling.targetCPUUtilizationPercentage | Average CPU utilization percentage for the server [HPA](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/) | `50` |
| server.autoscaling.targetMemoryUtilizationPercentage | Average memory utilization percentage for the server [HPA](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/) | `50` | | server.autoscaling.targetMemoryUtilizationPercentage | Average memory utilization percentage for the server [HPA](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/) | `50` |
| server.GKEbackendConfig.enabled | Enable BackendConfig custom resource for Google Kubernetes Engine. | `false` |
| server.GKEbackendConfig.spec | [BackendConfigSpec](https://cloud.google.com/kubernetes-engine/docs/concepts/backendconfig#backendconfigspec_v1beta1_cloudgooglecom) | `{}` |
| server.certificate.additionalHosts | Certificate manager additional hosts | `[]` | | server.certificate.additionalHosts | Certificate manager additional hosts | `[]` |
| server.certificate.domain | Certificate manager domain | `"argocd.example.com"` | | server.certificate.domain | Certificate manager domain | `"argocd.example.com"` |
| server.certificate.enabled | Enables a certificate manager certificate. | `false` | | server.certificate.enabled | Enables a certificate manager certificate. | `false` |
@ -231,6 +233,8 @@ Helm v3 has removed the `install-crds` hook so CRDs are now populated by files i
| server.service.labels | Server service labels | `{}` | | server.service.labels | Server service labels | `{}` |
| server.service.servicePortHttp | Server service http port | `80` | | server.service.servicePortHttp | Server service http port | `80` |
| server.service.servicePortHttps | Server service https port | `443` | | server.service.servicePortHttps | Server service https port | `443` |
| server.service.servicePortHttpName | Server service http port name, can be used to route traffic via istio | `http` |
| server.service.servicePortHttpsName | Server service https port name, can be used to route traffic via istio | `https` |
| server.service.loadBalancerSourceRanges | Source IP ranges to allow access to service from. | `[]` | | server.service.loadBalancerSourceRanges | Source IP ranges to allow access to service from. | `[]` |
| server.service.type | Server service type | `"ClusterIP"` | | server.service.type | Server service type | `"ClusterIP"` |
| server.serviceAccount.create | Create server service account | `true` | | server.serviceAccount.create | Create server service account | `true` |

View file

@ -52,10 +52,10 @@ spec:
image: {{ default .Values.global.image.repository .Values.repoServer.image.repository }}:{{ default .Values.global.image.tag .Values.repoServer.image.tag }} image: {{ default .Values.global.image.repository .Values.repoServer.image.repository }}:{{ default .Values.global.image.tag .Values.repoServer.image.tag }}
imagePullPolicy: {{ default .Values.global.image.imagePullPolicy .Values.repoServer.image.imagePullPolicy }} imagePullPolicy: {{ default .Values.global.image.imagePullPolicy .Values.repoServer.image.imagePullPolicy }}
command: command:
- argocd-repo-server
{{- if .Values.openshift.enabled }} {{- if .Values.openshift.enabled }}
- uid_entrypoint.sh - uid_entrypoint.sh
{{- end }} {{- end }}
- argocd-repo-server
{{- if or (and .Values.redis.enabled (not $redisHa.enabled)) (and $redisHa.enabled $redisHa.haproxy.enabled) }} {{- if or (and .Values.redis.enabled (not $redisHa.enabled)) (and $redisHa.enabled $redisHa.haproxy.enabled) }}
- --redis - --redis
- {{ template "argo-cd.redis.fullname" . }}:{{ .Values.redis.servicePort }} - {{ template "argo-cd.redis.fullname" . }}:{{ .Values.redis.servicePort }}

View file

@ -0,0 +1,15 @@
{{- if .Values.server.GKEbackendConfig.enabled }}
apiVersion: cloud.google.com/v1beta1
kind: BackendConfig
metadata:
name: {{ template "argo-cd.server.fullname" . }}
labels:
app.kubernetes.io/name: {{ include "argo-cd.name" . }}-{{ .Values.server.name }}
helm.sh/chart: {{ include "argo-cd.chart" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
app.kubernetes.io/managed-by: {{ .Release.Service }}
app.kubernetes.io/part-of: argocd
app.kubernetes.io/component: {{ .Values.server.name }}
spec:
{{- toYaml .Values.server.GKEbackendConfig.spec | nindent 2 }}
{{- end }}

View file

@ -33,6 +33,10 @@ items:
{{- if .namespaceResourceBlacklist }} {{- if .namespaceResourceBlacklist }}
namespaceResourceBlacklist: namespaceResourceBlacklist:
{{- toYaml .namespaceResourceBlacklist | nindent 8 }} {{- toYaml .namespaceResourceBlacklist | nindent 8 }}
{{- end }}
{{- if .namespaceResourceWhitelist }}
namespaceResourceWhitelist:
{{- toYaml .namespaceResourceWhitelist | nindent 8 }}
{{- end }} {{- end }}
{{- if .orphanedResources }} {{- if .orphanedResources }}
orphanedResources: orphanedResources:

View file

@ -21,11 +21,11 @@ metadata:
spec: spec:
type: {{ .Values.server.service.type }} type: {{ .Values.server.service.type }}
ports: ports:
- name: http - name: {{ .Values.server.service.servicePortHttpName }}
protocol: TCP protocol: TCP
port: {{ .Values.server.service.servicePortHttp }} port: {{ .Values.server.service.servicePortHttp }}
targetPort: {{ .Values.server.name }} targetPort: {{ .Values.server.name }}
- name: https - name: {{ .Values.server.service.servicePortHttpsName }}
protocol: TCP protocol: TCP
port: {{ .Values.server.service.servicePortHttps }} port: {{ .Values.server.service.servicePortHttps }}
targetPort: {{ .Values.server.name }} targetPort: {{ .Values.server.name }}

View file

@ -10,7 +10,7 @@ installCRDs: true
global: global:
image: image:
repository: argoproj/argocd repository: argoproj/argocd
tag: v1.5.2 tag: v1.5.4
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
securityContext: {} securityContext: {}
# runAsUser: 999 # runAsUser: 999
@ -28,7 +28,7 @@ controller:
image: image:
repository: # argoproj/argocd repository: # argoproj/argocd
tag: # v1.5.2 tag: # v1.5.4
imagePullPolicy: # IfNotPresent imagePullPolicy: # IfNotPresent
## Argo controller commandline flags ## Argo controller commandline flags
@ -319,7 +319,7 @@ server:
image: image:
repository: # argoproj/argocd repository: # argoproj/argocd
tag: # v1.5.2 tag: # v1.5.4
imagePullPolicy: # IfNotPresent imagePullPolicy: # IfNotPresent
## Additional command line arguments to pass to argocd-server ## Additional command line arguments to pass to argocd-server
@ -404,6 +404,8 @@ server:
type: ClusterIP type: ClusterIP
servicePortHttp: 80 servicePortHttp: 80
servicePortHttps: 443 servicePortHttps: 443
servicePortHttpName: http
servicePortHttpsName: https
loadBalancerIP: "" loadBalancerIP: ""
loadBalancerSourceRanges: [] loadBalancerSourceRanges: []
@ -553,6 +555,11 @@ server:
# kind: NetworkPolicy # kind: NetworkPolicy
# orphanedResources: {} # orphanedResources: {}
# roles: [] # roles: []
# namespaceResourceWhitelist:
# - group: 'apps'
# kind: Deployment
# - group: 'apps'
# kind: StatefulSet
# orphanedResources: {} # orphanedResources: {}
# roles: [] # roles: []
@ -561,6 +568,16 @@ server:
clusterAdminAccess: clusterAdminAccess:
enabled: true enabled: true
## Enable BackendConfig custom resource for Google Kubernetes Engine
GKEbackendConfig:
enabled: false
spec: {}
# spec:
# iap:
# enabled: true
# oauthclientCredentials:
# secretName: argocd-secret
## Repo Server ## Repo Server
repoServer: repoServer:
name: repo-server name: repo-server
@ -576,7 +593,7 @@ repoServer:
image: image:
repository: # argoproj/argocd repository: # argoproj/argocd
tag: # v1.5.2 tag: # v1.5.4
imagePullPolicy: # IfNotPresent imagePullPolicy: # IfNotPresent
## Additional command line arguments to pass to argocd-repo-server ## Additional command line arguments to pass to argocd-repo-server

View file

@ -1,8 +1,8 @@
apiVersion: v1 apiVersion: v1
appVersion: "v2.6.1" appVersion: "v2.7.6"
description: A Helm chart for Argo Workflows description: A Helm chart for Argo Workflows
name: argo name: argo
version: 0.7.5 version: 0.8.5
icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png
home: https://github.com/argoproj/argo-helm home: https://github.com/argoproj/argo-helm
maintainers: maintainers:

View file

@ -1,8 +1,14 @@
{{- if .Values.server.enabled }} {{- if .Values.server.enabled }}
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }}
kind: Role
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name }}-role
{{ else }}
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: {{ .Release.Name }}-{{ .Values.server.name }}-cluster-role name: {{ .Release.Name }}-{{ .Values.server.name }}-cluster-role
{{- end }}
rules: rules:
- apiGroups: - apiGroups:
- "" - ""
@ -28,12 +34,24 @@ rules:
- get - get
- list - list
- watch - watch
- delete
{{- if .Values.controller.persistence }}
- apiGroups: - apiGroups:
- "" - ""
resources: resources:
- secrets - secrets
resourceNames:
{{- if .Values.controller.persistence.postgresql }}
- {{ .Values.controller.persistence.postgresql.userNameSecret.name }}
- {{ .Values.controller.persistence.postgresql.passwordSecret.name }}
{{- end}}
{{- if .Values.controller.persistence.mysql }}
- {{ .Values.controller.persistence.mysql.userNameSecret.name }}
- {{ .Values.controller.persistence.mysql.passwordSecret.name }}
{{- end}}
verbs: verbs:
- get - get
{{- end}}
- apiGroups: - apiGroups:
- argoproj.io - argoproj.io
resources: resources:

View file

@ -1,12 +1,23 @@
{{- if .Values.server.enabled -}} {{- if .Values.server.enabled -}}
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }}
kind: RoleBinding
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}-rb
{{ else }}
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}-crb name: {{ .Release.Name }}-{{ .Values.server.name}}-crb
{{- end }}
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
{{- if .Values.singleNamespace }}
kind: Role
name: {{ .Release.Name }}-{{ .Values.server.name}}-role
{{ else }}
kind: ClusterRole kind: ClusterRole
name: {{ .Release.Name }}-{{ .Values.server.name}}-cluster-role name: {{ .Release.Name }}-{{ .Values.server.name}}-cluster-role
{{- end }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ .Values.server.serviceAccount }} name: {{ .Values.server.serviceAccount }}

View file

@ -1,5 +1,5 @@
{{- if .Values.server.enabled -}}
{{- if .Values.server.enabled -}}apiVersion: apps/v1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}} name: {{ .Release.Name }}-{{ .Values.server.name}}
@ -13,7 +13,6 @@ spec:
matchLabels: matchLabels:
app: {{ .Release.Name }}-{{ .Values.server.name}} app: {{ .Release.Name }}-{{ .Values.server.name}}
release: {{ .Release.Name }} release: {{ .Release.Name }}
app: {{ .Release.Name }}-{{ .Values.server.name}}
template: template:
metadata: metadata:
labels: labels:
@ -31,16 +30,20 @@ spec:
- name: argo-server - name: argo-server
args: args:
- server - server
- --configmap={{ .Release.Name }}-{{ .Values.controller.name }}-configmap
{{- if .Values.server.extraArgs }} {{- if .Values.server.extraArgs }}
{{- toYaml .Values.server.extraArgs | nindent 10 }} {{- toYaml .Values.server.extraArgs | nindent 10 }}
{{- end }} {{- end }}
{{- if .Values.singleNamespace }}
- "--namespaced"
{{- end }}
image: "{{ .Values.images.namespace }}/{{ .Values.images.server }}:{{ default .Values.images.tag .Values.server.image.tag }}" image: "{{ .Values.images.namespace }}/{{ .Values.images.server }}:{{ default .Values.images.tag .Values.server.image.tag }}"
imagePullPolicy: {{ .Values.images.pullPolicy }} imagePullPolicy: {{ .Values.images.pullPolicy }}
{{- if .Values.server.podPortName }} {{- if .Values.server.podPortName }}
ports: ports:
- name: {{ .Values.server.podPortName }} - name: {{ .Values.server.podPortName }}
ports:
containerPort: 2746 containerPort: 2746
{{- end }}
readinessProbe: readinessProbe:
httpGet: httpGet:
path: / path: /
@ -48,12 +51,7 @@ spec:
scheme: HTTP scheme: HTTP
initialDelaySeconds: 10 initialDelaySeconds: 10
periodSeconds: 20 periodSeconds: 20
{{- end }}
env: env:
{{- if .Values.server.forceNamespaceIsolation }}
- name: FORCE_NAMESPACE_ISOLATION
value: "true"
{{- end }}
- name: IN_CLUSTER - name: IN_CLUSTER
value: "true" value: "true"
- name: ARGO_NAMESPACE - name: ARGO_NAMESPACE

View file

@ -24,6 +24,13 @@ spec:
- host: {{ . }} - host: {{ . }}
http: http:
paths: paths:
{{- if $.Values.server.ingress.paths }}
{{- range $.Values.server.ingress.paths }}
- backend:
serviceName: {{ .serviceName }}
servicePort: {{ .servicePort }}
{{- end }}
{{- end }}
- backend: - backend:
serviceName: {{ $serviceName }} serviceName: {{ $serviceName }}
servicePort: {{ $servicePort }} servicePort: {{ $servicePort }}

View file

@ -3,4 +3,6 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{ .Values.server.serviceAccount }} name: {{ .Values.server.serviceAccount }}
annotations:
{{ toYaml .Values.server.serviceAccountAnnotations | indent 4 }}
{{- end -}} {{- end -}}

View file

@ -1,7 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }}
kind: Role
metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name }}-role
{{ else }}
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name }}-cluster-role name: {{ .Release.Name }}-{{ .Values.controller.name }}-cluster-role
{{- end }}
rules: rules:
- apiGroups: - apiGroups:
- "" - ""
@ -78,4 +84,22 @@ rules:
verbs: verbs:
- get - get
- list - list
{{- if .Values.controller.persistence }}
- apiGroups:
- ""
resources:
- secrets
resourceNames:
{{- if .Values.controller.persistence.postgresql }}
- {{ .Values.controller.persistence.postgresql.userNameSecret.name }}
- {{ .Values.controller.persistence.postgresql.passwordSecret.name }}
{{- end}}
{{- if .Values.controller.persistence.mysql }}
- {{ .Values.controller.persistence.mysql.userNameSecret.name }}
- {{ .Values.controller.persistence.mysql.passwordSecret.name }}
{{- end}}
verbs:
- get
{{- end}}

View file

@ -16,6 +16,11 @@ data:
{{- end }} {{- end }}
{{- end }} {{- end }}
containerRuntimeExecutor: {{ .Values.controller.containerRuntimeExecutor }} containerRuntimeExecutor: {{ .Values.controller.containerRuntimeExecutor }}
{{- with .Values.executor.resources }}
executor:
resources:
{{- toYaml . | nindent 8 }}
{{- end }}
artifactRepository: artifactRepository:
{{- if or .Values.minio.install .Values.useDefaultArtifactRepo }} {{- if or .Values.minio.install .Values.useDefaultArtifactRepo }}
{{- if .Values.artifactRepository.archiveLogs }} {{- if .Values.artifactRepository.archiveLogs }}
@ -39,6 +44,12 @@ data:
{{- if .Values.artifactRepository.s3.region }} {{- if .Values.artifactRepository.s3.region }}
region: {{ .Values.artifactRepository.s3.region }} region: {{ .Values.artifactRepository.s3.region }}
{{- end }} {{- end }}
{{- if .Values.artifactRepository.s3.roleARN }}
roleARN: {{ .Values.artifactRepository.s3.roleARN }}
{{- end }}
{{- if .Values.artifactRepository.s3.useSDKCreds }}
useSDKCreds: {{ .Values.artifactRepository.s3.useSDKCreds }}
{{- end }}
{{- end}} {{- end}}
{{- if .Values.controller.metricsConfig.enabled }} {{- if .Values.controller.metricsConfig.enabled }}
metricsConfig: metricsConfig:
@ -49,3 +60,6 @@ data:
{{- if .Values.controller.persistence }} {{- if .Values.controller.persistence }}
persistence: persistence:
{{ toYaml .Values.controller.persistence | indent 6 }}{{- end }} {{ toYaml .Values.controller.persistence | indent 6 }}{{- end }}
{{- if .Values.controller.workflowDefaults }}
workflowDefaults:
{{ toYaml .Values.controller.workflowDefaults | indent 6 }}{{- end }}

View file

@ -1,11 +1,20 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }}
kind: RoleBinding
{{ else }}
kind: ClusterRoleBinding kind: ClusterRoleBinding
{{- end }}
metadata: metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name }}-binding name: {{ .Release.Name }}-{{ .Values.controller.name }}-binding
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
{{- if .Values.singleNamespace }}
kind: Role
name: {{ .Release.Name }}-{{ .Values.controller.name }}-role
{{ else }}
kind: ClusterRole kind: ClusterRole
name: {{ .Release.Name }}-{{ .Values.controller.name }}-cluster-role name: {{ .Release.Name }}-{{ .Values.controller.name }}-cluster-role
{{- end }}
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: {{ .Values.controller.serviceAccount }} name: {{ .Values.controller.serviceAccount }}

View file

@ -40,6 +40,9 @@ spec:
- "{{ .Values.controller.logging.level }}" - "{{ .Values.controller.logging.level }}"
- "--gloglevel" - "--gloglevel"
- "{{ .Values.controller.logging.globallevel }}" - "{{ .Values.controller.logging.globallevel }}"
{{- if .Values.singleNamespace }}
- "--namespaced"
{{- end }}
env: env:
- name: ARGO_NAMESPACE - name: ARGO_NAMESPACE
valueFrom: valueFrom:

View file

@ -2,3 +2,5 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{ .Values.controller.serviceAccount }} name: {{ .Values.controller.serviceAccount }}
annotations:
{{ toYaml .Values.controller.serviceAccountAnnotations | indent 4 }}

View file

@ -4,7 +4,7 @@ images:
server: argocli server: argocli
executor: argoexec executor: argoexec
pullPolicy: Always pullPolicy: Always
tag: v2.6.1 tag: v2.7.6
crdVersion: v1alpha1 crdVersion: v1alpha1
installCRD: true installCRD: true
@ -16,6 +16,10 @@ init:
createAggregateRoles: true createAggregateRoles: true
# Restrict Argo to only deploy into a single namespace by apply Roles and RoleBindings instead of the Cluster equivalents,
# and start argo-cli with the --namespaced flag. Use it in clusters with strict access policy.
singleNamespace: false
controller: controller:
image: image:
# Overrides .images.tag if defined. # Overrides .images.tag if defined.
@ -47,6 +51,10 @@ controller:
# passwordSecret: # passwordSecret:
# name: argo-postgres-config # name: argo-postgres-config
# key: password # key: password
workflowDefaults: {} # Only valid for 2.7+
# spec:
# ttlStrategy:
# secondsAfterCompletion: 84600
telemetryConfig: telemetryConfig:
enabled: false enabled: false
path: /telemetry path: /telemetry
@ -55,6 +63,8 @@ controller:
enabled: false enabled: false
additionalLabels: {} additionalLabels: {}
serviceAccount: argo serviceAccount: argo
# Service account annotations
serviceAccountAnnotations: {}
name: workflow-controller name: workflow-controller
workflowNamespaces: workflowNamespaces:
- default - default
@ -95,15 +105,15 @@ controller:
tolerations: [] tolerations: []
affinity: {} affinity: {}
# executor controls how the init and wait container should be customized
executor: executor:
image: image:
# Overrides .images.tag if defined. # Overrides .images.tag if defined.
tag: "" tag: ""
resources: {}
server: server:
enabled: true enabled: true
# only show workflows where UI installed
forceNamespaceIsolation: false
# only updates base url of resources on client side, # only updates base url of resources on client side,
# it's expected that a proxy server rewrites the request URL and gets rid of this prefix # it's expected that a proxy server rewrites the request URL and gets rid of this prefix
# https://github.com/argoproj/argo/issues/716#issuecomment-433213190 # https://github.com/argoproj/argo/issues/716#issuecomment-433213190
@ -120,6 +130,8 @@ server:
servicePort: 2746 servicePort: 2746
# servicePortName: http # servicePortName: http
serviceAccount: argo-server serviceAccount: argo-server
# Service account annotations
serviceAccountAnnotations: {}
# Annotations to be applied to the UI Service # Annotations to be applied to the UI Service
serviceAnnotations: {} serviceAnnotations: {}
# Optional labels to add to the UI Service # Optional labels to add to the UI Service
@ -164,6 +176,11 @@ server:
# hosts: # hosts:
# - argo.domain.com # - argo.domain.com
## Additional Paths for each host
# paths:
# - serviceName: "ssl-redirect"
# servicePort: "use-annotation"
## TLS configuration. ## TLS configuration.
## Secrets must be manually created in the namespace. ## Secrets must be manually created in the namespace.
## ##
@ -191,6 +208,8 @@ artifactRepository:
# bucket: # bucket:
# endpoint: # endpoint:
# region: # region:
# roleARN:
# useSDKCreds: true
# NOTE: These are setting attributes for the `minio` optional dependency # NOTE: These are setting attributes for the `minio` optional dependency
minio: minio: