From 1fed7f37cfccca46fcf449080d7bd53246f3dba0 Mon Sep 17 00:00:00 2001 From: louis-murray Date: Mon, 4 Jun 2018 10:39:53 -0400 Subject: [PATCH 01/11] Updating helm chart and improving style (#7) * moved workflow CRD into helpers.tpl * added new values to values.yaml * added UI cluster role and binding * add workflow controller cluster role and binding * added ui service account creator * added workflow controller service account yaml * reformatted values.yaml to group similar items * tweaked files to reflect values.yaml changes * setup minio stuff to match subchart model * changes to reflect minio rework * added README to explain chart a bit * changes made to reflect minio values changes * changes to reflect minio values changes (again) * updating minio to latest version * move the crd definition into it's own tpl file --- charts/argo/README.md | 17 ++++++ charts/argo/charts/minio-0.4.3.tgz | Bin 9030 -> 0 bytes charts/argo/charts/minio-1.3.3.tgz | Bin 0 -> 10463 bytes charts/argo/requirements.lock | 6 +-- charts/argo/requirements.yaml | 4 +- charts/argo/templates/NOTES.txt | 4 +- charts/argo/templates/_helpers.tpl | 20 +++++++ .../{_workflow-crd.json => _workflow-crd.tpl} | 2 +- charts/argo/templates/ui-cluster-role.yaml | 29 +++++++++++ charts/argo/templates/ui-crb.yaml | 12 +++++ charts/argo/templates/ui-deployment.yaml | 7 +-- charts/argo/templates/ui-sa.yaml | 5 ++ charts/argo/templates/ui-service.yaml | 7 +-- .../workflow-controller-clusterrole.yaml | 42 +++++++++++++++ .../workflow-controller-config-map.yaml | 13 ++--- .../templates/workflow-controller-crb.yaml | 23 ++++++++ .../workflow-controller-deployment.yaml | 11 ++-- .../templates/workflow-controller-sa.yaml | 5 ++ charts/argo/values.yaml | 49 +++++++++++------- 19 files changed, 213 insertions(+), 43 deletions(-) create mode 100644 charts/argo/README.md delete mode 100644 charts/argo/charts/minio-0.4.3.tgz create mode 100644 charts/argo/charts/minio-1.3.3.tgz rename charts/argo/templates/{_workflow-crd.json => _workflow-crd.tpl} (97%) create mode 100644 charts/argo/templates/ui-cluster-role.yaml create mode 100644 charts/argo/templates/ui-crb.yaml create mode 100644 charts/argo/templates/ui-sa.yaml create mode 100644 charts/argo/templates/workflow-controller-clusterrole.yaml create mode 100644 charts/argo/templates/workflow-controller-crb.yaml create mode 100644 charts/argo/templates/workflow-controller-sa.yaml diff --git a/charts/argo/README.md b/charts/argo/README.md new file mode 100644 index 00000000..8bd449b6 --- /dev/null +++ b/charts/argo/README.md @@ -0,0 +1,17 @@ +## Argo Chart +This chart is used to set up argo and it's needed dependencies through one command. This is used in conjunction with [helm](https://github.com/kubernetes/helm). + +If you want your deployment of this helm chart to most closely match the [argo CLI](https://github.com/argoproj/argo), you should deploy it in the `kube-system` namespace. + +## Values + +The `values.yaml` contains items used to tweak a deployment of this chart. +Fields to note: +* `controller.useReleaseAsInstanceID`: If set to true then chart set controller instance id to release name + - __Note:__ If this is set to false then `controller.instanceId` must be set +* `controller.workflowNamespaces`: This is a list of namespaces where workflows will be ran +* `ui.enableWebConsole`: Enables ability to SSH into pod using web UI +* `minio.install`: If this is true, we'll install [minio](https://github.com/kubernetes/charts/tree/master/stable/minio) and build out the artifactRepository section in workflow controller config map. +* `artifactRepository.s3.accessKeySecret` and `artifactRepository.s3.secretKeySecret` These by default have the minio default credentials in them. + + diff --git a/charts/argo/charts/minio-0.4.3.tgz b/charts/argo/charts/minio-0.4.3.tgz deleted file mode 100644 index 8ce446100017d7a18cad9a9cfbed57cfe3e4e02c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 9030 zcmV-MBe~okiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PMYCd)u~>D7;^nzhYh`yKCo_D9MSPuI|Zsu4}tppVW?ToVKT% z_K6@8l2DTXLx6U4V()Li4+a1UQj{e-X?l8Vey}A77z_r3!OUQYNf~FNe=sMx3Kt|z z{^d7#27|%i`R*?M9}EV~|AXD<)n_ap?hK#r{0saRxGX(|R3!hG!QfNjGza$wc}T{7 zpt)p%kKl3`#8gH(%M^Y;WK!j9QYadOnEXm31yYHe%qU2jU(y^V1xpl6MGjFSiWo?i zB`hMkxdg&vi0P%sWEjjvN=GnPDwCsrADJ#>B4Cm3#}!{)U4`zaK1*l)M9jpy;ojiG zaBmQ1d=^~L#g)ioISP6Xm7r&F>s1BkPlJ>&t_b5a$I3J%EE&O^CW-jpBq9k7vv~l( ziN~nNKxbw#V*_^W=zeCNf?RLjMMxLE*+Hz;j{2*@O#g@ zdkl(~Bq^x;tpvcD_5XZ#cc;1jpFMs4u>QZq^XL(rQw1@dk|I&SQZl1m^Y0Crb#W2n zx3eNi&P2kZMF^>gDKH6zq%kM~jK_M_Q&4jnJbGl-hLaJxau--gLy(H_m?VNz5IMw^ zcnNhYU)w6G-_)G77!J-R2qpCM6Sgf%L5d9H!yw%tV+z3a| zd42TV(f;{SxHA|&?+tf)J72vS40}7n-eBAZU=2 zL=lzpf-brsX_QliAI;z*!KZ8nQX}RxQMBQ zEy0t8p}v;A2A)R@r1|!5NmDbhmlWyo@_7IF)%iEC4o^>?AN_s*CUJSNxl!ljHu&=O>3pr{DG`XCGcq*}+e?$;+dkI)Nd|8By~QbTo+zuI#ry{g8=V zb%LDYCL>4i3<;hH5`Rq+!Xug=pCLumoZ8`@)BKV}6t)CzY9#5}tx9GzVpA3&nM$IJ z`u&SyLUT?Pl_gCINpmyyzBKS;|B+f`w5R)?*uFJgEbo6;LurI)9&s|!Q?2&_sVI*q z6q4~7oVgMOKNt=;NC->i-4H9`s-EE^+1Chp-HieOib%vGP+m}aO{UiK4yvis)S0uXF#vk>c8X6-_h5)Q|I6*P; znv(d(oGJQ>M>GJC>>qRl!@;*KsAyPB^jgr8SC7)j38IT(Dw5bp2;#&D<5E!)>oPs6 zTnObpn;M}3{ASLi21#*6kR(~aobY&o3(3ODl48cV1T`lLV!{7I0Vj%G(qsX$$n?5I zG!P|C$E}22P?#l!R5YK;?a)!ejsaIUu8I$tkknhSc7f?RoKQ<5E$4EPf+&<^v8f#y z*s$fVHP?C@Hx!ZE_P~?@aK+S|@p}6M^WpfcYK$^mS1OTNWE8hTU5KMqc7Fq=!h1>( zy*%xgH;aspz#obGdgo2ZgeDT_ClfIcDcOvtlq+51wJ+aq$3$-? zJxLQ9Y0-%I=%RBh5%~x{-e9K(D3ptwLQajs3pssXP^pZPpRkmvJBq7Fq*@O(IT7B5AqSY;hOTLMr4$(EB2vArC=9`Ap5>uQ0&XZA=3CfuvbtVH^;yo1w0w z_iawEV{ygxhH+hF_%ACa35yUwW|a$91&4IYE^T&ZGt?dzO7CQ7c2!$6Rxwj&s5wLP zqf^KpB~tZ0g($H`E642;jEbKM;G##PZKtqE7K88h*T_+l;qKT6$PduPl+C|9;VDl zL_14tz<5kQ*l#(F*-CP*0@ft+5*05>hRTFgvz*HJ$z3~%1m{MUo};L!rpQ3B-{wMA z^P8c3_a=KaidsXP5a|G2km&_kh2kU^7c|%7)ryc~l#E5T@fDrSg}7MNobosmj62NI z#XYDI%P&HP^u1EIQ^8v)6#)R=3+a}FPrq|9pw(>6_D>Zm8&6q}=~^ zK63pa_(>GVP+VNqC&zjZ1$W()6E)HU3E>-LCU3%|qM6i&ncau=#~Liu+|$U4dpEC# zR^|3=(6SEn)+^zr=CYT}%!vkN9DN#ft%tyR#>SzxkK12lr4vrGRc-NE*PAXse|q^$ z?&Ql?&S*O-=fV#Ks@TI1@ok(Xv(|jczBckX`Zt+x8u zSF_EZWEtvRm`%~kv*pHBQ-4FN`)FL=y> zJF9WJkO@sT&K2j`S`K_1TI-R!Xt$#OQ>38^hK)463yudp7e1y?mr2R zK4i`Xj;gyoOo%XcD6sW<_H4*4O|vX})o*yT5}JS`JdY_w21)6wOPc2_rf{uoW*))b zQ~b!%^I|$>AE48#fazu0Gcv0GBq;sAt`98~7Vy3x37ayCu_=gm82m^LbgZv*A9@TD zCNv^iuu73qcv)(-)=*(Ii6xMn8h^Jr`9=}4HCZ4ftWl#CWSP-udnHjSdF96P82cE# z*qlPHWtKCprqKB}+50!ysVf^6?A?j^nyMl<#t_M}Tx2;zVwJ%{c=%w2yzyPH=79QE zP=cuXb{ou$LU=$jGGPf*jLJ~Yfvp{$FfMZFJnL-3RM$pmv8`pJY|8h8? ziVVH+Cz5JJHo@U}rwQ4Pk?~o0@fDgum&0Y+`k#OAb?=_0{KxO_Vwxplky8Fyf&$mb z|J~=qy@veX+Z_%cFKJ>Y0i|1A@b|E z&=Oru%X^LPN^({d)Lps&7SCF6g{F$9h5|@;AZrg>R5bt2BhVd4vm^9IX)X6G@ZyR@ZoB#T9%7p5QNG z*$ADAcs)z}OvH>&MOhAbB78;ic>nBpDaf5(f(2=tb{i%m42uhhSBMf+|qZH|)(>rmbT{e0ruk}XLOf3$X z323NQ0wPK0__rffsn_y8kO z#YDIE?sa3MCOrv-C2(^yYL>krvpT_-VkVm{s^97j8+=qn1JqO^nr!>c z1(_|utRlBO9NJqp#ZD_NHeGMa1aLM|r=JU<`o@jb@3e8jHM}o`qN{pd7PpPw`t3Dx zO5#^MS=3`(z#e3;m|E*WY=A1)q!;N`{Yv>|JFt`E)8kj~_74t@&d=YyJo>2t6$ARe z$wj&>=S#Qbid|q+LDmpd?!iEcGVb{n+|Q2=ULU>r=fk}W)b=VQ?2>XS{5JY3F{!bDOH&v?iN-%R_Td%MjhO=_$?#I_4awLfJbZ{xhA_ z{5DU!{Le0<&-gOnI{Ck|(~SSx9S$DOf4<0bSO4E;mcH37&f2W}pz+4>eYOE7Q>zzf ztbEzX{ia1$`MS*s;fu1VZ~OINg_%=z+O#feW=`!@hUUu*;NAxst?EUxf7IaLLU;ew zBCqNeeUB$R>zZs^Cu7S?SwWpBEmc-wUq`9ajO@AfKgYCVS5) zkK8ehbsUV^qrm*yzxTA4&x-Z0h@#UXk)K5ftXcohpDo@0u($X8>BIW}63;4)$-4%? z>V5E-i$!AoZ zZDi7Cxlke!$q3#YoGl$4Z%DdcuUDHyl4Z>k{&OoJ&hNKP{E?^B(tY!z$qkPCA5QrH zG$;JO{VDJ7evtjo9mMee)FF7|e64o?t4_o1D*&6Fb~nH-H8qWM!eA{O<5e&@!+7WY^v9w);(-@69;e-`i6E zZJrhWpD%j;H*7io8$QH;e37T_o%!^$xt_d?{>aw7@dGcrS@5;fk{0&Gm$FX?sqy;=I>c|Bcf9&iqSB_KADJ?ec&4bnn?x{NJ;^hx^~Z z$kXbqKX9I*d+h+eW9SdJ54gdaL4?0bO_=MRiSMxDu4C_V?~I_cGw5_(ag{HW(OrpJweN0_YTZvZiH`C#{TZ`nGp;uIt@a zTMekX|8otfs^WUAwC1)UW~k(?1nA#7x(1+Mbs123Rp}ZiWxZt(<;A9JK$P`bhGVWl zT{jX_s|5plW$HQvco|^a0ATJ{UDMoDT5jxJ#kvN9SF`T(XcrosDES$dn+CITx!LQb z*0gq)P_5)gdz+D)qvbJnri^LYO4X^rMGLKV4YiNgE!@_BMnw+ z8HjhO?z+KvRZWn@-m?~L++Dm&jC40vD)01N>Oya+?rz^TpvrnHsfWPKwZLm(nQFIz z!V87h@w%?l)_D2y;Wdz!8&t6?KIHY1pmx9UXAlWBcq?Utxo~$=D5mx;Yx}m1y$gzr!-#r{23^WaPCc6(|R36*UD}KX07mEFDwn9_0sa@6zJ!DP#Ua8N)rtg(nBWcz&HkEEOzHSva2%{-& z8X(?_TcjNVcrU7u^5zb1(>1Jt;HrI!U5kJ|hh2++TKKD-D+2%jZyI{gJpa-AWzXhI z>P2{`rb{!FiTHj8L2J(ccb4*h?hFUJ5AXkek*5)RR7;QLztP)zPIM;X`<)Q^eDy~> zC29%f>da}9hH~DwI+MSUmMipP^f&g*4J(}yV4*Cch|-wGWjI1k@se{FLi~zwCo@s<5vr*DUl-M$xJ!1rKJN*gceL3%Rq0@`(X<4UV$Q*xY zxw1W7ASf3x{Mf`89-SVZy*fU9W6~fzZU#-dk}4GOe_>C4M|ldp9D2Q}$Rp~y>3b5p z&i>qR#WI|9@(GR2l*7t~nF|TuybpWvm=|EWHng-gFmrWC=DmY4TSG|K29JJG?3zKM zb?hA5)p6T266&8me$a4OsAUtIago#CppP~C|6q66jQ`kq`jG$W%RG*^gAQ^T4J)>S#?vIb6P zxNE{zmeVQwKx32J;s4tX;T2C7m@qRlC_zSZNEoMK5FVbtJ69s7!6P^jX(~AUaBvPW z%ViMGnCjzSgMJWB{*m|buPd0(`udOiDld7z0yH7fMUmm%_cC}A%Bw7R5>CiP@FY}e z7CiZ%;1T>lawZB1$A?EU2(w)LN+T77ET*Jy>gD3sf6^s>>tojc>!ba{lcO+=f0I6L zU;jH#_m=WM40oSC#D9H}2NT8wFZ2@xZ}HnNTP{hA+18lY1}1?3o|Rou{nw+V1f$59a<6L_JuV}`$k|&ui)j^ zDE0`XLiKGkk$*KG_e$5l9l|k(CeSLCP$onIX^|+F zB^2VET~Y~K^pbKAy4`e2b8Q-=L<@2%w}Ek_nPhyna@vF7n5$gG1s<9NJ?{wu+(poO zgNYDIs+?pl8&#Eh08?|p+bR)}3&=2h_Wzs7{+cQR`)9{xrXu8M7t&qboP~rAgB}3X;Owr1 zqXZ@)G?ZYxjTas*&G>d0^#1ki2R~nZnUvioJ1=-l^JJmP!}v5O<(k8JLL1eQ4$bB| zAxe7KswV4+nLniYCA7zbm1&kRR}X2!Oa{T%i*nA1?zcCioaRI? z22wSVWfO48z6wd>5Z(w7E?th#KN@%!Q~DaY-3ChPEr{f^LQ5jtB>a(uw+vYmstoOY zkuFN(w_6&pFVaP6bi&VQSuPPq)8+dtCQ46=&2H%PH0Czc(;WnF%XsZdR>Hd$S5SFM9Jz?kv@ zn5APOn+=Ool#)R(4B=o-qYE(ds9Lyq?twPCbaKN|uaZ|Vc5{~Lt;^Q-r(hfgJ0ZOC zxo7OIM$_2acO%AnS!kk3gX>TGC*RqG*r@2Rgrec20dU80#N^q6gk4Z0N)0+iHp@v& zp*MBW=L?c1O|+hd@Y*;9y|Edjw&XVMM0N@DnaKl*IU?zFN+ac^fy6}}AqjQ;Ig=Ph zDy9w(s~Ne8^$F)HR||WrvC0w>X*yM2D3$^v8CkefV~ z)8JygV*Sp$V4SR)t18vNIVP7@u&rDHSl+L4nhLEQIiB;Sx=1s@QC1KsMZ{1_mBTm8 zXZE}V8|YFe_JiQSUkpt(+s9=UGQ9f(x3tz;W9tFO zm3p_)+wR|x*>b~r_lnFyI1^GbPta**pfS9i)7&!`=EWq8MRb9$L!|w@@8Q>1WG4ID z;Wdn3AANVUe|{A142I8p!=2vFS8oQx-p;T$82tCR!mYZlWbEU1j96twk~q(HD{1zV zE3%Mxp-M#>t@yULysmF4cy-y5asnyb5aS2eZG%xRHM zXs(wU7g}U)StAhbVV*2d9$Ukvp~`QEa6T7B5^II!8T{o1e9(V}dzxI&#%1@VF0s^q zwce}>qt%J6T`jkF2Dsu$q$R;NPQc6K{o_~X-@H0JJ$-)k_x+Qz?~c|?2XF%E`b$|6YlH`B?Uh!{^PLBI8pPw8aoqpS&oPBsbWd}c5d|n>?G;VZX-T%?- zzv|weADK;6SPQ(YHU1xatH>Rh&$6DqKIE3sW1XsFJ>yk=BV$ls!?jp92{!0-NS8Sh&6XlY()*;8V|B;I`?X?zXi{~Qbk_aT1E zH8*3|{r8gkR5rI$Xx7u32{l^kHH=kWtXSH2>t3>dcyO*u|I#uFn77K-8V?8Gvd_}J zcUi|6t^wadTHigIODwu8220&nS8t3FaCv+7E3|oYEI{wQ2L#5oYMUdmJbH5(Q91W` z=MoT*#ROuO;}Q14sXNOgVN*0-uVLKjY=DK8`SvoAmUVw{_I>|^rn*m8t-NQXkGWx` zMiOg`V7#-tcf!V9-E5>eVvyd71a|Kq&W{`2pXyD{L`)c2BVudgqtnb0|KrU)7|(X! z8U1l zv#Lnhz-k}5qRla{+Xd&MN>%JB$7CWdDWoJbS$ru_ehHT(XGXg=DQshBK^n(69HKJy zU&X}eVjF5&+n&{>4Nf*)04349LdP>t#>RngK^HGjw|mnhwzQa zfqo!qmeB4UJTgBAV4W6CdG}&C7<|iC`6tjSF;r}K=UJT$O&|gW)`UbCc%;}|q~VG@ z_vq7%X=z&PEgmgsLrA7~pOT7J8Mdy3R+rX2iPW1qLutt*H^lfWJbChlWlx@rO0QWV z>t3g~9)w@Eyf529aOmlV=0v7p0G9sN(#b1|b&OsKk|l*2Rh z8VvVfi}5HaB)g>B)(`I80t|0)=Q9y;?FTi6cOtkVfja>zLDo%+ULe@dB}lhp>Fiq?z&t zBcs3YM_sS*eOjc2b9{&9eR^Tf_9qKhSd; zT9yu9Q=abN zjA(&tRSerRjT>VN;VrJ=SVXvkZ#vd;fP5;q15v1iar9Nw3>~y)!hpc(H|KT|md~0( z#|TdR`wUafD*Ef&_Xw1PZ#_a)_|KTq>W|iYe644ah)F*sx_dJy)3}G6!{aLCx=Tv5b$E|7}N^PqTl@62AHG(IOqz| zE{!XZUxeCT(Q7(}oTxdf+7!kvBlNhdDw zInRh)M2xP26eL`mwnPfvH7YDo#1Xwj9uMlwr5RI^(@UC%ohLz1PZ3#jv!i^mZzkD9 zgU)Iz-K5>pWPD3pC1fQOqh=^ftMB$)w#Eka&e2A=Rn96RFJzy@dWtmr^eh|oV;UtS zr#*{+4by)#p?ajfg(!LxI%9mh8<@GtnPZe<=!6P`KpP+a<~Iy?;otSYJ!9~s zg;eHTP8B&u-_*yWg_AjM4D`6I|M8IW1zOAI?(6Es1f%wi%z8j0opKZT?h*YRNs@Pv ziMTv1EkTU}wEQ&PB9%D6UWMuwLrzuOO|*6Lz4-WZ$0n})xiivVq%dI>KX*nycf8^J z+_|~w1i_D5TGdHl>DmRAlj)R2rSk#RM6*VI)nvr&|33$Vfu(yYatc{aBPQMWyKNI! zOL_Ui%$$jO)jb91)5ki7W~D+_MJAZn&Wwi!cWCqKxc-P79vbOtes}1{OlApLR2~OW ssH{*Xo&;YDk#brjRs6y49XI&!JUkE2AOHEk0RRC1|F>tE;sCM$0K`<$_y7O^ diff --git a/charts/argo/charts/minio-1.3.3.tgz b/charts/argo/charts/minio-1.3.3.tgz new file mode 100644 index 0000000000000000000000000000000000000000..97803de85c2347b9c6322266b05c5a7b9b238a5d GIT binary patch literal 10463 zcmV<5C?MA#iwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBzf7>>a@cn!I6tjwNYiC7D@=Mayu6vJbyIF7ImnU-D?WKJp zh=e56B*74%9c}FU?9UGafCMSZFKL?I_RK$Qi2?>QgTY`hGXN5nGTz&tlUxQ1lEnY^ zD?I&vzyEw^2mkl`{pSDvv+Y6o8Q%{!2hRup2EPU_OHUyr$^Wh2|D|x6#QlprBxB#v zTri#v;d0=SEGxghK74h!H#!V9`-3n2{VM~C*2S@j-_D9SKI1V97Xc(ZqQC?cf<_=YuryMG znSz{C@5vJnD-1n=oMv1w$@7I72S&yLB$?fzVF0qS$srs~Pq;kGsi3L!ypO;dm5-cL z7$@Nv*3~DC%abP%#*C)2Bqz+NB8HUkCq;NcRZo&;Nvg;yMl!m zYCuSTR%=uOVvzn-%FA54{(hd*>Y z&6G1D=R@dpJYhG@3d9wbh>agXW?84wjy6Zv`9(9LdbG{$&?|$(pd?uNDT&BfteAw zq11tCC@tc+3n^b}3`9mlV1^b@<+~8hIY%jSpj9o?JOEgqWt+fL*!zCeHCiB#fTtGD zi14XOf<#q3U(P{z->0=)Yhn z_KJhWL=6r#-zXZj;vniZOnDq>l|gLZvs6e*BK1zulyffaXI%ny<@uZm1&}JHFchIV zNh3W;7)V)M%vdTw&WVJGr(Z}&iDZ{FUVtbvHB1o+L`d;)J!TgaW^o}T&8I?77Y2JA z=s1qwXI$V!X;hU`^DLyQ?Smd{l1c$H04sS8HVuT#sg3imgPL5a!w0uU4%JNV82jWLD%wUnq3G@I02zaw+pt#?tq# z1!XLJ5~99PRH-4PY3O+Xb1o#}0N_KY*6}`lPm(OALCixED@Mm+2ycGE@d&<|q_qO7 zRq$mjbRh>Uep>}wNy3RT24gazvB2Sz@d$_zY?da6E2RF7QXy-agK+MNT27dff#%eOFK+^;$D#36l?;AVZ#H zg`~cPsKvSbrp-a!hVG1nCTJLL?mRnY_$JH>^|ha9B(0IDjY}X?H9Ga2q?8zmW7UFD z%3oulR#DSh(!B1Lb0h&};-oXw0T9!4Cg<=K^vgA>ZdU`?C#kA~mZh@4QhFWnt2E{$ zx-K&Omlczkg*YU&*_!GR`s4|m75R(;n_5zEwiQ6)oRVmP)^0wd7Gp*Hx58N8Kvb6i z`KRiwNz5lOBa&W`MHd#l05Ru99NEcH&(*F8B)FRDjKU7pXhlhX7>lT(T5%6Mv1nVz2pT){v;6-GuhmGHsnpr43Zx)Kxq^RK?<}{+IWF&^4 z1y8lD&Zp&EK*A8G+zYC@auzCs`0s+JIHf57hH~xL$#RZ97N!g@^W`Wir@uS#*COPn zT(YTg5IIW`RYZ?&J>X{ODCrc!r$k79pb(nm{7TS#2pyiP?-5T3v)Eb#W>hyzItVQ) zLK?lMQISR@4HqqC$h#!d!&@`5;v+zj$EFkjeIL$AI-})_oEOSQ&?|*{nRA>5&C7_! z?2_gSZ5;KrCQ&HsRc6&1OA;C}B5No_Mc%}UrIO|;iQRW8|DG`Ez9EI=2Q;SA6^)cw zUA9ati6Wf)EZ(9(*IM~qY0lJ`xcDL?LR|4YDql!`LDQ-}4U4?iLdMeBkwX4bA>ViK z7|EQHgrzgLxHTOPN|1U{@4O&lk%n%aguFj1CVSz9I7+86o6V(eh{i-n779x8aK4HI zQ=TV85v<4*83}1;NeoyT(f5^jv6bvx1+2;DB`#i+0+n$gl|At;erO{hPg6bLj&R1P zx=2GX-;_mAA%eD$)7h(0RBCQQgavd#rWa%tij$mQ&|J~0)-hI4G8UT3S9CJx{9;vg znnoFCsl_Z=d;~Wl@mbiAyp!^FE;u8lVgSH9F6?kH5+2=i)TLBj@%+NLom#EdIObP} z@2$qbh4^pnpnQCO)kiOZBu%oINGf_Kr{{;GK)#osu#G$7f7{zT&l~>#t>^tm|Nm!s zK78<%5sH( zF(rZqCswV)%}tF1Z|0(0!sn>7a;0U0HZ=w{Rn=?R2{%tqfQw z(W;F=6Q)q_M_ZTM3YRU!B^LK>-t+civS7`Q17;c>s7SqVu#ewHNv7_jm>+Cn}BqtEgX?Wp_n9|J0 z&k%E-sj+rNm~?VG8j(;tPkD8?>l^UF1K2x1KRiA=AMN(xFYxN<_~?9h^UsL<9?nWz zeIQbawGNweOhBUDQWlt+~b>5LeO(8(TIfu@^sgcf_^Jr;k zuN@zq9G$*BJUKW!Jvuobn(t?)ug^P(#PR;y{nO*)y_198PRm4?EHoZ>gM&5A6 zYw&9oeEdE--#hDRCeefS9-^5~l?dvHwOXF06d@9-xWj1hq0 z#E+eCw6NI@9ae>Z?3j{ls#+>x_%jJ>C>HS3UsUg=o{nRpI1fyvDKj5XI$;xgYXE|V zJdL#L{F1~1CRAQgnz|CTOnj64h^Mra1S5PoRbR$*jB&3}vP+7tVOiuU^t~G#Mrw@c zc;BH8q^+-+1T^mn?BfVxI-{W$Z|lNjVRC|StSUl79-#?1M*CvyEx|UU>FaOzUn+qf zcmVsy2fJ(Qy+Y)u8MI|$B&D~eOTt&si|A!9E#eq9zxv}~qatJNKMfr?gXqRe61uRa z@)krD;#B=q!><~fTfT&qbm4dK}qeq_n0m`>Sy z==c>dwIuhoKce^4+ixcAPm4HSz`KIPY|1EZIYPVx?|Z7DV|l6CP&6nrFC>MaAb3LI zW$DB=u?a@wNTA7%`D5B-M+Lt=Ss*7&97E|xk0jaSg2 z?03OQWGlpgty5frzfbXL2_I~x$dHD>*#61M*()*sFBAJHu4i-e}1@Hl`w#{aXe!A^7hZw(&p z|IhL)ht+X&Z>QSt*@2Fjlbl8vRd@9T$uc{)ZW_&TP>Rp*Q*|i2ULm)VZ55|*f3VrZ z={PFvOI^eXEdmI;%f)0T%W(e6VaL50awnm-zTK%(brhzD-@CKa6W1_&0FL+Q4$Ezm zrCc7lv~W!S6s zHHjutIVI6)8ZXMd=6B$$`ej9@nV@x}fl^tWx%*e`L(|K4U^?EaBdu>=9{$jPil?-E zlk;TQ_yM5ID|$_*%fCKUr@IgCFe#(ox1g;9!~dhuE<^I4M)qEup1yc>_;&B??A6i! z-ucn#$=m(chX;oz=SO?5Mr~BL$YO66inkYZ5&SIl{AXbsotu z8*#fY)P1rxsRNKKp}deI3~!4e44hw`ove!8{0EZ6j?H3ztX4OJO`DX7X;`Jh&)KY7 z(NWvN>%y<#eF=_tqz$s&idI<>dzV6*7FQ z>efTFPLR7n{qC{{UtbgAezoO*H72Sr}I3eK$ zO{1o9W`@AY3XyCnsuvNes5`1|;ll&Qe^dY0gL|jBBga}ZCgf79k(gYm62Z@YQJm$aK@w2=kn${=TM<;syi!uvl?8zZ^_ZYYzp_> zu~XHX)>iiZGU@hdVS#;a<$~F}`iUCIy)s+i?|kwx%G^)Lg)3YC^ObwU z%vNd0uXd0XVu)@hG@n*D)8c+)Za z3_D%u*e!Ea0*(`DYeYxtK?b`wt;R>=YJW(V)S;f8zFq~f)n>YecLkTV1>36d-u;BL z7QQmv`8;OL()@oJe)4Mo?pputZ1t3BHEk#ygUq`9a3@YCG@wXn|cRfx0ukDo2 z8vp4(A8ar0|9U+C;j=ug+INIP@cUG^`qcT;jJzvonF(Izw+!14@wtY{vu&D&Hc!)} zl?>aD_Hj$!GugyV3aLSLDpW@=FSVeR&Byfr^7z+w?q`kv4x0Ag_Rh1%`0r9ZWv-`zXvYbmE@^}d6`)5m;{`VXtw~GG9j{hb7FNvhnA{O-1Z2-DM|L^P!n)mhNjl|z7Nz`Tb3yNH5h^DaBVnW8tA%M7^vy(% zJL$T|exb)LLciV?p^w`k)P(aXHVECiO{Ni8@b_WWei?IIT%(;8`(c*i6^*KHO4S-u z8bF`#=4gebpockE?p8TjgPR*4GpXR_Cb+YxDzSFYL%y--T{~uO*`V^chvybvJno74 z{p^YPxXmA6MB@`~0D)y``$QW-?gROkYzS$Ae`l!rlW&EvEn>999$io_YnqcdwCOB& zKCQmU>0a{A-_JQ;YqO!V8bJ*EvL4E)HGg|R<6q0szv9vBzhF+| zgw0Z((_f*DyZrwVb&l5N!Qqo)>ORPlzuI4m_Nx@>g+an|41({J1 zc;@04*~7mYeJ_~&Gwk!* z;J2UF?S&BbE{F|a0tnz0iC0wp)mMIxwjkt5MkJfW6gXZ1Y3EL}f(+nDs@fAOB!~jf zO`P%^ODW}2q(bIJD2tp%`bJbygmWMQvN@Mrbm5XkRQ-?nOpnp78L^@Z-yP#3sa#s< zCAbJ+q$X&tmQWV0kfdhyiZ?wGn9?hF`8BFN0ttD~k|I%6cFw;J>erSqp-Bgt@?thO z2h>lBG>WbIGDqdb=E_nKl7tss5G-La$yJRL9?`##y6~DtOkYEMycqr8SAl0PswtJ~ z8^`qq36E&iA1zm)IE8&}RW|QI*$Ch$g(lGI+K`O%7?L8EEQ={bIlH6+*6AfpfvbAc zDb1Ccn-HbQsn`IPBF_X%XDhqi^Nv!P^Qgcx?>*mnJP&6PeG1})b17s_GJEw*bpRFK z!vk-sgE%!KniouMlvkTqho8Us8;z5SZzk<_!%k(8kd(|2%d?y+6Oaiesi>jpd!GOA z&MBaSVEa$Hv%jX2z~0$Wc`FG@w2f6%nN!HhX=h z^Z)(qJNMrH@`8GEaYK;c}oO(LVNjc`QpDy|g?9 zTi=bLIg=M@s_O%3B}za@V!YSDx;X0>3bKv5Ts5?L=CA?KrE;fIiX}?DbG2795WU#@mII-9~f8AOtX3tnPh% z>lGvm-?q6d4~n0A`cfh#5<2w+@8a;huNP&X6Vbnbk^L9K7KQ03=LV4#CfEgr@)vK{L(&K9l)_E=%1j~yO6 zZyn<(lm&@vx+n0wZ&P;P*+B0oB(*siC^+QKdB0hd$Tdb$gfV z=hhz|SgN(AcMaoa$Zzb>g*#lp2?w@PuN8zDs1KvwHZRF+sphpc2N4NLW&xaWA(*4* zlrYc;-ppz4tQO|QB#3x;LGvKwNiXj?`1K^2iQYzV4dd5`uMYP{hrwol@TK41_BWrO zZ*KWpTmH`Ge~lg7s@UZ+Yt(P{8j)7k98FKSJj z&x8-@mS*$IeRB;-`02VOysb~ZJn#4Y{+Iq{-}K4ywyUv=)t%k)3;U#TPR!T^e2DLa zJ&2_p2#oR4`3H7Lvw0`^ZfpVDX5GZRmgYa)JiP5@^LUiVxDL2%J`8E5x?dH-%U^5F zzxnBxH!owcB$2lH^H-yWh4smrSL@LB+Shdp4>O6@$JK&(+=a2;y)p)#!`NBMjyJBs zExEdRn-H^H?;6Jc-3uN(MOLC`awcw}9?Mh>s~)co(bN8| zYZ&)*)brj*80J?gq~k{OjxAVTWVy&_qtv)e(|s8EwdR)*uQiX3pDQ)#l$bDqQC>l# zYZ(8z-|v46^II~WOQmbm-+o1<+mZoOHvg@lZYS#~xRQLePN90udTp-j`vlDk_D|{> zLDt*6i~^p`XsI9cU$9Tnd~FZqSW}M|mh0DW_T9ds-Bc;5Pg(pi++U{N3AvBq8qSrN z-%UOGZrDRju;u2fY=bcZE_Xkkq603+7Z^%(fWWv`?EXkBQ?JvcO3}k?Fd!g`2}CT% z6qkivd@ZxYTswIU<4)%uSeO~lBrddQz5TOqd&e|UZQ5dGPD2kbsuBuGEHQ-f=FYQY zHtwowLnV;?CAl*<7H~4by_e zN4Jm7JNZ9L#@2cH+bul!Xlo0bZ#|GjTO)9!Wl3^8#<~l{-ur0Xp!)ot$T)eE>cYl2 zzS{zCXcAT;45sw0AwwM|G$s8h&wZ@B;b4o+FYi^X`o7*g zym`U-ET*s@^CE(g2?c%}GP6+JhDx;y(u{)YY;E{iD1%SgoqSr_J|qlLMPJ~~Or>@` zhsSMK8(1D2qCzCf{0b~;N|+1L8}aI9M8_FNCj62@LNa}6AO)IU!X?R>UMlM=(<1Az z)^T_^Krg}HiivhI+|#qO;W&9kMng7T043qPLdWrjj&;1^f-ZK^Y4N68e*9@%#y=F& zV>iq(4&WQSroXx5zQaV4N(O^Ciz zcWD|9JZ~??gX|=Y7fviZ=a(#^r6*sB5<2WPBbl4|2V6ApErMeA)24184246F?gN<}$on#+214uO~&M%}6(1 zKyI4H;9FUFspcooap>xq5W_TR8RB)FD7UVY;kHgt094&w7q>P!WWr@jle8vfS|Yc# zLju{NLo@mw)rP-O;E-9lL6FpkQr5Ngcfb5(M1EVhW7gF z39edLD(Q^o+AV?RXTuCl1&RaJ)y7FLw$?AswWI4o^DT#w?Y(AhgzRU&KyhGQ(g$rYA-^ z{nE%W6V}G72{MK!zgOi7H-tu7B*%@Pei6qugbE2s3rr9&fiIJ+-WtAghzvY$gf6@` z&7pd!o>617n{*YF6(_?-8>pg6KWYe?&Z-dlC}m86FiA&e-zhO1*G|3}>wFv7FY=tG zct=0Ia`T7m8Z3*88M9(@cd)$bPv7vU_e3v3ebu1YD6?(a@j16iO|Z<1MxV^drJ8)I z(~m$Oe^e%uV2>z;YfKE&GL0Iv1@H#PaKuBL!S73JNnkn^8y+uY%u)=E(+uOmp}l4K z}#H zA>37l>upno@lD@Lmm1{m)}7mRq1K9iNuZ6UxbFlZT#i-)>KD!r8tN~b8eHkF%?h4( zRw=*x862&rfZ_arPF?{a&vPm=o<^-^9%^l450wt#()Ei8PUYy!<_p0>5|@dL|!nN$w4NTPYI zb<59+jc7Lgx!>;_z9&4VkmWRF!qVSu>$uuk^t-y}^yVbhl83QgETef=8nRUasXkO* z`)$#(;b}@kw6sye13fG0-!1wP6Io0am8XUmGApD``^BT1g_ss`l_vUIZ|`_~9-qhO V@mcx&{{R30|Nn}m>Usda006I9r27B> literal 0 HcmV?d00001 diff --git a/charts/argo/requirements.lock b/charts/argo/requirements.lock index ef788117..c0b8525b 100644 --- a/charts/argo/requirements.lock +++ b/charts/argo/requirements.lock @@ -1,6 +1,6 @@ dependencies: - name: minio repository: https://kubernetes-charts.storage.googleapis.com/ - version: 0.4.3 -digest: sha256:2282e3be8457161f7fb79fe1a6a871a972146574b365e69b18d9c46e16d6c47d -generated: 2018-01-03T12:09:41.060101-08:00 + version: 1.3.3 +digest: sha256:d53e797d51304b850951bf6ecb57ad60d34cbccfa39a7d7bd0adf65435bbee78 +generated: 2018-06-01T10:03:04.087865-04:00 diff --git a/charts/argo/requirements.yaml b/charts/argo/requirements.yaml index fd789f07..452a3e76 100644 --- a/charts/argo/requirements.yaml +++ b/charts/argo/requirements.yaml @@ -1,5 +1,5 @@ dependencies: - name: minio - version: 0.4.3 + version: 1.3.3 repository: https://kubernetes-charts.storage.googleapis.com/ - condition: installMinio + condition: minio.install diff --git a/charts/argo/templates/NOTES.txt b/charts/argo/templates/NOTES.txt index d86b4b2d..4fc67e30 100644 --- a/charts/argo/templates/NOTES.txt +++ b/charts/argo/templates/NOTES.txt @@ -9,9 +9,9 @@ echo '{"apiVersion": "apiextensions.k8s.io/v1beta1","kind": "CustomResourceDefin kubectl get services -o wide | grep {{ .Release.Name }}-{{ .Values.uiName }} -{{ if .Values.installMinio }} +{{ if .Values.minio.install }} -3. Access Minio UI and create bucket '{{ .Values.minioBucketName }}'. Minio UI is available on port 9000 and available via external URL. URL might be retrieved using following +3. Access Minio UI and create bucket '{{ .Values.minio.defaultBucket.name }}'. Minio UI is available on port 9000 and available via external URL. URL might be retrieved using following command: kubectl get services -o wide | grep {{ .Release.Name }}-minio-svc diff --git a/charts/argo/templates/_helpers.tpl b/charts/argo/templates/_helpers.tpl index f0d83d2e..2e375b59 100644 --- a/charts/argo/templates/_helpers.tpl +++ b/charts/argo/templates/_helpers.tpl @@ -14,3 +14,23 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this {{- $name := default .Chart.Name .Values.nameOverride -}} {{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} {{- end -}} + +{{- define "workflow-crd-json" }} +{ + "apiVersion": "apiextensions.k8s.io/v1beta1", + "kind": "CustomResourceDefinition", + "metadata": { + "name": "workflows.argoproj.io" + }, + "spec": { + "group": "argoproj.io", + "names": { + "kind": "Workflow", + "plural": "workflows", + "shortNames": ["wf"] + }, + "scope": "Namespaced", + "version": "v1alpha1" + } +} +{{- end}} diff --git a/charts/argo/templates/_workflow-crd.json b/charts/argo/templates/_workflow-crd.tpl similarity index 97% rename from charts/argo/templates/_workflow-crd.json rename to charts/argo/templates/_workflow-crd.tpl index ef26b415..29bc2b27 100644 --- a/charts/argo/templates/_workflow-crd.json +++ b/charts/argo/templates/_workflow-crd.tpl @@ -16,4 +16,4 @@ "version": "v1alpha1" } } -{{- end}} \ No newline at end of file +{{- end}} diff --git a/charts/argo/templates/ui-cluster-role.yaml b/charts/argo/templates/ui-cluster-role.yaml new file mode 100644 index 00000000..b66f29b8 --- /dev/null +++ b/charts/argo/templates/ui-cluster-role.yaml @@ -0,0 +1,29 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ .Release.name }}-{{ .Values.ui.name}}-cluster-role +rules: +- apiGroups: + - "" + resources: + - pods + - pods/exec + - pods/log + verbs: + - get + - list + - watch +- apiGroups: + - "" + resources: + - secrets + verbs: + - get +- apiGroups: + - argoproj.io + resources: + - workflows + verbs: + - get + - list + - watch diff --git a/charts/argo/templates/ui-crb.yaml b/charts/argo/templates/ui-crb.yaml new file mode 100644 index 00000000..bb7ccd62 --- /dev/null +++ b/charts/argo/templates/ui-crb.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: {{ .Release.name }}-{{ .Values.ui.name}}-crb +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ .Release.name }}-{{ .Values.ui.name}}-cluster-role +subjects: +- kind: ServiceAccount + name: {{ .Values.ui.serviceAccount }} + namespace: {{ .Release.Name }} diff --git a/charts/argo/templates/ui-deployment.yaml b/charts/argo/templates/ui-deployment.yaml index bf237b6b..661ce610 100644 --- a/charts/argo/templates/ui-deployment.yaml +++ b/charts/argo/templates/ui-deployment.yaml @@ -1,21 +1,22 @@ apiVersion: extensions/v1beta1 kind: Deployment metadata: - name: {{ .Release.Name }}-{{ .Values.uiName}} + name: {{ .Release.Name }}-{{ .Values.ui.name}} labels: chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} release: {{ .Release.Name }} heritage: {{ .Release.Service }} + namspace: {{ .Release.Namespace }} spec: template: metadata: labels: - app: {{ .Release.Name }}-{{ .Values.uiName}} + app: {{ .Release.Name }}-{{ .Values.ui.name}} release: {{ .Release.Name }} spec: containers: - name: ui - image: "{{ .Values.imagesNamespace }}/{{ .Values.uiImage }}:{{ .Values.imagesTag }}" + image: "{{ .Values.images.namespace }}/{{ .Values.images.ui }}:{{ .Values.images.tag }}" env: - name: IN_CLUSTER value: "true" diff --git a/charts/argo/templates/ui-sa.yaml b/charts/argo/templates/ui-sa.yaml new file mode 100644 index 00000000..bba4b093 --- /dev/null +++ b/charts/argo/templates/ui-sa.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.ui.serviceAccount }} + namspace: {{ .Release.Namespace }} diff --git a/charts/argo/templates/ui-service.yaml b/charts/argo/templates/ui-service.yaml index 96e2c38f..83d0b25e 100644 --- a/charts/argo/templates/ui-service.yaml +++ b/charts/argo/templates/ui-service.yaml @@ -1,17 +1,18 @@ apiVersion: v1 kind: Service metadata: - name: {{ .Release.Name }}-{{ .Values.uiName}} + name: {{ .Release.Name }}-{{ .Values.ui.name}} labels: chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} release: {{ .Release.Name }} heritage: {{ .Release.Service }} + namspace: {{ .Release.Namespace }} spec: ports: - port: 80 protocol: TCP targetPort: 8001 selector: - app: {{ .Release.Name }}-{{ .Values.uiName}} + app: {{ .Release.Name }}-{{ .Values.ui.name }} sessionAffinity: None - type: {{ .Values.uiServiceType }} + type: {{ .Values.ui.serviceType }} diff --git a/charts/argo/templates/workflow-controller-clusterrole.yaml b/charts/argo/templates/workflow-controller-clusterrole.yaml new file mode 100644 index 00000000..7e6368ff --- /dev/null +++ b/charts/argo/templates/workflow-controller-clusterrole.yaml @@ -0,0 +1,42 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ .Release.name }}-{{ .Values.controller.name}}-cluster-role +rules: +- apiGroups: + - "" + resources: + - pods + - pods/exec + verbs: + - create + - get + - list + - watch + - update + - patch +- apiGroups: + - "" + resources: + - configmaps + verbs: + - get + - watch + - list +- apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - create + - delete +- apiGroups: + - argoproj.io + resources: + - workflows + verbs: + - get + - list + - watch + - update + - patch diff --git a/charts/argo/templates/workflow-controller-config-map.yaml b/charts/argo/templates/workflow-controller-config-map.yaml index b0d9038f..081719f4 100644 --- a/charts/argo/templates/workflow-controller-config-map.yaml +++ b/charts/argo/templates/workflow-controller-config-map.yaml @@ -1,20 +1,21 @@ apiVersion: v1 kind: ConfigMap metadata: - name: {{ .Release.Name }}-{{ .Values.controllerName }}-configmap + name: {{ .Release.Name }}-{{ .Values.controller.name }}-configmap labels: chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} release: {{ .Release.Name }} heritage: {{ .Release.Service }} + namespace: {{ .Release.Namespace }} data: config: | - {{- if .Values.useReleaseAsInstanceID }} + {{- if .Values.controller.useReleaseAsInstanceID }} instanceID: {{ .Release.Name }} {{- else }} - instanceID: {{ .Values.instanceID }} + instanceID: {{ .Values.controller.instanceID }} {{- end }} artifactRepository: - {{- if or .Values.installMinio .Values.useDefaultArtifactRepo }} + {{- if or .Values.minio.install .Values.useDefaultArtifactRepo }} s3: {{- if .Values.useStaticCredentials }} accessKeySecret: @@ -24,8 +25,8 @@ data: key: {{ .Values.artifactRepository.s3.secretKeySecret.key }} name: {{ .Values.artifactRepository.s3.secretKeySecret.name | default (printf "%s-%s" .Release.Name "minio-user") }} {{- end }} - bucket: {{ .Values.artifactRepository.s3.bucket | default .Values.minioBucketName }} + bucket: {{ .Values.artifactRepository.s3.bucket | default .Values.minio.defaultBucket.name }} endpoint: {{ .Values.artifactRepository.s3.endpoint | default (printf "%s-%s" .Release.Name "minio-svc:9000") }} insecure: {{ .Values.artifactRepository.s3.insecure }} {{- end}} - executorImage: "{{ .Values.imagesNamespace }}/{{ .Values.executorImage }}:{{ .Values.imagesTag }}" + executorImage: "{{ .Values.images.namespace }}/{{ .Values.images.executor }}:{{ .Values.images.tag }}" diff --git a/charts/argo/templates/workflow-controller-crb.yaml b/charts/argo/templates/workflow-controller-crb.yaml new file mode 100644 index 00000000..2af560f0 --- /dev/null +++ b/charts/argo/templates/workflow-controller-crb.yaml @@ -0,0 +1,23 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: {{ .Release.name }}-{{ .Values.controller.name}}-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ .Release.name }}-{{ .Values.controller.name}}-cluster-role +subjects: + - kind: ServiceAccount + name: {{ .Values.controller.serviceAccount }} + namespace: {{ .Release.Namespace }} +{{- if .Values.controller.workflowNamespaces }} +{{- $uiServiceAccount := .Values.controller.serviceAccount }} +{{- $namespace := .Release.Namespace }} +{{- range $key := .Values.controller.workflowNamespaces }} + {{- if not (eq $key $namespace) }} + - kind: ServiceAccount + name: {{ $uiServiceAccount }} + namespace: {{ $key }} + {{- end }} +{{- end }} +{{- end }} diff --git a/charts/argo/templates/workflow-controller-deployment.yaml b/charts/argo/templates/workflow-controller-deployment.yaml index 808e57dd..d4291bd3 100644 --- a/charts/argo/templates/workflow-controller-deployment.yaml +++ b/charts/argo/templates/workflow-controller-deployment.yaml @@ -1,24 +1,25 @@ apiVersion: extensions/v1beta1 kind: Deployment metadata: - name: {{ .Release.Name }}-{{ .Values.controllerName}} + name: {{ .Release.Name }}-{{ .Values.controller.name}} labels: - app: {{ .Release.Name }}-{{ .Values.controllerName}} + app: {{ .Release.Name }}-{{ .Values.controller.name}} chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} release: {{ .Release.Name }} + namespace: {{ .Release.Namespace }} heritage: {{ .Release.Service }} spec: template: metadata: labels: - app: {{ .Release.Name }}-{{ .Values.controllerName}} + app: {{ .Release.Name }}-{{ .Values.controller.name}} release: {{ .Release.Name }} spec: containers: - name: controller - image: "{{ .Values.imagesNamespace }}/{{ .Values.controllerImage }}:{{ .Values.imagesTag }}" + image: "{{ .Values.images.namespace }}/{{ .Values.images.controller }}:{{ .Values.images.tag }}" command: [ "workflow-controller" ] - args: ["--configmap", "{{ .Release.Name }}-{{ .Values.controllerName}}-configmap"] + args: ["--configmap", "{{ .Release.Name }}-{{ .Values.controller.name}}-configmap"] env: - name: ARGO_NAMESPACE valueFrom: diff --git a/charts/argo/templates/workflow-controller-sa.yaml b/charts/argo/templates/workflow-controller-sa.yaml new file mode 100644 index 00000000..c7fa24f0 --- /dev/null +++ b/charts/argo/templates/workflow-controller-sa.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.controller.serviceAccount }} + namespace: {{ .Release.Namespace }} diff --git a/charts/argo/values.yaml b/charts/argo/values.yaml index 22311334..0372a288 100644 --- a/charts/argo/values.yaml +++ b/charts/argo/values.yaml @@ -1,31 +1,44 @@ -imagesNamespace: argoproj -controllerImage: workflow-controller -uiImage: argoui -executorImage: argoexec -imagesTag: v2.1.0-alpha1 -controllerName: workflow-controller +images: + namespace: argoproj + controller: workflow-controller + ui: argoui + executor: argoexec + tag: v2.1.1 + +controller: + serviceAccount: argo + name: workflow-controller + workflowNamespaces: + - default + # If set to true then chart set controller instance id to release name + useReleaseAsInstanceID: true + instanceID: + +ui: + name: ui + serviceType: LoadBalancer + serviceAccount: argo-ui + # Enables ability to SSH into pod using web UI + enableWebConsole: false -# Enables ability to SSH into pod using web UI -enableWebConsole: false -uiName: ui -uiServiceType: LoadBalancer crdVersion: v1alpha1 -# If set to true then chart set controller instance id to release name -useReleaseAsInstanceID: false -instanceID: - useDefaultArtifactRepo: false useStaticCredentials: true # If set to true then chart installs minio and generate according artifactRepository section in workflow controller config map -installMinio: true -minioBucketName: argo-artifacts +minio: + # This is not used by the subchart, but makes sense to group here. + install: true + defaultBucket: + enabled: true + name: argo-artifacts artifactRepository: s3: + #default minio creds accessKeySecret: - key: accesskey + key: AKIAIOSFODNN7EXAMPLE secretKeySecret: - key: secretkey + key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY insecure: true From ab5f2edf9d617d665ceefc2c7688db1d8b191dee Mon Sep 17 00:00:00 2001 From: Matthew Magaldi Date: Fri, 3 Aug 2018 04:18:31 -0400 Subject: [PATCH 02/11] adding argo-events-chart (#9) --- charts/argo-events/.helmignore | 21 +++++++++++ charts/argo-events/Chart.yaml | 15 ++++++++ charts/argo-events/README.md | 13 +++++++ charts/argo-events/templates/_helpers.tpl | 37 +++++++++++++++++++ charts/argo-events/templates/_sensor-crd.tpl | 20 ++++++++++ .../templates/apply-sensor-crd-job.yaml | 18 +++++++++ .../sensor-controller-clusterrole.yaml | 15 ++++++++ .../sensor-controller-configmap.yaml | 16 ++++++++ .../templates/sensor-controller-crb.yaml | 12 ++++++ .../sensor-controller-deployment.yaml | 33 +++++++++++++++++ .../templates/sensor-controller-sa.yaml | 4 ++ .../templates/signals-clusterrole.yaml | 11 ++++++ charts/argo-events/templates/signals-crb.yaml | 12 ++++++ charts/argo-events/templates/signals-sa.yaml | 4 ++ charts/argo-events/values.yaml | 25 +++++++++++++ 15 files changed, 256 insertions(+) create mode 100644 charts/argo-events/.helmignore create mode 100644 charts/argo-events/Chart.yaml create mode 100644 charts/argo-events/README.md create mode 100644 charts/argo-events/templates/_helpers.tpl create mode 100644 charts/argo-events/templates/_sensor-crd.tpl create mode 100644 charts/argo-events/templates/apply-sensor-crd-job.yaml create mode 100644 charts/argo-events/templates/sensor-controller-clusterrole.yaml create mode 100644 charts/argo-events/templates/sensor-controller-configmap.yaml create mode 100644 charts/argo-events/templates/sensor-controller-crb.yaml create mode 100644 charts/argo-events/templates/sensor-controller-deployment.yaml create mode 100644 charts/argo-events/templates/sensor-controller-sa.yaml create mode 100644 charts/argo-events/templates/signals-clusterrole.yaml create mode 100644 charts/argo-events/templates/signals-crb.yaml create mode 100644 charts/argo-events/templates/signals-sa.yaml create mode 100644 charts/argo-events/values.yaml diff --git a/charts/argo-events/.helmignore b/charts/argo-events/.helmignore new file mode 100644 index 00000000..f0c13194 --- /dev/null +++ b/charts/argo-events/.helmignore @@ -0,0 +1,21 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*~ +# Various IDEs +.project +.idea/ +*.tmproj diff --git a/charts/argo-events/Chart.yaml b/charts/argo-events/Chart.yaml new file mode 100644 index 00000000..de65136c --- /dev/null +++ b/charts/argo-events/Chart.yaml @@ -0,0 +1,15 @@ +apiVersion: v1 +description: A Helm chart to install Argo-Events in k8s Cluster +name: argo-events +version: 0.1.0 +keywords: +- argo-events +- sensor-controller +sources: +- https://github.com/argoproj/argo-events +maintainers: +- name: Matt Magaldi + email: mmagaldi@blackrock.com +- name: Vaibhav Page + email: vpage@blackrock.com +appVersion: 0.1.0 diff --git a/charts/argo-events/README.md b/charts/argo-events/README.md new file mode 100644 index 00000000..e08cf4ba --- /dev/null +++ b/charts/argo-events/README.md @@ -0,0 +1,13 @@ +# Argo-Events Helm Chart +This helm chart installs the [argo-events](https://github.com/argoproj/argo-events) application. This application comes packaged with: +- Sensor Custom Resource Definition +- Sensor Controller Deployment +- Sensor Controller ConfigMap +- Sensor Controller Service Account +- Sensor Controller Cluster Roles +- Sensor Controller Cluster Role Bindings + + +Note: the associated `argo-events` cluster role and cluster role bindings can be found in the [roles](https://blade-git.blackrock.com/cloud-native/roles) repository. The purpose that these aren't included in this Helm chart is that we do not have the required permissions to create these resources in the Kubernetes clusters. Reach out to `+Group Kubernetes Support` for help in setting up these roles. + +## Chart Values diff --git a/charts/argo-events/templates/_helpers.tpl b/charts/argo-events/templates/_helpers.tpl new file mode 100644 index 00000000..63a61c45 --- /dev/null +++ b/charts/argo-events/templates/_helpers.tpl @@ -0,0 +1,37 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +*/}} +{{- define "fullname" -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{- define "sensor-crd-json" }} +{ + "apiVersion": "apiextensions.k8s.io/v1beta1", + "kind": "CustomResourceDefinition", + "metadata": { + "name": "sensors.argoproj.io" + }, + "spec": { + "group": "argoproj.io", + "names": { + "kind": "Sensor", + "listKind": "SensorList", + "plural": "sensors", + "singular": "sensor", + }, + "scope": "Namespaced", + "version": "v1alpha1" + } +} +{{- end}} diff --git a/charts/argo-events/templates/_sensor-crd.tpl b/charts/argo-events/templates/_sensor-crd.tpl new file mode 100644 index 00000000..f087c226 --- /dev/null +++ b/charts/argo-events/templates/_sensor-crd.tpl @@ -0,0 +1,20 @@ +{{- define "sensor-crd-json" }} +{ + "apiVersion": "apiextensions.k8s.io/v1beta1", + "kind": "CustomResourceDefinition", + "metadata": { + "name": "sensors.argoproj.io" + }, + "spec": { + "group": "argoproj.io", + "names": { + "kind": "Sensor", + "listKind": "SensorList", + "plural": "sensors", + "singular": "sensor", + }, + "scope": "Namespaced", + "version": "v1alpha1" + } +} +{{- end}} diff --git a/charts/argo-events/templates/apply-sensor-crd-job.yaml b/charts/argo-events/templates/apply-sensor-crd-job.yaml new file mode 100644 index 00000000..7f542894 --- /dev/null +++ b/charts/argo-events/templates/apply-sensor-crd-job.yaml @@ -0,0 +1,18 @@ +apiVersion: batch/v1 +kind: Job +metadata: + name: {{ .Release.Name }}-apply-sensor-crd + annotations: + helm.sh/hook: pre-install + helm.sh/hook-delete-policy: hook-succeeded +spec: + backoffLimit: 5 + activeDeadlineSeconds: 100 + template: + spec: + containers: + - name: kubectl-apply + image: lachlanevenson/k8s-kubectl + command: ["/bin/sh"] + args: ["-c", 'echo ''{{- include "sensor-crd-json" .}}'' | kubectl apply -f -'] + restartPolicy: Never \ No newline at end of file diff --git a/charts/argo-events/templates/sensor-controller-clusterrole.yaml b/charts/argo-events/templates/sensor-controller-clusterrole.yaml new file mode 100644 index 00000000..a1d53e8d --- /dev/null +++ b/charts/argo-events/templates/sensor-controller-clusterrole.yaml @@ -0,0 +1,15 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ .Release.name }}-{{ .Values.controller.name}}-cluster-role +rules: +- apiGroups: ["argoproj.io"] + resources: ["sensors"] + verbs: ["get", "list", "watch", "update", "patch"] +# The following rules define what the triggers can do +- apiGroups: ["argoproj.io"] + resources: ["workflows"] + verbs: ["create", "delete"] +- apiGroups: [""] + resources: ["configmaps", "secrets", "pods"] + verbs: ["get", "watch", "list", "patch"] diff --git a/charts/argo-events/templates/sensor-controller-configmap.yaml b/charts/argo-events/templates/sensor-controller-configmap.yaml new file mode 100644 index 00000000..c3dc4661 --- /dev/null +++ b/charts/argo-events/templates/sensor-controller-configmap.yaml @@ -0,0 +1,16 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ .Release.Name }}-{{ .Values.controller.name }}-configmap + labels: + chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} + release: {{ .Release.Name }} + heritage: {{ .Release.Service }} +data: + config: | + namespace: {{ .Release.Namespace }} + {{- if .Values.useReleaseAsInstanceID }} + instanceID: {{ .Release.Name }} + {{- else }} + instanceID: {{ .Values.instanceID }} + {{- end }} diff --git a/charts/argo-events/templates/sensor-controller-crb.yaml b/charts/argo-events/templates/sensor-controller-crb.yaml new file mode 100644 index 00000000..b7d54544 --- /dev/null +++ b/charts/argo-events/templates/sensor-controller-crb.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: {{ .Release.name }}-{{ .Values.controller.name}}-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ .Release.name }}-{{ .Values.controller.name}}-cluster-role +subjects: +- kind: ServiceAccount + name: {{ .Values.controller.serviceAccount }} + namespace: {{ .Release.Namespace }} diff --git a/charts/argo-events/templates/sensor-controller-deployment.yaml b/charts/argo-events/templates/sensor-controller-deployment.yaml new file mode 100644 index 00000000..a53780f5 --- /dev/null +++ b/charts/argo-events/templates/sensor-controller-deployment.yaml @@ -0,0 +1,33 @@ +apiVersion: apps/v1beta1 +kind: Deployment +metadata: + name: {{ .Release.Name }}-{{ .Values.controller.name }} + labels: + app: {{ .Release.Name }}-{{ .Values.controller.name }} + chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} + release: {{ .Release.Name }} + heritage: {{ .Release.Service }} +spec: + replicas: {{ .Values.controller.replicaCount }} + selector: + matchLabels: + app: {{ .Release.Name }}-{{ .Values.controller.name }} + release: {{ .Release.Name }} + template: + metadata: + labels: + app: {{ .Release.Name }}-{{ .Values.controller.name }} + release: {{ .Release.Name }} + spec: + serviceAccountName: {{ .Values.controller.serviceAccount }} + containers: + - name: {{ .Values.controller.name }} + image: "{{ .Values.registry }}/{{ .Values.controller.image }}:{{ .Values.controller.tag }}" + imagePullPolicy: {{ .Values.imagePullPolicy }} + env: + - name: SENSOR_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: SENSOR_CONFIG_MAP + value: {{ .Release.Name }}-{{ .Values.controller.name }}-configmap diff --git a/charts/argo-events/templates/sensor-controller-sa.yaml b/charts/argo-events/templates/sensor-controller-sa.yaml new file mode 100644 index 00000000..af3ef519 --- /dev/null +++ b/charts/argo-events/templates/sensor-controller-sa.yaml @@ -0,0 +1,4 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.controller.serviceAccount }} diff --git a/charts/argo-events/templates/signals-clusterrole.yaml b/charts/argo-events/templates/signals-clusterrole.yaml new file mode 100644 index 00000000..dfec0e27 --- /dev/null +++ b/charts/argo-events/templates/signals-clusterrole.yaml @@ -0,0 +1,11 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: {{ .Release.name }}-signals-cluster-role +rules: +- apiGroups: [""] + resources: ["pods"] + verbs: ["watch", "list", "patch"] +- apiGroups: {{ .Values.signals.listenRoles.apiGroups }} + resources: {{ .Values.signals.listenRoles.resources }} + verbs: ["get", "list", "watch"] \ No newline at end of file diff --git a/charts/argo-events/templates/signals-crb.yaml b/charts/argo-events/templates/signals-crb.yaml new file mode 100644 index 00000000..3a265e5b --- /dev/null +++ b/charts/argo-events/templates/signals-crb.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: {{ .Release.name }}-signals-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ .Release.name }}-signals-cluster-role +subjects: +- kind: ServiceAccount + name: {{ .Values.signals.serviceAccount }} + namespace: {{ .Release.Namespace }} diff --git a/charts/argo-events/templates/signals-sa.yaml b/charts/argo-events/templates/signals-sa.yaml new file mode 100644 index 00000000..9baaa73b --- /dev/null +++ b/charts/argo-events/templates/signals-sa.yaml @@ -0,0 +1,4 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ .Values.signals.serviceAccount }} diff --git a/charts/argo-events/values.yaml b/charts/argo-events/values.yaml new file mode 100644 index 00000000..ca0510fa --- /dev/null +++ b/charts/argo-events/values.yaml @@ -0,0 +1,25 @@ +registry: argoproj +imagePullPolicy: Always + +# Version of the Sensor CRD +crdVersion: v1alpha1 + +# If set to true then chart set controller instance id to release name +useReleaseAsInstanceID: true +instanceID: 1 + +# controller +controller: + name: sensor-controller + image: sensor-controller + tag: latest + replicaCount: 1 + serviceAccount: argo-events + +# signal microservices +signals: + serviceAccount: argo-signals + # this controls what the resource signal pod can listen to + listenRoles: + apiGroups: ["argoproj.io", ""] + resources: ["sensors", "workflows", "pods"] From 15163ef5858cbdfb883a67ae95a1cd1e7d2fb393 Mon Sep 17 00:00:00 2001 From: Stefan Henseler Date: Fri, 3 Aug 2018 10:19:12 +0200 Subject: [PATCH 03/11] fixes capitalization error for release name reference (#10) --- charts/argo/templates/ui-cluster-role.yaml | 2 +- charts/argo/templates/ui-crb.yaml | 4 ++-- charts/argo/templates/workflow-controller-clusterrole.yaml | 2 +- charts/argo/templates/workflow-controller-crb.yaml | 4 ++-- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/charts/argo/templates/ui-cluster-role.yaml b/charts/argo/templates/ui-cluster-role.yaml index b66f29b8..f95d945d 100644 --- a/charts/argo/templates/ui-cluster-role.yaml +++ b/charts/argo/templates/ui-cluster-role.yaml @@ -1,7 +1,7 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - name: {{ .Release.name }}-{{ .Values.ui.name}}-cluster-role + name: {{ .Release.Name }}-{{ .Values.ui.name}}-cluster-role rules: - apiGroups: - "" diff --git a/charts/argo/templates/ui-crb.yaml b/charts/argo/templates/ui-crb.yaml index bb7ccd62..daa1f302 100644 --- a/charts/argo/templates/ui-crb.yaml +++ b/charts/argo/templates/ui-crb.yaml @@ -1,11 +1,11 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: - name: {{ .Release.name }}-{{ .Values.ui.name}}-crb + name: {{ .Release.Name }}-{{ .Values.ui.name}}-crb roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: {{ .Release.name }}-{{ .Values.ui.name}}-cluster-role + name: {{ .Release.Name }}-{{ .Values.ui.name}}-cluster-role subjects: - kind: ServiceAccount name: {{ .Values.ui.serviceAccount }} diff --git a/charts/argo/templates/workflow-controller-clusterrole.yaml b/charts/argo/templates/workflow-controller-clusterrole.yaml index 7e6368ff..35451f3e 100644 --- a/charts/argo/templates/workflow-controller-clusterrole.yaml +++ b/charts/argo/templates/workflow-controller-clusterrole.yaml @@ -1,7 +1,7 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - name: {{ .Release.name }}-{{ .Values.controller.name}}-cluster-role + name: {{ .Release.Name }}-{{ .Values.controller.name}}-cluster-role rules: - apiGroups: - "" diff --git a/charts/argo/templates/workflow-controller-crb.yaml b/charts/argo/templates/workflow-controller-crb.yaml index 2af560f0..5dc55111 100644 --- a/charts/argo/templates/workflow-controller-crb.yaml +++ b/charts/argo/templates/workflow-controller-crb.yaml @@ -1,11 +1,11 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: - name: {{ .Release.name }}-{{ .Values.controller.name}}-binding + name: {{ .Release.Name }}-{{ .Values.controller.name}}-binding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: {{ .Release.name }}-{{ .Values.controller.name}}-cluster-role + name: {{ .Release.Name }}-{{ .Values.controller.name}}-cluster-role subjects: - kind: ServiceAccount name: {{ .Values.controller.serviceAccount }} From 4696111a145715a2e9166096b310ed5d9671f196 Mon Sep 17 00:00:00 2001 From: Antons Kranga Date: Mon, 6 Aug 2018 08:08:55 +0300 Subject: [PATCH 04/11] Invalid json syntax (#11) (#12) * Invalid json syntax (#11) * More of invalid json syntax (#11) --- charts/argo-events/templates/_helpers.tpl | 2 +- charts/argo-events/templates/_sensor-crd.tpl | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/charts/argo-events/templates/_helpers.tpl b/charts/argo-events/templates/_helpers.tpl index 63a61c45..55c1142c 100644 --- a/charts/argo-events/templates/_helpers.tpl +++ b/charts/argo-events/templates/_helpers.tpl @@ -28,7 +28,7 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this "kind": "Sensor", "listKind": "SensorList", "plural": "sensors", - "singular": "sensor", + "singular": "sensor" }, "scope": "Namespaced", "version": "v1alpha1" diff --git a/charts/argo-events/templates/_sensor-crd.tpl b/charts/argo-events/templates/_sensor-crd.tpl index f087c226..76761908 100644 --- a/charts/argo-events/templates/_sensor-crd.tpl +++ b/charts/argo-events/templates/_sensor-crd.tpl @@ -11,7 +11,7 @@ "kind": "Sensor", "listKind": "SensorList", "plural": "sensors", - "singular": "sensor", + "singular": "sensor" }, "scope": "Namespaced", "version": "v1alpha1" From edb3e6b41afd96be091d0f446e014a17db76e797 Mon Sep 17 00:00:00 2001 From: louis-murray Date: Tue, 14 Aug 2018 17:30:45 -0400 Subject: [PATCH 05/11] set minio to not be installed by default (#13) helm has issues with conditional sub charts of a sub chart so I think it'd be better to have minio not be installed as part of the chart by default so if you want to leverage this chart as part of another chart you don't have to worry about unintended resources getting created on cluster. --- charts/argo/values.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/charts/argo/values.yaml b/charts/argo/values.yaml index 0372a288..7a93f926 100644 --- a/charts/argo/values.yaml +++ b/charts/argo/values.yaml @@ -29,7 +29,7 @@ useStaticCredentials: true # If set to true then chart installs minio and generate according artifactRepository section in workflow controller config map minio: # This is not used by the subchart, but makes sense to group here. - install: true + install: false defaultBucket: enabled: true name: argo-artifacts From b6588e85b8b2bff989a3861d9b21182454a9ca7a Mon Sep 17 00:00:00 2001 From: Justin Nauman Date: Thu, 16 Aug 2018 00:39:27 -0700 Subject: [PATCH 06/11] Chart Grooming (#14) * Chart Grooming - Changed the default `workflow-controller` installation to use the `ServiceAccount` that is created and bound. - Customized the instanceID logic: - No longer defaults to installed (this was very difficult to see/understand when coming from starter tutorials) - Kept logic to allow for release name or explicit mappings but changed structure a bit - Added in optional configuration for: - CRD Install hook's ServiceAccount to allow clean install if your default roles aren't privledged - Optional Pod and Service annotations - Controller logging level configuration - Minio Customizations - Changed the Secret configuration to properly represent the path of a secret instead of the actual contents - Changed the names of the secret and service that are represented to mirror that of the underlying chart * Adding in role bindings for minio secrets if installed --- charts/argo/Chart.yaml | 2 +- charts/argo/README.md | 23 ++++-- .../templates/apply-workflow-crd-job.yaml | 3 +- charts/argo/templates/ui-deployment.yaml | 8 ++ charts/argo/templates/ui-service.yaml | 3 + .../worfkflow-controller-secrets-access.yaml | 18 +++++ .../workflow-controller-config-map.yaml | 12 +-- .../workflow-controller-deployment.yaml | 12 ++- .../workflow-controller-minio-secret-crb.yaml | 25 ++++++ charts/argo/values.yaml | 78 ++++++++++++------- 10 files changed, 143 insertions(+), 41 deletions(-) create mode 100644 charts/argo/templates/worfkflow-controller-secrets-access.yaml create mode 100644 charts/argo/templates/workflow-controller-minio-secret-crb.yaml diff --git a/charts/argo/Chart.yaml b/charts/argo/Chart.yaml index cdbafc0e..0616b08c 100644 --- a/charts/argo/Chart.yaml +++ b/charts/argo/Chart.yaml @@ -1,4 +1,4 @@ apiVersion: v1 description: A Helm chart for Kubernetes name: argo -version: 0.1.1 +version: 0.2.0 diff --git a/charts/argo/README.md b/charts/argo/README.md index 8bd449b6..d9ec2be3 100644 --- a/charts/argo/README.md +++ b/charts/argo/README.md @@ -3,15 +3,26 @@ This chart is used to set up argo and it's needed dependencies through one comma If you want your deployment of this helm chart to most closely match the [argo CLI](https://github.com/argoproj/argo), you should deploy it in the `kube-system` namespace. +## Pre-Requisites +This chart uses an install hook to configure the CRD definition. Installation of CRDs is a somewhat privileged process in itself and in RBAC enabled clusters the `default` service account for namespaces does not typically have the ability to do create these. + +A few options are: +- Setup the CRD yourself manually and use the `--no-hooks` options of `helm install` +- Manually create a ServiceAccount in the Namespace which your release will be deployed w/ appropriate bindings to perform this action and set the `init.serviceAccount` attribute +- Augment the `default` ServiceAccount permissions in the Namespace in which your Release is deployed to have the appropriate permissions + +## Usage Notes: +This chart defaults to setting the `controller.instanceID.enabled` to `false` now, which means the deployed controller will act upon any workflow deployed to the cluster. If you would like to limit the behavior and deploy multiple workflow controllers, please use the `controller.instanceID.enabled` attribute along with one of it's configuration options to set the `instanceID` of the workflow controller to be properly scoped for your needs. + ## Values -The `values.yaml` contains items used to tweak a deployment of this chart. +The `values.yaml` contains items used to tweak a deployment of this chart. Fields to note: -* `controller.useReleaseAsInstanceID`: If set to true then chart set controller instance id to release name - - __Note:__ If this is set to false then `controller.instanceId` must be set +* `controller.instanceID.enabled`: If set to true, the Argo Controller will **ONLY** monitor Workflow submissions with a `--instanceid` attribute +* `controller.instanceID.useReleaseName`: If set to true then chart set controller instance id to release name +* `controller.instanceID.explicitID`: Allows customization of an instance id for the workflow controller to monitor * `controller.workflowNamespaces`: This is a list of namespaces where workflows will be ran * `ui.enableWebConsole`: Enables ability to SSH into pod using web UI -* `minio.install`: If this is true, we'll install [minio](https://github.com/kubernetes/charts/tree/master/stable/minio) and build out the artifactRepository section in workflow controller config map. -* `artifactRepository.s3.accessKeySecret` and `artifactRepository.s3.secretKeySecret` These by default have the minio default credentials in them. - +* `minio.install`: If this is true, we'll install [minio](https://github.com/kubernetes/charts/tree/master/stable/minio) and build out the artifactRepository section in workflow controller config map. +* `artifactRepository.s3.accessKeySecret` and `artifactRepository.s3.secretKeySecret` These by default link to minio default credentials stored in the secret deployed by the minio chart. diff --git a/charts/argo/templates/apply-workflow-crd-job.yaml b/charts/argo/templates/apply-workflow-crd-job.yaml index 313a05f2..eb656d4a 100644 --- a/charts/argo/templates/apply-workflow-crd-job.yaml +++ b/charts/argo/templates/apply-workflow-crd-job.yaml @@ -10,9 +10,10 @@ spec: activeDeadlineSeconds: 100 template: spec: + serviceAccountName: {{ .Values.init.serviceAccount | quote }} containers: - name: kubectl-apply image: lachlanevenson/k8s-kubectl command: ["/bin/sh"] args: ["-c", 'echo ''{{- include "workflow-crd-json" .}}'' | kubectl apply -f -'] - restartPolicy: Never \ No newline at end of file + restartPolicy: Never diff --git a/charts/argo/templates/ui-deployment.yaml b/charts/argo/templates/ui-deployment.yaml index 661ce610..0ed78888 100644 --- a/charts/argo/templates/ui-deployment.yaml +++ b/charts/argo/templates/ui-deployment.yaml @@ -13,10 +13,18 @@ spec: labels: app: {{ .Release.Name }}-{{ .Values.ui.name}} release: {{ .Release.Name }} + {{- if .Values.ui.podAnnotations }} + annotations: +{{ toYaml .Values.ui.podAnnotations | indent 8}}{{- end }} spec: + serviceAccountName: {{ .Values.ui.serviceAccount | quote }} containers: - name: ui image: "{{ .Values.images.namespace }}/{{ .Values.images.ui }}:{{ .Values.images.tag }}" env: - name: IN_CLUSTER value: "true" + {{- if .Values.ui.enableWebConsole }} + - name: ENABLE_WEB_CONSOLE + value: "true" + {{- end }} diff --git a/charts/argo/templates/ui-service.yaml b/charts/argo/templates/ui-service.yaml index 83d0b25e..fd6c40c6 100644 --- a/charts/argo/templates/ui-service.yaml +++ b/charts/argo/templates/ui-service.yaml @@ -7,6 +7,9 @@ metadata: release: {{ .Release.Name }} heritage: {{ .Release.Service }} namspace: {{ .Release.Namespace }} + {{- if .Values.ui.serviceAnnotations }} + annotations: +{{ toYaml .Values.ui.serviceAnnotations | indent 4}}{{- end }} spec: ports: - port: 80 diff --git a/charts/argo/templates/worfkflow-controller-secrets-access.yaml b/charts/argo/templates/worfkflow-controller-secrets-access.yaml new file mode 100644 index 00000000..f0d48519 --- /dev/null +++ b/charts/argo/templates/worfkflow-controller-secrets-access.yaml @@ -0,0 +1,18 @@ +{{ if .Values.minio.install }} +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: {{ .Release.Name }}-{{ .Values.controller.name}}-minio-secret +rules: +- apiGroups: + - "" + resources: + - secrets + resourceNames: + - {{ .Values.artifactRepository.s3.accessKeySecret.name | default (printf "%s-%s" .Release.Name "minio") | quote }} + - {{ .Values.artifactRepository.s3.secretKeySecret.name | default (printf "%s-%s" .Release.Name "minio") | quote }} + verbs: + - get + - watch + - list +{{- end }} \ No newline at end of file diff --git a/charts/argo/templates/workflow-controller-config-map.yaml b/charts/argo/templates/workflow-controller-config-map.yaml index 081719f4..597d8e35 100644 --- a/charts/argo/templates/workflow-controller-config-map.yaml +++ b/charts/argo/templates/workflow-controller-config-map.yaml @@ -9,10 +9,12 @@ metadata: namespace: {{ .Release.Namespace }} data: config: | - {{- if .Values.controller.useReleaseAsInstanceID }} + {{- if .Values.controller.instanceID.enabled }} + {{- if .Values.controller.instanceID.useReleaseName }} instanceID: {{ .Release.Name }} {{- else }} - instanceID: {{ .Values.controller.instanceID }} + instanceID: {{ .Values.controller.instanceID.explicitID }} + {{- end }} {{- end }} artifactRepository: {{- if or .Values.minio.install .Values.useDefaultArtifactRepo }} @@ -20,13 +22,13 @@ data: {{- if .Values.useStaticCredentials }} accessKeySecret: key: {{ .Values.artifactRepository.s3.accessKeySecret.key }} - name: {{ .Values.artifactRepository.s3.accessKeySecret.name | default (printf "%s-%s" .Release.Name "minio-user") }} + name: {{ .Values.artifactRepository.s3.accessKeySecret.name | default (printf "%s-%s" .Release.Name "minio") }} secretKeySecret: key: {{ .Values.artifactRepository.s3.secretKeySecret.key }} - name: {{ .Values.artifactRepository.s3.secretKeySecret.name | default (printf "%s-%s" .Release.Name "minio-user") }} + name: {{ .Values.artifactRepository.s3.secretKeySecret.name | default (printf "%s-%s" .Release.Name "minio") }} {{- end }} bucket: {{ .Values.artifactRepository.s3.bucket | default .Values.minio.defaultBucket.name }} - endpoint: {{ .Values.artifactRepository.s3.endpoint | default (printf "%s-%s" .Release.Name "minio-svc:9000") }} + endpoint: {{ .Values.artifactRepository.s3.endpoint | default (printf "%s-%s" .Release.Name "minio:9000") }} insecure: {{ .Values.artifactRepository.s3.insecure }} {{- end}} executorImage: "{{ .Values.images.namespace }}/{{ .Values.images.executor }}:{{ .Values.images.tag }}" diff --git a/charts/argo/templates/workflow-controller-deployment.yaml b/charts/argo/templates/workflow-controller-deployment.yaml index d4291bd3..9f5d8da0 100644 --- a/charts/argo/templates/workflow-controller-deployment.yaml +++ b/charts/argo/templates/workflow-controller-deployment.yaml @@ -14,12 +14,22 @@ spec: labels: app: {{ .Release.Name }}-{{ .Values.controller.name}} release: {{ .Release.Name }} + {{- if .Values.controller.podAnnotations }} + annotations: +{{ toYaml .Values.controller.podAnnotations | indent 8}}{{- end }} spec: + serviceAccountName: {{ .Values.controller.serviceAccount | quote }} containers: - name: controller image: "{{ .Values.images.namespace }}/{{ .Values.images.controller }}:{{ .Values.images.tag }}" command: [ "workflow-controller" ] - args: ["--configmap", "{{ .Release.Name }}-{{ .Values.controller.name}}-configmap"] + args: + - "--configmap" + - "{{ .Release.Name }}-{{ .Values.controller.name}}-configmap" + - "--loglevel" + - "{{ .Values.controller.logging.level }}" + - "--gloglevel" + - "{{ .Values.controller.logging.globallevel }}" env: - name: ARGO_NAMESPACE valueFrom: diff --git a/charts/argo/templates/workflow-controller-minio-secret-crb.yaml b/charts/argo/templates/workflow-controller-minio-secret-crb.yaml new file mode 100644 index 00000000..722776a4 --- /dev/null +++ b/charts/argo/templates/workflow-controller-minio-secret-crb.yaml @@ -0,0 +1,25 @@ +{{ if .Values.minio.install }} +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: {{ .Release.Name }}-{{ .Values.controller.name}}-minio-binding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: {{ .Release.Name }}-{{ .Values.controller.name}}-minio-secret +subjects: + - kind: ServiceAccount + name: {{ .Values.controller.serviceAccount }} + namespace: {{ .Release.Namespace }} +{{- if .Values.controller.workflowNamespaces }} +{{- $uiServiceAccount := .Values.controller.serviceAccount }} +{{- $namespace := .Release.Namespace }} +{{- range $key := .Values.controller.workflowNamespaces }} + {{- if not (eq $key $namespace) }} + - kind: ServiceAccount + name: {{ $uiServiceAccount }} + namespace: {{ $key }} + {{- end }} +{{- end }} +{{- end }} +{{- end }} \ No newline at end of file diff --git a/charts/argo/values.yaml b/charts/argo/values.yaml index 7a93f926..7ce97984 100644 --- a/charts/argo/values.yaml +++ b/charts/argo/values.yaml @@ -5,40 +5,64 @@ images: executor: argoexec tag: v2.1.1 -controller: - serviceAccount: argo - name: workflow-controller - workflowNamespaces: - - default - # If set to true then chart set controller instance id to release name - useReleaseAsInstanceID: true - instanceID: - -ui: - name: ui - serviceType: LoadBalancer - serviceAccount: argo-ui - # Enables ability to SSH into pod using web UI - enableWebConsole: false - crdVersion: v1alpha1 +init: + # By default the installation will not set an explicit one, which will mean it uses `default` for the namespace the chart is + # being deployed to. In RBAC clusters, that will almost certainly fail. See the NOTES: section of the readme for more info. + serviceAccount: "" + +controller: + # podAnnotations is an optional map of annotations to be applied to the controller Pods + podAnnotations: {} + serviceAccount: argo + name: workflow-controller + workflowNamespaces: + - default + instanceID: + # `instanceID.enabled` configures the controller to filter workflow submissions + # to only those which have a matching instanceID attribute. + enabled: false + # NOTE: If `instanceID.enabled` is set to `true` then either `instanceID.userReleaseName` + # or `instanceID.explicitID` must be defined. + # useReleaseName: true + # explicitID: unique-argo-controller-identifier + logging: + level: info + globallevel: "0" + +ui: + # optional map of annotations to be applied to the ui Pods + podAnnotations: {} + name: ui + # Enables ability to SSH into pod using web UI + enableWebConsole: false + serviceType: LoadBalancer + serviceAccount: argo-ui + # Annotations to be applied to the UI Service + serviceAnnotations: {} + +# Influences the creation of the ConfigMap for the workflow-controller itself. useDefaultArtifactRepo: false useStaticCredentials: true +artifactRepository: + s3: + # Note the `key` attribute is not the actual secret, it's the PATH to + # the contents in the associated secret, as defined by the `name` attribute. + accessKeySecret: + # name: -minio (default) + key: accesskey + secretKeySecret: + # name: -minio + key: secretkey + insecure: true + # bucket: + # endpoint: -# If set to true then chart installs minio and generate according artifactRepository section in workflow controller config map +# NOTE: These are setting attributes for the `minio` optional dependency minio: - # This is not used by the subchart, but makes sense to group here. + # If set to true then chart installs minio and generate according artifactRepository section in workflow controller config map install: false defaultBucket: enabled: true name: argo-artifacts - -artifactRepository: - s3: - #default minio creds - accessKeySecret: - key: AKIAIOSFODNN7EXAMPLE - secretKeySecret: - key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY - insecure: true From 61d426c1ca91df6f440f19ba4c9bc78cbbe32b3c Mon Sep 17 00:00:00 2001 From: Ilya Sotkov Date: Tue, 28 Aug 2018 01:27:30 +0300 Subject: [PATCH 07/11] [argo-events] Fix unused crdVersion value and add ability to specify crd creation job service account (#19) * Use crd.version value and add ability to specify crd creation job sa * Bump chart version to 0.2.0 --- charts/argo-events/Chart.yaml | 2 +- charts/argo-events/templates/_sensor-crd.tpl | 2 +- charts/argo-events/templates/apply-sensor-crd-job.yaml | 3 ++- charts/argo-events/values.yaml | 4 +++- 4 files changed, 7 insertions(+), 4 deletions(-) diff --git a/charts/argo-events/Chart.yaml b/charts/argo-events/Chart.yaml index de65136c..d32cb2be 100644 --- a/charts/argo-events/Chart.yaml +++ b/charts/argo-events/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v1 description: A Helm chart to install Argo-Events in k8s Cluster name: argo-events -version: 0.1.0 +version: 0.2.0 keywords: - argo-events - sensor-controller diff --git a/charts/argo-events/templates/_sensor-crd.tpl b/charts/argo-events/templates/_sensor-crd.tpl index 76761908..48fb2ab5 100644 --- a/charts/argo-events/templates/_sensor-crd.tpl +++ b/charts/argo-events/templates/_sensor-crd.tpl @@ -1,6 +1,6 @@ {{- define "sensor-crd-json" }} { - "apiVersion": "apiextensions.k8s.io/v1beta1", + "apiVersion": "apiextensions.k8s.io/{{ .Values.crd.version }}", "kind": "CustomResourceDefinition", "metadata": { "name": "sensors.argoproj.io" diff --git a/charts/argo-events/templates/apply-sensor-crd-job.yaml b/charts/argo-events/templates/apply-sensor-crd-job.yaml index 7f542894..8360d0fd 100644 --- a/charts/argo-events/templates/apply-sensor-crd-job.yaml +++ b/charts/argo-events/templates/apply-sensor-crd-job.yaml @@ -10,9 +10,10 @@ spec: activeDeadlineSeconds: 100 template: spec: + serviceAccountName: {{ .Values.crd.jobServiceAccount }} containers: - name: kubectl-apply image: lachlanevenson/k8s-kubectl command: ["/bin/sh"] args: ["-c", 'echo ''{{- include "sensor-crd-json" .}}'' | kubectl apply -f -'] - restartPolicy: Never \ No newline at end of file + restartPolicy: Never diff --git a/charts/argo-events/values.yaml b/charts/argo-events/values.yaml index ca0510fa..c68ca7cc 100644 --- a/charts/argo-events/values.yaml +++ b/charts/argo-events/values.yaml @@ -2,7 +2,9 @@ registry: argoproj imagePullPolicy: Always # Version of the Sensor CRD -crdVersion: v1alpha1 +crd: + version: v1beta1 + jobServiceAccount: default # If set to true then chart set controller instance id to release name useReleaseAsInstanceID: true From 232033859152470ffac6016a3777665b6b9fd82c Mon Sep 17 00:00:00 2001 From: Ilya Sotkov Date: Tue, 28 Aug 2018 01:29:10 +0300 Subject: [PATCH 08/11] Add ingress for argo-ui (#18) * Fix bug in ui-crb.yaml and add ingress for argo-ui * Use crd.version value and add ability to specify crd creation job sa --- charts/argo/Chart.yaml | 2 +- charts/argo/templates/ui-crb.yaml | 2 +- charts/argo/templates/ui-ingress.yaml | 31 +++++++++++++++++++++++++++ charts/argo/templates/ui-service.yaml | 4 ++-- charts/argo/values.yaml | 29 ++++++++++++++++++++++++- 5 files changed, 63 insertions(+), 5 deletions(-) create mode 100644 charts/argo/templates/ui-ingress.yaml diff --git a/charts/argo/Chart.yaml b/charts/argo/Chart.yaml index 0616b08c..324cd011 100644 --- a/charts/argo/Chart.yaml +++ b/charts/argo/Chart.yaml @@ -1,4 +1,4 @@ apiVersion: v1 description: A Helm chart for Kubernetes name: argo -version: 0.2.0 +version: 0.2.1 diff --git a/charts/argo/templates/ui-crb.yaml b/charts/argo/templates/ui-crb.yaml index daa1f302..f27e73df 100644 --- a/charts/argo/templates/ui-crb.yaml +++ b/charts/argo/templates/ui-crb.yaml @@ -9,4 +9,4 @@ roleRef: subjects: - kind: ServiceAccount name: {{ .Values.ui.serviceAccount }} - namespace: {{ .Release.Name }} + namespace: {{ .Release.Namespace }} diff --git a/charts/argo/templates/ui-ingress.yaml b/charts/argo/templates/ui-ingress.yaml new file mode 100644 index 00000000..39dfab75 --- /dev/null +++ b/charts/argo/templates/ui-ingress.yaml @@ -0,0 +1,31 @@ +{{- if .Values.ui.ingress.enabled -}} +{{- $serviceName := printf "%s-%s" .Release.Name .Values.ui.name -}} +{{- $servicePort := .Values.ui.servicePort -}} +apiVersion: extensions/v1beta1 +kind: Ingress +metadata: + name: {{ .Release.Name }}-{{ .Values.ui.name }} + labels: + chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} + release: {{ .Release.Name }} + heritage: {{ .Release.Service }} + namspace: {{ .Release.Namespace }} + annotations: + {{- range $key, $value := .Values.ui.ingress.annotations }} + {{ $key }}: {{ $value | quote }} + {{- end }} +spec: + rules: + {{- range .Values.ui.ingress.hosts }} + - host: {{ . }} + http: + paths: + - backend: + serviceName: {{ $serviceName }} + servicePort: {{ $servicePort }} + {{- end -}} + {{- if .Values.ui.ingress.tls }} + tls: +{{ toYaml .Values.ui.ingress.tls | indent 4 }} + {{- end -}} +{{- end -}} diff --git a/charts/argo/templates/ui-service.yaml b/charts/argo/templates/ui-service.yaml index fd6c40c6..23983209 100644 --- a/charts/argo/templates/ui-service.yaml +++ b/charts/argo/templates/ui-service.yaml @@ -1,7 +1,7 @@ apiVersion: v1 kind: Service metadata: - name: {{ .Release.Name }}-{{ .Values.ui.name}} + name: {{ .Release.Name }}-{{ .Values.ui.name }} labels: chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} release: {{ .Release.Name }} @@ -12,7 +12,7 @@ metadata: {{ toYaml .Values.ui.serviceAnnotations | indent 4}}{{- end }} spec: ports: - - port: 80 + - port: {{ .Values.ui.servicePort }} protocol: TCP targetPort: 8001 selector: diff --git a/charts/argo/values.yaml b/charts/argo/values.yaml index 7ce97984..abd9c628 100644 --- a/charts/argo/values.yaml +++ b/charts/argo/values.yaml @@ -37,10 +37,37 @@ ui: name: ui # Enables ability to SSH into pod using web UI enableWebConsole: false - serviceType: LoadBalancer + serviceType: ClusterIP + servicePort: 80 serviceAccount: argo-ui # Annotations to be applied to the UI Service serviceAnnotations: {} + + ## Ingress configuration. + ## ref: https://kubernetes.io/docs/user-guide/ingress/ + ## + ingress: + enabled: false + + ## Annotations to be added to the web ingress. + ## + # annotations: + # kubernetes.io/ingress.class: nginx + # kubernetes.io/tls-acme: "true" + + ## Hostnames. + ## Must be provided if Ingress is enabled. + ## + # hosts: + # - argo.domain.com + + ## TLS configuration. + ## Secrets must be manually created in the namespace. + ## + # tls: + # - secretName: argo-ui-tls + # hosts: + # - argo.domain.com # Influences the creation of the ConfigMap for the workflow-controller itself. useDefaultArtifactRepo: false From 4daf72c4232b543912a37293966d66ea340e9d43 Mon Sep 17 00:00:00 2001 From: Vincent Smith Date: Mon, 27 Aug 2018 18:30:41 -0400 Subject: [PATCH 09/11] Fix typo in ui-crb.yaml (#17) This was binding roles to the service account in the `.Release.Name` instead of `.Release.Namespace` namespace From 2d713a758bb833c1a68b8b22a946b274a97a5108 Mon Sep 17 00:00:00 2001 From: Alexander Matyushentsev Date: Mon, 3 Sep 2018 07:23:49 -0700 Subject: [PATCH 10/11] Add readme file --- LICENSE | 202 +++++++++++++++++++++++++++++++++++++++++++++ OWNERS | 8 ++ README.md | 19 +++++ scripts/publish.sh | 9 +- 4 files changed, 237 insertions(+), 1 deletion(-) create mode 100644 LICENSE create mode 100644 OWNERS create mode 100644 README.md diff --git a/LICENSE b/LICENSE new file mode 100644 index 00000000..67e99b06 --- /dev/null +++ b/LICENSE @@ -0,0 +1,202 @@ + + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright 2017-2018 The Argo Authors + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/OWNERS b/OWNERS new file mode 100644 index 00000000..3328be91 --- /dev/null +++ b/OWNERS @@ -0,0 +1,8 @@ +owners: +- alexmt +- jessesuen + +approvers: +- alexmt +- jessesuen +- merenbach diff --git a/README.md b/README.md new file mode 100644 index 00000000..c058c3c1 --- /dev/null +++ b/README.md @@ -0,0 +1,19 @@ +# Argo Helm Charts + +Repository contains helm charts for http://argoproj.io/ projects. Helm charts repository is hosted using Github pages +and can be added using following command: + +``` +helm repo add argo https://argoproj.github.io/argo-helm +``` + +## Publishing changes + +To push changes use following script: + +``` +GIT_PUSH=true ./scripts/publish.sh +``` + +Script generates tar file for each chart in `charts` directory and push changes to `gh-pages` branch. +Write access to https://github.com/argoproj/argo-helm.git is required to publish changes. diff --git a/scripts/publish.sh b/scripts/publish.sh index 858c2455..bac055d2 100755 --- a/scripts/publish.sh +++ b/scripts/publish.sh @@ -2,7 +2,7 @@ SRCROOT="$(cd "$(dirname "$0")/.." && pwd)" -mkdir -p $SRCROOT/output +rm -rf $SRCROOT/output && git clone -b gh-pages git@github.com:argoproj/argo-helm.git $SRCROOT/output for dir in $SRCROOT/charts/*; do @@ -11,3 +11,10 @@ do tar -cvzf $SRCROOT/output/$(basename $dir)-$version.tgz -C $dir . cd $SRCROOT/output && helm repo index . done + +cd $SRCROOT/output && git status + +if [ "$GIT_PUSH" == "true" ] +then + cd $SRCROOT/output && git add . && git commit -m "Publish charts" && git push git@github.com:argoproj/argo-helm.git gh-pages +fi From 01b72b169d59e05f76d62d74b9ab8bf02aa31fed Mon Sep 17 00:00:00 2001 From: Alexander Matyushentsev Date: Tue, 23 Oct 2018 16:59:55 -0700 Subject: [PATCH 11/11] Support namespace parameter in argoci chart --- charts/argo-ci/charts/argo-0.1.0.tgz | Bin 11823 -> 0 bytes charts/argo-ci/charts/argo-0.2.1.tgz | Bin 0 -> 18860 bytes charts/argo-ci/requirements.lock | 6 +++--- charts/argo-ci/requirements.yaml | 2 +- charts/argo-ci/templates/ci-deployment.yaml | 2 +- charts/argo-ci/values.yaml | 4 ++-- 6 files changed, 7 insertions(+), 7 deletions(-) delete mode 100644 charts/argo-ci/charts/argo-0.1.0.tgz create mode 100644 charts/argo-ci/charts/argo-0.2.1.tgz diff --git a/charts/argo-ci/charts/argo-0.1.0.tgz b/charts/argo-ci/charts/argo-0.1.0.tgz deleted file mode 100644 index a3c58ddbf0b5b21ae4e07b0a43d7a5a18cd52e1b..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 11823 zcmV+~F3`~*iwFP!000021ME9_Toc#U*asFPD&T_pwQ`LhC}gsb5QxQ!fb45n)QUJs zCSfGWgqaDeXkGBhq9U$Ul)AKNTesThTB}&My1cr!c5%U_*4C#~t3pM2cP0b^T2ZU` z`ujM4BsXWyJ@?$@taF3#tzJ3^AV?(=_8UUWZ?-M;5{bN|VyQqPhIpw|B(MUKmoJ)? zm64)R5&$cbAm}I2wf6jP3J4!b#k4wHqbEr0C5^#su(w$Jr~5AvN}BJ#P$ZCeSph*? zEWrQs{T~2gP@2X_Jq2h2n2rI+OvUs-VZ^m6T(1EJRGEfqFbd%e0P(3f1t_DzK#(+S zz@wuD8ZDs!I+RwXLTXPyVp^2OGceeXPPM?JdKF}#$29OMp$F~;5>w+@mXQNplcfg`s>C9Yk?n^=3W?Ap8teYlNGdjq0>7X^d9%Unr1BTk5}1;N7nO zZ2`EBQSB&Hhfz?^F&RKf4Z$8}C84KDLaW8dP=-bZG6^zGttB#fO;0#Ryx}3!&4_cb zEKF&HdTN1XP#n`R@u)@yGDL^~5%5s0Ar>CrDX!o9RCZ2QlWQy{NEN}x&KC-M`2_JuEbt!G|*c7@9ouc|Ha<$tKI*% z0iXul!V_}RaJ@ILTOaS0jzJ6f!thxGmND=w|6`8Hj?}4#d;h1}Js}fvSe1S|&Om+sx5g>i=V6FP;kS z29d49^z`%Fgx2DJZ?RW%{fFVdP};8lZ2^}0k7d!Ao@rA2450$*zS$lGHXed!Hwn!H z{6|c~(`e9RSp2Wq6tfbUCS|!u3|LP1FHQQXgf`2>t`g*e;xKKn7@gO!aTXaCXawAp zxN$8cX^|qrVfc@glg;_yQ`sYZVcrMvT#I3pgiePtN9!HHeT>=Rf@BL~XoV?A$>s4( z$qUR~xSl2vpJ4$lI$JWw^cgaXpXSB!j|+}YiSmyOlE?T51X&OOz!pqKkc3Xw3=M!9 z$F!H$4(H{B?8Rq;>z3F`;>GCMjiL0tXV}>ZaiBvBexSdy8VuV?}^CIA83~ z$jvsg8DFN4US;m`XnjZ4LPE**)4r!tf>UuYT{JHc6EN+XFil&Q>U zik;D)PtElFIi}Wp7g|&`pWZn(>-a?1_^R~Z(*8$9#|Oy~I_pK-xz_BzL?~{N|9g2! z1nu^}EkKBXNHh%t6jUydWUdzn#03JJ0#JG2!B7E3HXx09J+9ZtI2=rwN&vT9ZjjEGTHCPvfTspL4o8H5V2lR-aDE^ml+D#hJ*owvF?U^3V(v*D|kh0QCP%l?E{GfaTisC<8~E)*&G-0%1OY4%ej8K!L&NfF^M)12exK zQp2!>$b>D9Is172WomR&91BqHTv~ z0ZaRzl8R{!@XR5!;e}oWYW4n)pk@3o7J0Sb|7#P-&E*e5Zd9xBEWqV8F=OH_o+&Pcas`;eOtf(fwNb0h2I)pr zi>q-M{y}@qN{n!lFcWu{o@T~iq^DrCs6=7j4=4hP6%J!UQjbB6FwK*#&ccusCP-Rb zhcgKgb6=<9rnfM*%P^+~0z`~>ahNE!u?`JVY1%-^`24g+d&y&c0fkVI00xwZh9ET1 zG8u5@y?~Bys2gN(Mv%p$|_W|?%M^F=_ zMP|g&H~u?-W1-|w=h_wRZv_b7WW-pRihA2ye|f1a{%mtw5zj zMU-u>SaP=jIF`oDwF-DQgI3%mc6IA$)hTYC>kvFACvD;eSKHop9j8_v88;)ek7mUr zf!j8YlS|~oE7B~8y-<4tdFX7{@o4?jvsX`RJe_aYmEWxET-R%>r(b@&OZ~#i3-T)Q z>-S#I4%t8P{cWl#voDan_r{O#J=|mB+p4%L+Bo;VQy0~R4X}wTC_CaFvN+|$8v|{^ zdqf0vjpY{h4q4#p$=$xqdXI9(wGR%edLIc23l<~|p1X3Q^LvPjJ8sU613goclk;y> z3=P*j2t2ZPN7cCtUm6H|^@Ltyj_sR&Q0dFb={o;?P5Q41Hdmvk&J(P&y(B(xNbKs_ zr?PBdLCtv=Zl^ArvaNO(>`zN^Qr%YXbc{^88R%sFlh?!EA+eVo_8~vIt0RsUh4wBu zReZ9p3-adt*Q+*FOJ&km&}|YDLebvuVn-!882m0<@k55aM4(q11UOGNzDM&4u8|X0q))Ztrz~{;HosVANR#s>`$``~O zoUu5wD$XS+tbb3Nq>-!EtoOggU3%<|y*;+hSTl`RIX8d#7YlZFTo!D%s`f4sD)-v3 zu*bFEZe`WioUWCw?;0Il?))IH{_^!5E2GBkPa8kx!AzIh^ShGjmaLq6>EYq4ZvPCf zIDgko<2*L{yUOUzUmadqE}Pu{P@mY_4z#$S^SbL>hCV1M7-O7Lc5&c<;A*>0%WNGd zMLO;ou-Li0f6%G2@2i%btSb%bvDsQb-sRf&Ys1uHg}hh)_rg{b|M8$mF`SC(Io~ys z6H0mA{X$%=s-H7j^;yOJWoN#SBzxYRloWtZOYN5~Ixb&(ufrPm+3r0`f9q4W&C%xV z-d%k{Y{RddwfCs{Xj#>O@4mIoK0EU@tHO}I17foMr&_%~X00%GmCbx=N0qZnV3@o< z>!aEw>3uWL4lLfa?BW+SPP=|yk97{6zo5s`u@!4$D^BKr>|6BH;v&g($BQ;@gNnf6 zeXb{mxLw-hIJ%P8al;1{-y>Ueyaa9V=OLwtVdJSjQEv%`^g4EDhyBs~-P@|)Pw+eW zmi3v%*bv}zy*}&QzovN3_BXtK^@oMQ$qxq94f*_#``bw_+t2KGzEj?}?|{hZR-e#5 z{=!>}OKT344f>-nSZq~t-I=!jvT}>(>eP`DzmGmvnl$^w!A>iR(7~l=LToSYwY?M< z>-ek4@1rrcSB5U>ySzi4`roTMhNcIVxQyCeR-HAu^H+Ngl`8gcwU)SX6qWS>9o!0& zPpCS4dhqw{fns~t$OCJqCC4ms&5swCANtR+*gdm4BuUp5c6+bn)H@q8CSUU{iwWoQ zu99=6xX)81^2H+Tpn*-@7vq1WK2cQ)yRX>20C7K z>n^k(^j&eqJdfl{|Kgt~4g?Yd{X)C<#gEUZ`FRE9=}>Ds^xU|L*WKq8l?{)Yxu>&l zUP{cG;?nXB^VSS0{5WLQsO70&`-?BT@4`o2`Quo5hq%Rs6NFQip557fx@&CW&+Dh2 z0`JM!PPSjvy_#I?o3ZlR@Lx526ig4AEut) zImzaq^kGDoq4qk}&nfJtDm5eF9dV*iu37CHaC@cvU_aNmJJUy7N0RBT_|Pe{F8q<} z`B~MpkGlhhO?{4bsU1-HLCEUbi>uXJ9FpHZz38XevsT>5)MGn)<=s4aBtB)`n9Bug zZHB!aNbS*l=6Nt^xlQqLk6(;OxS!?=BhR=VbsDj~t6gV&`P!1AkIs!;d}5J9LO_4y z*1*JKkHu7J4K}7OWYMkgkmY;(N3Oo*TiE@;-osN})63*PI@+E4beM8;-MWRv!P0k& zL)Pdnd^)V4^P!LLiU;2s-L221P0E>dAB>oIp(=eH85Xx+GtubbG`m}PN$ei?q_G|5 zbnaKHi@R0z$)fAQPPZ0CclTc6and1jM!aX~yvxTY^tAbq8(q+EL%$D?gai%=*Y3`W zc>4_DJM+6Ra@}j+xZHN^$q$=;Xj=THvP1X2N*+>ReRafwWh+;&{_x@As`CCVxF1zK^y?Drx z6Z`yDI~?W@pZ@#KxGnO^cLw$BV0EtZwFOhJRA+seaA3`L$J%^}?GJbDOI|W5#hTY2uEyOfiJKR!s>rNy=3L>n7o+sjk6^W%Qasw8>*|BwCsl8`P}OI2?bX# z9q6}V(6M{=566|gyDW^eG|uSC8cqHvf%jR;7IG)R|pD6o`-AfSMRqzf$F-McK^ zf{RFZNH-GFNO!Z;(%mfG3wwUg`4i5~x%u9Uxt@!edER+u@|1ZtNTF?-I9=R5ImsU) zED%5bZXSM6@2Ju|g%#iZ80-JVl{VB6V%(L$o!e_t%(LoI4+wwHEaoem)mAc4RTp+Y z&kR%SQRKu4s#j#D5XTlI2@{0dGau}y!!w+U_YCrv&|qn|N2XgP@&OG)!x@f#=qqgS zasnA(>N(yztp&StSAK5lba?7=#8p2H@AMLUAj(IyDnfVr+F_!G=yH~4y>O={d1NFK z$CA#E#lWDDaC}-&*qr&f!=;_ouCyZpf+Nu-aHYl1X0~979 znnupJ`0jZ06903AJk#gyw0MW_E6ya47v0;TsL6z@h7FyKl82D@v8timU>lUh7%M^GDK{T|;a5B(~6Qzq*eDYb_- z-nzT3Mq}{4P4yHzZe(6zO<-rIgBxM(7(f^|ys|f+x{hie?6^?xK zD}yGWLHtgUqy_+FdQ<*2kHR8#(#Ge_S8ng^zH{ma>bCg|xk}3=~?QI+L%2b?~yr-S>v_QLw{f;7RJL8D6lNae+_b$Ri{ER&V zLe41CWRtrs7w)qIPCQSt3Q_$hCuV7H%wjd4fWeq^1L)=5?zV8$>LNW6;}$v@l61^V zh&;>F&tctVD|)v8^lx1|hvM^7$9!`6R-?XVNRcP_-Knkj`E@9~(NihOaTa$(S2*~m zZkN=Zw>!K{IRm4msrrSoqS1mbV1K`K#C9wplKK3wae@@2I_wjTRCd!Pp9VE!P>$=n zgcU{=g=2mOGugi~&=y9Iu};u`-r{a#ow0K|6|>*Gn^f2QxUP2LvD&oY@=qi~NRq$X zyS7#rS-Zjv33EHPp{pQ1BU6gM)}4b`^iud@XRQgCB5*UKAW|x*FFi1I1t1ZG#aH1! z-8+J8Q9REP{bQ8BZo%H%HKJB@CPWR`0c48MCbg&T!KS)x)_B)#Gk#mTh6EZ-#MZug zEQ#R8RZe}&N(d>IWZ0j*1Gu%gbC5vfh})11^` zvbdSEWtX#WkTy=xq$9H}@|lQQC{(Y|;p4(B2J6>e`G#wxr+FT`6kgaH7k44Mq&DVS ziOys*_H@3|)q|I`zS;`UXUk%J**~4u!{6_DjNUuh=L87F&ll?`QXD9^3pX2EG0rVY znVjLQrh5kDE(#|hqrxm11PI*}=Av=3bp00793DooQ~5f}SsEni77Rps)p+RdYktpcIBWl$r^hUk_1V}P6ThMpvF+T5^%!J;Zf|4`N;kb5ql zYG3D3`OfnFpZHDqrryc*E25ucZ!imI6+2tsMn?FH)sijc5Xl)Bs~_T1sz*bJ>6&cqr3Vr@pA1x*BGwE4qcHP;yv?|Q06pBM7;$y&Yw4aE4U_c*Io;Up%>_h z7{&tr4Y=!}SFMu%A^64?%27FIeP@34&p5QosBFr85d)8f3c7dAqj>8-YD%0Ru1vyG zwLBN<`0cFJj&;I!h6&eJUeHt=DAWW@udT{~(K9Sn2b6v>9Fm7=4h9_N!zw`8Oin%> zT~p&vC2-hL)79ol8{3oif4PW?OzbXT&JLhEkt-L4s8w2|^Z;7mOgO)qWNBCI@rGn{ ztmdh^WFOy{0h$sv?m>GA+H0q(0)^wJRWsb^*tBP z5}U1nTMk5zXY(zi|1{j7_Pg)Vq~qMtgDp562Y#n1KT;UhRQmI%hIfRBX}ol;1_(;LD#6jB2-NVGdOLBiG4^|F6e!`kqttG&5w=w*rh& zrq+GTgOQ%;CECFc07U;Mf#eKA6-4BQ)jfJ7Not121e6Vev*tYX3_|~j!<_C6fWi6p zo>3PBcKf%HbHC0Tz!%9dcFs6aXW$K)C%o+fLs%_9N)c-^H8+33{>+rnFo6R+`B|L&6L)~Nbro4(O$bC zn$7ur%0(}cA%vqRe2-p7exzmT%>*3!3u(iwdZK{#hQGq1s#fpb59N& zZ5soFoA1s;x58O9KH!{m-H8@ytjGABmQj<&^mmIW+F_v|U_X8uRN}w!v^;7Nd=YAD z?`*4MR?Ize@0vo(SdI#q!+ky2qw;WB*WhJwGur)Sap?xMyl$tS*{XP}0&8zoq8TU0 z*z>i9x6VEdr)8TZ@pf;a{fC4r{c!V2S&%5HRvGqlAIk#?EXZqTSje)~iKc*ig}AaNfO6O2?^nYeF0r%+`4&YgBA~@<~6Ud0Rhg_ZBHJ0&p?>I}^AB zNVCUivMYPGUeI8lW0GlL6C%1@$@)^)?)7(Y39`8pqNDn&XQh_XVF}c#0`m~nEWGBkf2facBRZI+XQ;ASAt%*!l9{kA5;nR=z2=0uAXR~ID80hm zkkfOkic=#2-j_L7Q|B8Zj)NFYHbR`byib;NbFg{k7+)<6jX+PV_UKU^YHvJ{aLo@CFRu6Sb(18IGsc0({Cq=eD<GF z&HX-=(q}0qr*;dz3LspxFw4eDDlcW=lYI7Vn z`B{Ley8kC{{5Cr1e>({4LG!*3Y0KEtl1r~(hQ~Qx^k_o&P1|Z&(Aw;A@2-6exAdL@&9_1CY$SdM7KEOx+qL~kS*;$;qtB6k}Tad7QUJj19(82 zfahW8dGGsQ=>1{Im^B!ug8R=VNkW2-nGCm))G1Tm3JGz_D!PBB zE;1!%$ZCJD$5PbEDn@L}ErxP&A$m7#Nj#QvuxT9PPptM7dvjLBlQMpPAM?O1;N6ZX z%sijt-es?mpgy><T_e87@qH0bldjvO8$OodYGQHF#a`0r?ef~V!Q8}A>L&OxyvMIv)X zZGcHIeiywy$@+B|;LC%eiE`E2_8jLmZvNJDl^@!o2)_%@Z{rp{`L883_@fX@JGyD) zl4=>ZHL0Ye>0wm)ERzaUY$`xGx8)7(o=fLl5Jc77YKlFZcMLraHZ{@GOO(5E6p9T1 zFy1K7wbOUKi(sGNPSjwR$Fz;*OnO7Ukpa@gGq{X%BW_;yPwAq(AACyV#(c2u zw=87YvZ0y+EoX#<5`{2eOs^ePhUQ_hGYcn}v_?}g@QvPjQC~h?9lek-_DfAzW`8dL z`Ep_Ld$9Xfm}5Jw+gpxyCYES)M}k=yI$z3u7?~=Qf5(a2w|N#i;C)IhTn*}TRD~(Y zMKeu$UM^`_(=9Z42|35hL-XCp>_4q@(jk1e8mHwZh*xKa{1H&?hkq5GzJ|$o@k16p zL!Z?&OKqHL7Z#^oD>IW66`XLxKfcSv?qnUQ{>lHWjx5+DJ6%FjkfmRfT|i9qIH-afTAjhqDm z$_ISkw`%27SeDpOv0)8_K(bQ8W4~B_<;?~Inm+deo@X z-i7dv$TXZD%Xt`bth`k*{Lh*7;bDLQ?7R zG#%AVVxdY(D4_@t0_aFNf0j~U&Yb@8hgL$I>|4Th6SX{ox97$BjSyszNVA7q zw`NtG-divCr2UHF+3O+`I-K{+t>;bFN0o~3`9&~m9~5Yls}ypm{=l({2%Rt9`xBbG zp7+e9-?e885gZEAU{!u8p&&A>^yRmx=j1Ly9J^{=R`}_H7-_pH5v05q-bL!* z^GI=)eGg^U?Sh~l1$t&Y&qwiiYDMlsqE}_FnTUsPs*|v%NHC1hTD720}HcT!eSAQYgx}i5wBXVM7nu6*RwpKasS~KBG zLR34wY%m3npsJ7gkF6)`b9xr+4~y#nm@%UtxGun-97z~H?$e#QGN$K@)4ekGN0b_M z)7VwfTxoH%=>_{{sSqbN?!{yKe{U|}-^vO!6}R;bt(DGP5KqKx<5WjKh&sK+xSz?5 z+Nb#f@<4-1D{BGk0sfAT*v6{aR3_6<>03AfS&5HLvv@Ta47v+{4>?D;NK+}0+J|kw zMr~vJP6UMeq#2I)S>6=zS5F80T`9-Un~AId@il;P8aI^k-*k$obqsGlZtCr>wn|7! z`T1YoJjU0a{G9#r!poSOufgNQ*2KVgADPYP8E_>Uw-takI&=Q1_VYm?JDZLn(|<8L z!w({5`9cQhYsBy6pw34(Tx)%tFI@3TXIS#0_07@I8}BtbPM#cIpXlG%*c#a) zw9LBLR{WT4eP3>(=?HOdnEi(VqULjtH*xpcA`MzLv+y)Lfc^mhrejq8Z2^2}R1*Mk zsZ>Ev3F4y0q^Q7?yZ^Jk^BP8g}Q7P(iuT>gsGcPu=tY9N;5R=JMAa+g)6dVHv*hm;H)kEjOegqY|b5hSG9<}o2#sI#MN)X!q1h@CIs~5((uPi zX0ujo5#e$$x0a>p7o*D+yfW_X*)yZH(_hS*DR`+S0>XGR*(%pBq~6yT= z5~?y`;>?E1Q$h0Q4fEHdByaZMFk4&wLp}yRn~$Fh!P#+9y07aiLv@p9r6Q-(B|h2? zvWfQG@<@80hg+&=!IZ0j%!fur4Gf{i^{oPnvMzi3;XCq$rWi?2vr~gSLBeWW5ct(n zn9}}-kIvr^kdkd{8IQf(5r9A0lIW?C;+BCiUb`cyFvjwASd0NJqu_pgfq31{0O2QT zA^i7oz5m={k)yQtlAC>V#G)JnUTZIF1<72B!SuknzX4}6*0fuCPQQxe5T5W46bNDq z+X!MJ7>`7r_?P15+=OnSOB%u(lOJcCTx>1*i?gqg%b0}DuDe1cuE#F`;b4|d)-)~z z2U$s7Sm0dTueQTmtTV}(pKe`a_JPN#Jb?pMod?7+TO6UHWd~4@RR~Ba0V-CW_aJWoR zsI!!u&h2>0)IrRwk8g!_+;=6J zH_bjmobbkojP6bDt*!csu6rkuxB|+itC|a7W=V98v6&4Im&h_xzWSt{tl!3yNsj-* z?3z2+Q4cq`R{7Sk(524GqwDcmCKD-3?5?&|aDRmzgR*1Ut3;ysDL^pC&+UWZ9fCoY zxP(~jt++o}mNEw3nhrl@sQIILVvR!=j3(_R!ZV7+OBcxd_*pL-%eIBO92ggli_%pq z5Kc@26VtYHr0*YEM?QgQib)H3lS}JzT-upk*v$xAWjDtLSc7-6#kF!7PjLf3e-2%- zJ3_=cZex*Wm6CGksXD*$fZuRSDf@(iyIMhaeQ#llt6 zA~HE-HPlIf?zMTo)z0h)`H(R?p5^@IDGOf}!#5Uh$n&f?zm%O^8`k&XT#ZdCHtLLV zvj|vZ_duhBA1--mugq!QuoX%D2z&_-5dIC#Zwupul1Z5Rw$P?%nPYFxj-;9=nC*q) zhkT%AeA*Eu1h21NwM&_w=7(wT7^+c-E3QuW=Y_?KI}u(sR-n&*onz|{?;sBkda?4Z zqeq}0STo(o?vNyp^h$ByUy+THe0;Lem~|-OWtK#-4x_LG%8zO~i>h^==WVyQ?)~hQ zs3xH)2k(~%wT3d{|D?hjJ*J8006NNW(@!U diff --git a/charts/argo-ci/charts/argo-0.2.1.tgz b/charts/argo-ci/charts/argo-0.2.1.tgz new file mode 100644 index 0000000000000000000000000000000000000000..da15eb5aabbd983f5f1349f4d486d295055006fc GIT binary patch literal 18860 zcmX_`WmH^E6RmNVAi*WL1_&B-aJS&WHMo0_!3hC^ySuvwcXxMp_kn?#oA+Dy-oIz9 zKC7!v*RH3|Zpug$m?hC@Js9{)KU5(N15o#q)wV*BEtA5J36Z5SlGT(%#-Y~KDB>S= zAy0E`x{0iEzvhai=+-=SS?Q=gGk;E`)w}QZB;X>d@frt%-+}iXIV#t!#~ZHM4IxDJ2ph#ZdQ^9RL;SB8qKHzsX_{6h!ozHE~-wr3Zwj1$JfSm8BJYiJySU>u@6h z0MdW;?{R;zqD6{ku(1|<8!@g85Kdg~Lp_B>I>|$wq3tu~;3SIL`4TF<+>fiuNQOld zyo4)M^o@y|QkYx*sQc<18WFMp0=uIuL2XW2_L`Buf}p7|KMCYzFP8!70TO0~FmKzI zm(aIY8Jm?xIT)mq>0%C1qgM3TURt9w%5wNKY&fjtM@S5n%QFz4VvS2xhqV!EHfuEs z*=ATMc&99g7&3OY`fP2ru5W*Kh3(n3^2Gno(%c;N zUfl_&>-h{ zZ4?+q@1_w#sc-<@{&ZlZ_b7g*3@OON^94U*Tf-7Xyj`OQg)|h1jv(h+2#M0CiQVqY zS^4$g7rw&j=V5ux5eIl@6sGK+qSA&D8WbzZ1uXHZ)iXmq<4WI-tsQ|~f39wfFmUF@ zpfWhK2>-q9%n)MMIFJQ3p;Dd+!5bulzC;+v0;vfK$|A03Pbs(MUd`yh6O>f6z(uGM z5s2^BX!lhH4^=V|0eXp!y9tfkift|Nnmxg|iCLO`f5AqN1~hu_)YihGMU%K6@+h%=(>)k&19w`Kv^iJxZR zQ3^$04m9Hec%n%#W~?{(Op;*$v9O|%Ln?JGXNfO!4lx5hr=romJNrSM+6W zc^`Xu*7c20iq@3wuA9Ad8N@Dz7t@RLw+|RvW_k#~QFucJQaFQZBw;~m8^BZ9Xl?F()>kI(PaeA6}m&07JXu{>JbGIRjPBQkKOyh!qAmmSY87!8xE$ z?T2^}*+W3Q)a5YDc!rpzkGHGES7O|1)gQDf79SFk+$qwO^`?sB+T>xh9|Zf+PSidI z@)O7JZ`pZP_v%=EUkbP{rM57i5DGLFAVr~_)w#h&nt(~7!0=&*aZ~vPUrO&tWrOK_ ztzcOX!h+W*ZL6YyMP(qgxf~ zrPi?$OM*n`U}cH0cp{hQTy-Q1!?AC1%=Aq)G7n?piVjxsFFVnRk}0e|hCEE+gqPSm zW>X*rXBtNZzLlZ6us6Ic`~}7XCTy&qEK}V^%qc<}ytD#39GW577_!caL2yjqH$YDK+=Buj6O4&DB zX{N7L`ASt4de?oiWL0@Kcu(&$1}Mc@#40{5robtExS9yU{~n95NF*C5JxqRpEmT=+ z149cawaoJmLw7HkF&0j%5S1WdSy1Te@Rr?Ea!GadLUra3N5&ns8xA3*rTLEWTQCDr zob|k+vo)dZUDeH)w0tO~&)j8wvkY|xK2B@pRuA@eehKE+w_VwYM#(~*s{@0PkO%*s z-%~+;5|YJiIiKl)uExD32yERm8x~(qG?+(r_&sJua?^0)0h1d$7Y^C9%y=QmsKTmQ z)5Ywv`M1S}q``eIUY*#Fw2ko2U``^GLM~sSvWFgz%Rr-J6*I568&A}$pdvM2(XZ%9 zdkVXc6@n-{IdGFdysSXytAsWm24m3BA_+NrHIU!DI#+n%+pVqFf5Fi*lb?}aNh3Q( z&afUj84bVjPi))0a7n3Fk~&)Ajg!2gar5ndK_H%yw2aTAq}V7LBlq{p_;J@v zErXkcX)iV-Dqe)_1l>vZ+iV>abHPkkm?5Cwc>W&vX%tzP%d}bNN=S4pRaLYcImOi;hBY0seJt5^Z*Z12s3!%|wl^^=yQW*>dll*N6a+6{AKgBcy5rXofi{qD-K zLJ?w)*-;|F;~AGSI!PVB3`-Cd;8SaC7Al5a&DLWtwXV*{RcKwuID>`O!{#C6hvtA^ zBe@%f@(~em)H!8Tu@|F|e+;y`1&jSg1eGZDY_0+aH=(__bjQ%H+^uYAge2L;@aEu) z5v^tvVrsw;uCrC2<2H0w(gelJF6Ihq<=zD?pzB2+_@LH$22Do=@m+T3gZ?$>I_MK> z#1)iUV3)G0;26Z-(M$&h8mZP?15KR}xQkidv}rZTAdyRR)K+;uK~VAbZUpE%>HpQ= zoo+AIKQqoyhTI$6w-)wad*~S+O%^b_fw9L+<2+Vy)W@GLoBMIZK_A9?i*F2#)pG$o zpJFG%{?K>G+!)PB5R592qV#;4m2Hf|NZX~_b5hKI^-jnw;b2AL%0nSSQ4zbr38O~y zbipp>*h8Tl$!n;1Q?Olaj-jHhdbC-SaY1xo!u zsJ^#T84P`>7&>lbjN&(M5a&n$4!#Y?j$FQKp67*_;jY#a*3i?My^NwrEPUBtimp#7 zltwE%%6Z;%ajNf^fnxTeVz6f%yC_clAy~_=+@*N3LLr`vy1$+(Ag7mVtrk@F@`d1Ru;NgnhJkx&bLK>)-iK zDIcV4gZt9Ry~A{Olh&0~T z7&Gb{hzhi!)w^O0Ts%9dAvZzzJgUKcEYiVXYEOG-=n?^6gtxkcouH6VNL7Gfq7eo# zpXrVvY2*Y=iw&mnSmlN~O+Kg<#%iVz?Tnfwa!fLIap)|titlD%nMfv21pQ6i<~b9(M|sDH72JP0;R+CsrP12Va6s{1U*Ul=|#f*jUF=320@qKgDx{Htb^FUeug87 z9P-40O3`Ziz7ehrR><)6{K9=ZuK93RQ}vU|{TLcESRgnI6qCEj>Bj6`cFrd0Uv(CKH{@n)x9G}Qs>e><%r}Nu0wAbsgbse-i=b3mmmcZ zVkX=^=Fncb1E>+z>?71tyEFE09F)k)!L1hh;npew3e1VMdL!icg*ev=^H&;XjodtL zhEoKegjPR#jXp4n{b40|fEtxmdQDUoCE&npMwVy=rmyeA4OezMliC0m&J-omevU@G zAY;#d!^Y|9fU5; zN;86N#E6_}QgcQcCnNt}pMRoExUSF8fV}je>2h?XuHv?OQKZOR%bFaA9hL ziHp5c3s2I5C`8PuQl3G)VcU#U__;ml^yo7f=)o1C56WU?K~uXXR{5ZI&2_SKeSdJK z>I=k<$iZ$u@p=hk64oRfjeEm`o(0x9I&Uo?NY-5l%otD4xkZwdAoZ!Tmg92jbY>y| z7hke`&nRXVDH9g)3%DAtR)dx+VwY|Xp%n)W1p%Aop6-RIQRVd1?zH|BLJ->dJ?tk< zMa(RP{q>mG4L*U!WW99ln%{VJLhg+Cg@}#U_*)}q>ys@WO>-^W%`LNh+ytXA&J$O%ME%3sEBH@I_?I0cUgf{lISe>mkdxh^`wIO_rjC+qjUc_D_ePADZ z;W5PMYbGs3W?R+q5hw&3O=YwDcLpk@Hh2d0BKuRiSOD(U#eIj?#GbrD8~z(hPM}uY z)di54!96;VQI0C|%h3EYA{&OV*3&9}^#iVWL1W}iRuNCbLzW04q`TZjSN_!;=$>DHr!-=_oCaDug_r{y;J?F1iUejU=<{CVR9mdJB;nq;Y!O(g%9?(75H zv-rOYPy`1dzkH~B6f`o}4Iu)uOt?@0%E>382n&$HliUY-C|}5f`%O?owxgh<%Me;4 zC`fNX3Ly@tKCp_nEWE@1 zu6B4ALDZKrt{(J7#BP-R)Q#h_uy zvj8itJP5mx14=p0`zG>vx59hOgcDRP%fPP~6x&-j?6|%S)|9bh287`F{ zcN?MmTC5mkkx5YCBlk|I@Ojf2q8e1W7i?(o`p#8)Dsw4Iafc6=v1n+BL&B4 zlT)!-kZdC5{Cx!ra6+LfbDenKI{T<9~YQlPX&2qw_Ap#d@Fo?;;PwvG{JdDk+JtIYp;=sZ3@R+Tna*v z0573kdwJ@WeX{jgHu&`svK=%c_@ndD zZ`2On*6BES`&R|);O!Y}ESVm>_EzZUc;=@!C7@5F!niOiTH}xUXDFFT@XoN9L3W^pB!>HV)`5o^74&H5aYtBUi=x_92_><0p6c zR|Ts=!oDGWz0RP&aK6$XzI7&luX9xSqz( z!cUA;8nxo70@}yl0-~okE(|#wCJrTNQv_P@i-SgB^P_RZ)bkXbBz^C(Vm{|us>V|$ zO@8{eehVvX@pGPdBT`OvHlRT~x1>+)gla+1jyZxVop=v#4+laG|JHc<^%OP<=hKCN z7`|j^Er&&q6n!EoZRA8gnuu=D4Z;UbP9jz#hpA!xu85Iq50DUoh(gTZ zZb^HV$CISSAjr}B#7wLRSPn#@`Kr73T%sk;n<_%6@Tk%Lq1oFK2^PFi0k1()WXJ-lOqIN)T>Ziaua{!=$@#@z0>Gqry%bmZf+J(Vd+_Y$49xaU0EZ^CI~ z(rj#GI8E4hZ#oo~Lz<%Q`Pr;>re?FGHDd>y)VB5<=p)*D`$7@qcvTMnh5(kVE@h*E z1y1-GD!Tve>;FXi9K5Z|D5R_2PyycV)3|-^ZsK-cp(qPrj6efvmj*+gk^f_md1x+q zZUH1bv>VDc3x$Zhd%s^#Gx_^g{cAS}v&E0MkL-wu4k7Xsi6g+FoGNNm{jA`W6&a6L z4^IpKf+c{Ngrl}C%!t!5-x|8PGn5hqcpC&p9}~c6}tii zhd_eCfULz%V8qSi9$RcGXo?A4rx!aRg6+UlaeW*q$+pfo^%6zXIhWosqJ8 zKeVdD2+%Ldqb}D%vG$}TZNTQ%8Mf9XUrs?hYfprg2uVbGr=&VW?QER9PCSjx^)1aG z@apyLEP&F$O94pCi1&%nSdiff@N1+W`&k0MtDgBS zQvMm&@%4a2D3o`Gf+SuLf92FZj+7xQ(z>1ZPA~Hvd4C%oOzAlBvyRJ+9a=~J4)}-L zC652T6_7)+F`2%r0t9$lsCIz)u!Ei@`~{jvw+FpeZF%Z8tofJ4b7&}oTO$CWC02zF`|8Q^z_FK&Toc)bZyfe6D@wy3_0=|^RsuD&Z z=@LD@jP^Hs!#JMOzf+7^h%Sz`8{h=@rt~Ir00Cfy z#%(|^@XqYtu&qRAC57@LL6rZ?6E{i8O9sTK14Q{X0t(&!|ExU^1%YC$-ms~q_n?am z__+CbNC>LFO|bMMa6(M6hBz0cHWbT27m@bRL0av5% zlRO7h7N8g7&4C1QcvwS(m}V7{#!z#-FHfis;$KU63gbAu@(6S=c%v~s)NbV98~HSs zFwmi>iZZ&rionINOBg1is_Btu+cEPH-B>1+;;W#Yz^?DMlF?WY1a{1|y?l2f=Xh4^ zA*W4PQT$*$N7X#Bdi5z7=~P?MP_S*=%R>C`N0d|9F8r^b&?2#TvicA-HiFyyjLj{u zk3-EAdbBt-zih&CEp{oiVyV{BEIK|%|I?oioZNwKz)XPy{vDGL0;kZ2@iaG*E%XiCwB|gJqwlOgCDbhbCpyf7K9okBIrrZYMn5ZpAiqoW zm^yjgzUEk!>%6O=t6}@#LowN5VW3#<;m}9_e{P2$m=bBx`F%g)-wdRkGXwC0YVQPo zrZ@o$r#wSLa|S>FDT5tAzV1%92-cH6L;{-fAIuo;10<;_f)_8)pg6_9hk+>Ry4}_= z2m1ir7pP|`IpkjEKXH48iv7b_j7h}*44!zhcjz?5d)q=0^g2iN?PbCBC1x=1f79AO zG?GoWHBmKK1xl(70$~l&m3kg!AqsE6fBU?FzW)zxM}geaP?ZG;{5#cu-WBxqZTqo= zgKiiCMWi)^B)q+q_WpW${nWV}DC(~ci5!A{%BO>L`-yixLI-i3bZ2_pccCot%n%4R zQq0x2H%bg;YA6&fq8bWl{~szMqiz3FyzGGF0q7OpKfmm%Hl}1|*%Nm2ozKr#P=zcF zOFL#axRy`$QHryZr{mO((!M7KmKqdDFIYtF1*t*-2qcMPEg`i|r`mB6BM6JeG_S8* z(bi*c&dcW` z-K>4*Ma?W7Z?=;fxT_iR`GK&XqUB1gK~|hNZ*TVeh}(>?nIE|~n7A>E`6zt?A_i_u z`&upC0iWWYr^B zQNIg;%E)3?Lz7GIhS9rzOPl6FbqrY`e&n4!Kn|xjqkkRYxvT|*jTJ3ro8Nu|{h;)* z1e(X~tgCxM;RlWR^six|HB~_YU1y;W)321is~Iae(B53y=kC{#A9myd+2G&;W}Xal zn{et3U0l|nrkg7rnZ$76?D_%2NaM>B*;;)`11xK*UaV#}VRc#Ugjalm=JLc3n(HKU zoFcC1o5SN?y?pl!Qo|C|zHI!nMp7(X@&JZ#COh34jZ!!Fhu+h!oOFON8ISR!=%Nov zV(J|w_K_OjGi8*4=OSik5=lFux?y_lxW!FvDQPBUgS(#gk&Ad|m=j65Ud7jLPQW>z zav6~n(VY{DrPGyhVOvwjoPn}5BEu^Ck@UHi0iDaB8KK78i2TsF?Bi-1zpMD_cgf4$ zkRx}Js_v;n-sTX_Yi%JYf$Yx4_D^$0*P67SH%X7!@>tgck2&+L!2Oj+$Hu4iKSPHU zOZBm7R$bTYjkaL==+&~W#nFYpO%-cFCq`Y*4U#><)6-@BtM3@tv+G&iYXDP;*N3Cx zGn=La*K6iIH<2C;8A_a56Xt6sZyD|SY3sLMLvk6+%_XLaF6;$R^Ss~2)@OB( z#kLrO8gQy+mR|N-GQ3a%f6C?0!2T}Est}>O`wI|Dj!})k_dVueCSg^Q+w}g0ra#^F z*1g5g?ZY`Ft)9n;(~A{b-uT->O>NY`$fL~V6O)8jrc;W)oKA1Lc%tXDQx2Purn)B{ z&*A8FVSPvU$`bT5hs`i12}OrT^);hp*?0lJ*XlQJg>%+Tur>00m!*t;+$J85E#P~b zi;HvI-4nPyQD%EB*+p0GMJ&B73F~Kuk%Ef|r`@-On3mo)9?Z7wh{?cj zq$(5@E+ddRU}{UE7``&BeU+}@Qsy^Th({?l*IinAIbx=bPpnreYG*qKt z%crO-GVPYMKbj}-bjP@KZ&7n3OIp53)R-`T z{xjHCkKAyQ%_aU;C!d?`hiFi*uoO>A>p~3@W=2JmjL%NJiXr{oVbGGAAk9JZazvcKEmLHEL%JL9aur&ZfhZ+0PMtW7$xxK_?dtXC`*GKO zm6oa66+Cj0l%k9l(u$j@8)1cIGYK(FX8{YXJlEkT34ZTwe@<0~y=g%H;qf(wwGd4Z|T z%94NQyb%lVh8CFW?gke+(JZSZ~nTdGVMC&r2_OW>d=5cmkX9C?p)sZwtILt_iL|qxLWz$>E~o+Ujn`L zYTcN2SQ(p$9R*vYP%>D)jOi$B4n-E8N{~I)B(!Z6bHv5+0Pua5WJ&i0qVw8plY(j! zr%b^@Q6!U5ygL*vr8L|0RnU7oejv9TUgbxT%-FR*<-t)+h4ACr5z%jrvW=#YqovGJ z_|_H=hGM(Qst%r>9~WCKen?L7bzo2Mfllw3Z4^b&WI1c@4 z@$t$YxM{b$IUMHEyFIGv`WKrpGHIFkraX-p9;5!jQ z=*&M zbe?@3WU>DGeJjD*$jw~{IQ8?BI*_+lkBNrUzMbDVX1O{>xWnh}hs&()x=;0iq|AB{ zol1T8g$45?yb<{j!4s)LPx@oEN8d9Tj&Dd#Dn-OuVRn}$X}-cKd`>8l zmmZ^DBqJ{8b;)9@X|{|#tjNe*QA6*!;fH7ipwPh!C%MMdK3Z_ip%pLw*8 z&(%Zu%GgTg-(+mlV!m79i_QC-z8D_%gKW#Biz~4H{PCWz-}!bjb9#HqV^$gdLqw0W zXFkxXS{Og?$0r~DLEbq@>j7E>uj6>NUU$ojQ|;gP)Q%-lDQFpSj>TCI9<~>SKJ+m^ z9Chk)hy}l1LyGls^2@_slq&#&<64LN;?vaM@9XNV5Gg;>?B9{<#TS%o@TDM@yX<|V zbUEPbAP!RS<}?9c4Ju53FLl)VWv|5!;J!YMA1X?G>+|~#_=u0G-*r~rmR`NUE}O$; zYU@$gTg5;Zhtz#>zyfE>upJ$(n-e9R6PhF9(mVCBnP)Y?=RjI_XA_8N7bYAuRjd$HuZH8+ZOUq-THQUnLiSFv4#OJYY z$}mG6DS4}WrL%6xIE_!4Si8yUfv@1b5Mr`>UN}XTn(D|?E(Do>AU67AN#>`ZMRnbv zwC+;`v~s9SSVwqHX`$S#qI74v8Ex=Km0OPybYUBeK5Iee3)|xMjD4V>QCJ{pnhC4X>FL^Ch3<2wG#ItWESlQM-|v6eW&1d~Aco zKe}Aq$`rZxh9)8~yAIs}8`ButYuPPJbz6pzUmM@1>%|%<3Kgkrkc%v48*}tC6-Og} z$Htg%nx+%Y+ZwF^wli`0pU#SIeMFS){8$infBfjEbJEv|_aOSwy%%hJ)|B=9=!!>*Jxp`B>!@ z>81McC}Oo<_;f~X>rRwP)pW>AGXL5~fy@A|6o1;c3689`CYOOaY!wwObTE_f`#Koj zhRUDdqoMAwyp2r~gCl9f-#ckZviFJ6__%p;zRK4|_TTAUlF<)%ESCkGbzN)Wt^$AO>7pAr z)-}K6)biVR9ey1>jXrxGS1(Cp-F^}&rFK5pjlu&X@7WXrIw{Vovl73?L2lELBkGo} zQ_} zXOp#?emVSMJfB&m>?!oeB-(K^GK*|)W#Dhy12}MxRFE}G8$U}VI%@e1;sgqh{#^~m zYQxHOfc6lSMe{tp#7aADe&(Y;bh4Iof+o?pCad;OC(_3F?su56FTJmupu!Y&b8U~-7U_&kxJWcgA6jkbPz^^cnMueDmXUR-~B);(00o~*u~T6MOE z^D#~f@vP(5sHk)EM#~lJXan2o=TEF%wtAZ8yS-$hV~m_SJY-*6B`WtvU0O|>_lMZM z1f`l}X)LcJrH4%)TnPyE`M6`ar{(W;PtUf1GMWaZ_9Ccr4s+(_Xz>bKMQLDKVFQ7# zUtca~!}13~`6db9-3Hdqt1!11v^0I}trkzZ0T*sz8arH5uvy{97Cr5NH`29j%Lv z(tLiV5m{#{^>UJ<0zL9shhl8XTg1=!bZo<D@VeDffx_EJ(9f$|skIF-wL1Bm|NQEUo@dNOm89w0gwiNMYF&-z#a)`S zK{BWJTq>qrCymN7=koW3z2PW8&WKBgn~dez35(bC(m~zvSFT9Q1HY_Wolcwc*TfLr z$wh&duW7{ERjHpJa9ncuvAfH{317HQ%cgDRmo8RXSeDH1`g&f)JiiDWTi1I-c=afj zRvI+fJ|_Su4+W_f9T!LA&ndYVMbg+isiIE+4|DGs6l2ft{+l$LT|%LGnO<>o+c3-PfUtJrU7YkElutmCsf@C|g zGdWzLi$dcXr`Xu?^=yKLBJ8?91#c618>n7a_jbnLuYZaif4s!cSTLE7`N&)Rn8A@> z_~8B8rpeAmCs>9*g}F>&`jcw)!~4}47jjm}oO%APr=rO(Fx1tFh;5mQ?7JhXZ=_Z(uWH$^Lm{51=DNDLzLek9sW zY(7dW$(bUX=%{o5#eZ0=w!sI^`@$eZu67(e{Rh(Hm~BzQbN@w3Yk%voyeCB_Lv(-P z9eGvG_9AnSjhp?|PR9w*qtq^B@Fn<)`T2bI>~oo=xaXp`5P0=^CwP^GRsH&S%2~FP z`wU&4=ijmEje=d~my3xF+s0M&XN`=WMm2?El)gNao!r*k4GmLXB{z#;QsP#>IrxvD z;u(eCdv4^Z55CA%e))X14a}PL-~$LV%?k}Fi{yM^i2LkG$g>EImo{0k7GDd;PkGuSxVx=>!{_D$Yf4tdLjJ-mQUx&w@Me4(! zo_-qTluq|08Schv4bHptT|jB=1f83M)>zSNBh&MA8ZiZ3HNYeS_;*HtsKI2a%eKxT z3AUj-YFV8;PPX;_@SL{0h_FlrP=kWuaWi=*VwM%s4nA5uYjH&8Q|t+$sAA(4GHbez z_dicj&y0P0J9-T%FGg!aZ2EUkf;~>}80j#v)#=1l!qDj~XrFJ2-$2@OUHQeX{c0Su zKvgE^@^rPN`N}~_9*|&))7g7h+7kGLgg|fAdxh4`f0jbhjO}Cb>gL_AkE}I*kz3}Y zzHlAmP00OY0ABcYxAu72`kGK*q~*eyC2S`}ze&RWnk{)W-zxm$p{^dbAXb@Iy1>jz z_f~@1h5f8bx5x$C=G94{+{rk+;kc=bJcYnCr5c0dRo$`WY@O!Ec^B-?Ho-hQvxs8f z!%yRd_`vCC?W-|KHO+a3XgNTBf^tQN$j%b8&(yp-3$75uk2Kd48q+R%uO@#;5<-oC zzrSTyNAow?A7GF`hK@3zCcT?s&VB7ppYqRkRpIb;m!@@hgIr!J zFl^VI@^logwLzHnou$1vON~TC-+KdewJK*!tPcS*(+ z&^+*VHrvTPX$Y2|w;k78wp5br8?2Bp+wmpF)#E zKh-?#g2?OP*43b-jgsC!zUJRe&!6_TN5)fz#zrIctUg-$Q;##R3a4OYHdY>RE35KH zlM7jwtQ;*4{i=@BbMLm_qQc`#csZVc#6#ay!Qk?5{onJ(%O(~ky(n6@a+_Coebr6O zdYdm+x4=aynpu>F0%zx;(Vkp>X1utS=vddph9tNB+Z}LvF8ylsN;y?W97YoR7rnyX zE#0nN@4h5AgSLW}<`Xf$DPPiBfJgW zUpa@_xf-^I{fv9#1I`oNulT$u;gv1exqQb8lYRVezPS4!TmGmRI_gJ6!|Nsl$s2GVEclX8%)>+vZm^U6x$1Y@$1gUCQtyAH zd&Xy%MmV!gx9&FJ|I#)XTxKLeUQjF~7ni8v>;`W!_bgO^l7&s^Sfkhx%`x&hCza?M zvr%i8auP@5MZU#Y>R=OQVSbW&DjS=eGhVu!kCD##6nGmevtYlR7LmrmJ$NQTe_c3qR;H%iHFF#a|;{zGnZmjnpK*{>hWa zujvaUv2%9Zn$YopA*(ahv2;yCnRJg?zD&v1oHnYK1*B8F28H_x>wV;PQRs5_tCCbZ0~^;w46y=vO`knS`&qU@d8rP+Rrh6TZn-ww z#1RIQTRHS*!f$E&a*4r`VmQ$^+8MR|gATiAzVrT-Z^rww*2QO4%sQT-6=M+2}fkJ3j&@lnu-R%U)`k2VRSm@jX^mmFy>P zZ!O?$k;*6qGJitt$J;fB=CQYqd^`NTH_y*|j*@&(8i~m)2in_c;HE~Krj)$EUmq`0 z9@gCt*{2!sfmf6kIRGNsd8Is;IrGF8t{6ZhVSzolpEr3Ymv52z)`pb)j&=TE&f1Zrk#Of`z-_#nUo*TTs<(1??gmf-Xmv1Ks)G>~T6z1hxFW-mZSbFN;=iH^M5la&LEKeB!Fx)~> zUZnbHX)7P!H@_R^!Rq4MFN(Pl;j88MbjbBLIFqHB!R9huQV#kxfYY^CNd5VuM4Qb9 zb4H_lVrlRq$pbwfE6Q`xIbOE_W@&`u+3)q~NgI%a-l8Be%ye;`6Nx6&#FKTqY9+T~ zIa%FS?

#Iz`u#_nL;wzdxh7&EA`?~%56<4<88kAWg*bMIWIb-YMbS}B6dZJ z$;i?qa%_)O%}ph<9vzGIzEF?H|IQCE;kGk+Z8+gd<*1a+royg04XiBNk3TlgtI_ek zPSwXzF6KQe?lt2xm;Y%f04}^ZFpy;uUUI?~R;v#_?-|2+Ps8ISm}dX$qRwzNd-#2L z>>K+Z|D4)MK3ILjXgM|sWeT+`rlg;5;O3g$V~dPwqYfu|k3E9lz30W}henoMT;J-~ z&X~S8X=fG1Y!cxmtF+!)U*3hD#>@%~Y2%u2ep4%w7HQB1806K>-UN)^6)mI?P>{Yi zqUXCZ^MUFb6Y#zpiPxN4&P=a$_*w3HIA!sOUlANVJjA5FMGPZDbrj|Qq_UMrPhb1xcB=Z=0)4^gJ5 z0b6CqInN*dm|?TAMyO|-+P7OZ`p%G(-U~bWGNY%CH!Cr^iM&e0Wcy(Gg;JP72KkgM z%)8?DTUFU*E-oh&mQUp4&>ij5R(=*;c^$$J7s1Z!*F3ZQEYC^ys$1hF)+Q1;w&oY4 zecf;0BjzF~$x%WjyIs4-dY>=A6kyXX49{#3{9^K+NK+6$hDzdDX02&?D={RS;r$f( zn6jPn;J|k_J9CGe$UaQ3wW+a&k6&nnY;Q-xqYF4sdU9mryCuDSwFX7RVbbqv3u`aZ zYiqoHqNkm)j-Hz8zN^r(&w)_Cuj)mqP`!uS6`DC`xbtfK_OHLKs(CrDYvSkUDj56y zNGS5piS9R?{tGsl!1)0H=x3&7nPe5{&Ck5Dyrx(VKDTdAkqb99F;-u!*Bjn z#fDSmmobCmuRn9Tw}W{6D&oS$-~*#GUEauAZSgQ*;_H)LoKPQcDX;sIR`}vM*fM*W!4G#W!J?nAk9@i(-+~wsjFh_h{ zj|+Zf_)KnK71ouTPOe&{dib?T-44X!WgZvqcqbKRSrmj#ZaiBRJ>~>HVn@Pk{D{C#&(m1&^s-Hc9lW~xy{81$!zOAH88|C?fNQi%#%}*H-W37Vn$#Pzia)`*Le0J>)jd*7vzPXk|D` zBYmulnL2v?*Q)$XGT}@5a>JQBTi-Y;oeU-hr=|s16^=hqr*k&tZKS{Ep&=C*PV}~r z17!t-ikcFagHJ{jti3V+d_s^>!LNEBYM<%^143E)Kg< z-t1j=u&E{fj%M(#>T9<&b4vTuDa-bsD#BcMd9w*wzGt4>G5-~)0ZU>Y#($B2K7=wipIK6UWvcq{lR zr<2M$>yo(8CC}$54YxIReVK2O9H19|+jr5_#d1>*87SRrkx^g1VBfIEQ@>Vw8r_~U ze^yJBfdM9r0t|{-c5UX}{maxo&Mr{+c(T|(NOPXX)ru{f128WNGBYbRgN;oL2}`AB zR%RRA{QzMPt!x>w1`;?k(0QmyaTY>vc@ zNH5dR<*dz+2|qZ_fq6=Ag?Dl6d;ggSNtT;(>;oyXBX#K-x7K}9+CIrjUH4tI`k`cH z*Ue+KKj9VkpFVDml+}pX>~hBB(VQr=UxnJ9(F#&AQ(UhWq`p%RX<{uN{6WTc6yvf# z&~oNWXi07M0I$zS$IX-dRfWlRzO}nZ<%F{F;XG5~vU#+a+b^A+g43#$ANs$q-aq;} z&U?x$cAU!jZ)lRQbHa?;|(w)ViuJ6*`+KcN=%&bI|z9 z$|IkR@XMYbr4cA&B0v4``jOV!&u^*kxd@yorn}y-B4e(*%}r4@(QbWm2R*L%)=_E9 zM&;Z^Z)J$%x%JY8ELa&7Nb#XG;m(5{p8m>!UkIW|IC9X(|w;HR)E;Rt(l7`sI`~W_)A#vTt@CDD?m+kQ6;W3Sej`cT zi2ShrZQY`@=5(xX{)#I?^g}GYA`l> z^R_opCnvM#I`7|?l8Kl+a{KIf*MZ9|kKbYq)QV){&Z=(vY^nPC_>+f2Gvm&b?n;Ys z%-laOz(1{!HZ$PIlW*~RpA4Gmc8?)%-XN7v9GD-pJ~-$7#Yat>4z8P@dUBsJV$5hJ zzG$DrMEm<{Di*I4$2PxsU^CMrZqAsJfi4RNYMDM6^k(ucIUVmR`T)Rq;7juS91KHFA5C*_RQ=W0|`mm)HC}w`?yaw76bsE zBG&^S=5LjTgA6oX@w8+BEF3Vx)oV2%U=Ixyy{M?|V~79J()wm0)os zYV@kB!&Vu1sh7Q9p?$&nT2}q)X7ut^+eQwIPo3y{{4r{1z{`m03hZSY3mJKK)A;hJ z{DP)aKaUii)p=siI*?V^&vMfH*#*sej?UXmhz?&8aq!)a6#Mw_La@ns>}|UIYuo*W zj%#ICWVt(r4g;zEbOxo{JJ_kMlis6r1bZPrr)<>R0E_jFxASen#<-aOjEJj@m>wQG zLx)J5{;+u&rBQp>aMw!!6BBp(EgTZRZ2xs;is0VCj~poo?h5LZH~jTX5YuBD=7;M&z!NnHb8IohYCc~m~l=P z6ZfQUoP?Qu*sA$v(t!>8Ci?H0)#OaC2?~`WYmGfUZR!T@h r5|WUFBqSjTNk~Exl8}TXBq0e&NJ0{lkc1@kAJYE=iquaU06+l%QPM5e literal 0 HcmV?d00001 diff --git a/charts/argo-ci/requirements.lock b/charts/argo-ci/requirements.lock index 355a093d..14b83c58 100644 --- a/charts/argo-ci/requirements.lock +++ b/charts/argo-ci/requirements.lock @@ -1,6 +1,6 @@ dependencies: - name: argo repository: https://argoproj.github.io/argo-helm - version: 0.1.0 -digest: sha256:21178ca15d323c4fa0d8c11dd50b025a590578cee0521202badc2b704af4e292 -generated: 2018-01-03T12:11:21.170089-08:00 + version: 0.2.1 +digest: sha256:af0f837200061b1720c0e05168dfc4a9537582f3004de62eeb5ef01b4c78db64 +generated: 2018-10-23T14:50:47.570677461-07:00 diff --git a/charts/argo-ci/requirements.yaml b/charts/argo-ci/requirements.yaml index 71f297a1..e9370ec3 100644 --- a/charts/argo-ci/requirements.yaml +++ b/charts/argo-ci/requirements.yaml @@ -1,4 +1,4 @@ dependencies: - name: argo - version: 0.1.0 + version: 0.2.1 repository: https://argoproj.github.io/argo-helm diff --git a/charts/argo-ci/templates/ci-deployment.yaml b/charts/argo-ci/templates/ci-deployment.yaml index 846cc096..c5577cab 100644 --- a/charts/argo-ci/templates/ci-deployment.yaml +++ b/charts/argo-ci/templates/ci-deployment.yaml @@ -20,7 +20,7 @@ spec: - name: IN_CLUSTER value: "true" - name: NAMESPACE - value: 'default' + value: {{ .Values.workflowNamespace }} - name: ARGO_CI_IMAGE value: "{{ .Values.imageNamespace }}/{{ .Values.ciImage }}:{{ .Values.imageTag }}" - name: CONTROLLER_INSTANCE_ID diff --git a/charts/argo-ci/values.yaml b/charts/argo-ci/values.yaml index 1f9584c9..387abd54 100644 --- a/charts/argo-ci/values.yaml +++ b/charts/argo-ci/values.yaml @@ -1,10 +1,10 @@ imageNamespace: argoproj ciImage: argoci -imageTag: v1.0.0-alpha1.2 +imageTag: v1.0.0-alpha2 +workflowNamespace: default argo: imagesNamespace: argoproj - imagesTag: v2.0.0-alpha3 enableWebConsole: false installMinio: true minioBucketName: argo-artifacts