Rename to singleNamespace to align with events

This commit is contained in:
Kristof Farkas-Pall 2020-03-12 08:08:20 +00:00
parent 40be83ba0c
commit 73fc1314ff
No known key found for this signature in database
GPG key ID: 0C8396E9F0F3C9A3
8 changed files with 14 additions and 14 deletions

View file

@ -1,6 +1,6 @@
{{- if .Values.server.enabled }}
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: Role
{{ else }}
kind: ClusterRole

View file

@ -1,6 +1,6 @@
{{- if .Values.server.enabled -}}
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: RoleBinding
{{ else }}
kind: ClusterRoleBinding
@ -9,7 +9,7 @@ metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}-crb
roleRef:
apiGroup: rbac.authorization.k8s.io
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: Role
{{ else }}
kind: ClusterRole

View file

@ -30,7 +30,7 @@ spec:
- name: argo-server
args:
- server
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
- "--namespaced"
{{- end }}
image: "{{ .Values.images.namespace }}/{{ .Values.images.server }}:{{ default .Values.images.tag .Values.server.image.tag }}"

View file

@ -1,6 +1,6 @@
{{- if .Values.createAggregateRoles }}
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: Role
{{ else }}
kind: ClusterRole
@ -28,7 +28,7 @@ rules:
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: Role
{{ else }}
kind: ClusterRole
@ -61,7 +61,7 @@ rules:
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: Role
{{ else }}
kind: ClusterRole

View file

@ -1,5 +1,5 @@
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: Role
{{ else }}
kind: ClusterRole

View file

@ -1,5 +1,5 @@
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: RoleBinding
{{ else }}
kind: ClusterRoleBinding
@ -8,7 +8,7 @@ metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name}}-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
kind: Role
{{ else }}
kind: ClusterRole

View file

@ -40,7 +40,7 @@ spec:
- "{{ .Values.controller.logging.level }}"
- "--gloglevel"
- "{{ .Values.controller.logging.globallevel }}"
{{- if .Values.namespaced }}
{{- if .Values.singleNamespace }}
- "--namespaced"
{{- end }}
env:

View file

@ -16,9 +16,9 @@ init:
createAggregateRoles: true
# Install argo components into a single namespace. Apply Roles and RoleBindings instead of the Cluster equivalents,
# and start argo-cli with the --namespaced flag.
namespaced: false
# Restrict Argo to only deploy into a single namespace by apply Roles and RoleBindings instead of the Cluster equivalents,
# and start argo-cli with the --namespaced flag. Use it in clusters with strict access policy.
singleNamespace: true
controller:
image: