Add support for namespaced install

This commit is contained in:
Kristof Farkas-Pall 2020-03-11 19:58:55 +00:00
parent 664829aa24
commit 565f984149
No known key found for this signature in database
GPG key ID: 0C8396E9F0F3C9A3
8 changed files with 55 additions and 11 deletions

View file

@ -1,6 +1,10 @@
{{- if .Values.server.enabled }}
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
kind: Role
{{ else }}
kind: ClusterRole
{{- end }}
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}-cluster-role
rules:

View file

@ -1,11 +1,19 @@
{{- if .Values.server.enabled -}}
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
kind: RoleBinding
{{ else }}
kind: ClusterRoleBinding
{{- end }}
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}-crb
roleRef:
apiGroup: rbac.authorization.k8s.io
{{- if .Values.namespaced }}
kind: Role
{{ else }}
kind: ClusterRole
{{- end }}
name: {{ .Release.Name }}-{{ .Values.server.name}}-cluster-role
subjects:
- kind: ServiceAccount

View file

@ -1,5 +1,5 @@
{{- if .Values.server.enabled -}}apiVersion: apps/v1
{{- if .Values.server.enabled -}}
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}
@ -13,7 +13,6 @@ spec:
matchLabels:
app: {{ .Release.Name }}-{{ .Values.server.name}}
release: {{ .Release.Name }}
app: {{ .Release.Name }}-{{ .Values.server.name}}
template:
metadata:
labels:
@ -31,21 +30,23 @@ spec:
- name: argo-server
args:
- server
{{- if .Values.namespaced }}
- "--namespaced"
{{- end }}
image: "{{ .Values.images.namespace }}/{{ .Values.images.server }}:{{ default .Values.images.tag .Values.server.image.tag }}"
imagePullPolicy: {{ .Values.images.pullPolicy }}
{{- if .Values.server.podPortName }}
ports:
- name: {{ .Values.server.podPortName }}
ports:
containerPort: 2746
readinessProbe:
httpGet:
path: /
port: 2746
scheme: HTTP
initialDelaySeconds: 10
periodSeconds: 20
{{- end }}
readinessProbe:
httpGet:
path: /
port: 2746
scheme: HTTP
initialDelaySeconds: 10
periodSeconds: 20
env:
{{- if .Values.server.forceNamespaceIsolation }}
- name: FORCE_NAMESPACE_ISOLATION

View file

@ -1,6 +1,10 @@
{{- if .Values.createAggregateRoles }}
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
kind: Role
{{ else }}
kind: ClusterRole
{{- end }}
metadata:
annotations:
helm.sh/hook: pre-install
@ -24,7 +28,11 @@ rules:
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
kind: Role
{{ else }}
kind: ClusterRole
{{- end }}
metadata:
annotations:
helm.sh/hook: pre-install
@ -53,7 +61,11 @@ rules:
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
kind: Role
{{ else }}
kind: ClusterRole
{{- end }}
metadata:
annotations:
helm.sh/hook: pre-install

View file

@ -1,5 +1,9 @@
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
kind: Role
{{ else }}
kind: ClusterRole
{{- end }}
metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name}}-cluster-role
rules:

View file

@ -1,10 +1,18 @@
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
kind: RoleBinding
{{ else }}
kind: ClusterRoleBinding
{{- end }}
metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name}}-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
{{- if .Values.namespaced }}
kind: Role
{{ else }}
kind: ClusterRole
{{- end }}
name: {{ .Release.Name }}-{{ .Values.controller.name}}-cluster-role
subjects:
- kind: ServiceAccount

View file

@ -40,6 +40,9 @@ spec:
- "{{ .Values.controller.logging.level }}"
- "--gloglevel"
- "{{ .Values.controller.logging.globallevel }}"
{{- if .Values.namespaced }}
- "--namespaced"
{{- end }}
env:
- name: ARGO_NAMESPACE
valueFrom:

View file

@ -16,6 +16,10 @@ init:
createAggregateRoles: true
# Install argo components into a single namespace. Apply Roles and RoleBindings instead of the Cluster equivalents,
# and start argo-cli with the --namespaced flag.
namespaced: false
controller:
image:
# Overrides .images.tag if defined.