Merge branch 'master' into patch-1

This commit is contained in:
Szymon 2020-05-03 11:41:58 +02:00 committed by GitHub
commit 867b8f485c
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
14 changed files with 94 additions and 23 deletions

1
.gitignore vendored
View file

@ -1,4 +1,5 @@
output
.vscode
.DS_Store
.idea
**/*.tgz

View file

@ -7,7 +7,7 @@
/charts/argo-events @jbehling
# Argo Workflows
/charts/argo @benjaminws @stefansedich
/charts/argo @benjaminws @stefansedich @paguos
# Argo Rollouts
/charts/argo-rollouts @cabrinha

View file

@ -2,7 +2,7 @@ apiVersion: v1
appVersion: "v2.7.6"
description: A Helm chart for Argo Workflows
name: argo
version: 0.8.1
version: 0.8.5
icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png
home: https://github.com/argoproj/argo-helm
maintainers:

View file

@ -1,8 +1,14 @@
{{- if .Values.server.enabled }}
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }}
kind: Role
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name }}-role
{{ else }}
kind: ClusterRole
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name }}-cluster-role
{{- end }}
rules:
- apiGroups:
- ""
@ -28,6 +34,7 @@ rules:
- get
- list
- watch
- delete
{{- if .Values.controller.persistence }}
- apiGroups:
- ""

View file

@ -1,12 +1,23 @@
{{- if .Values.server.enabled -}}
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }}
kind: RoleBinding
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}-rb
{{ else }}
kind: ClusterRoleBinding
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}-crb
{{- end }}
roleRef:
apiGroup: rbac.authorization.k8s.io
{{- if .Values.singleNamespace }}
kind: Role
name: {{ .Release.Name }}-{{ .Values.server.name}}-role
{{ else }}
kind: ClusterRole
name: {{ .Release.Name }}-{{ .Values.server.name}}-cluster-role
{{- end }}
subjects:
- kind: ServiceAccount
name: {{ .Values.server.serviceAccount }}

View file

@ -1,5 +1,5 @@
{{- if .Values.server.enabled -}}apiVersion: apps/v1
{{- if .Values.server.enabled -}}
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ .Release.Name }}-{{ .Values.server.name}}
@ -13,7 +13,6 @@ spec:
matchLabels:
app: {{ .Release.Name }}-{{ .Values.server.name}}
release: {{ .Release.Name }}
app: {{ .Release.Name }}-{{ .Values.server.name}}
template:
metadata:
labels:
@ -35,13 +34,16 @@ spec:
{{- if .Values.server.extraArgs }}
{{- toYaml .Values.server.extraArgs | nindent 10 }}
{{- end }}
{{- if .Values.singleNamespace }}
- "--namespaced"
{{- end }}
image: "{{ .Values.images.namespace }}/{{ .Values.images.server }}:{{ default .Values.images.tag .Values.server.image.tag }}"
imagePullPolicy: {{ .Values.images.pullPolicy }}
{{- if .Values.server.podPortName }}
ports:
- name: {{ .Values.server.podPortName }}
ports:
containerPort: 2746
{{- end }}
readinessProbe:
httpGet:
path: /
@ -49,12 +51,7 @@ spec:
scheme: HTTP
initialDelaySeconds: 10
periodSeconds: 20
{{- end }}
env:
{{- if .Values.server.forceNamespaceIsolation }}
- name: FORCE_NAMESPACE_ISOLATION
value: "true"
{{- end }}
- name: IN_CLUSTER
value: "true"
- name: ARGO_NAMESPACE

View file

@ -24,6 +24,13 @@ spec:
- host: {{ . }}
http:
paths:
{{- if $.Values.server.ingress.paths }}
{{- range $.Values.server.ingress.paths }}
- backend:
serviceName: {{ .serviceName }}
servicePort: {{ .servicePort }}
{{- end }}
{{- end }}
- backend:
serviceName: {{ $serviceName }}
servicePort: {{ $servicePort }}

View file

@ -3,4 +3,6 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ .Values.server.serviceAccount }}
annotations:
{{ toYaml .Values.server.serviceAccountAnnotations | indent 4 }}
{{- end -}}

View file

@ -1,7 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }}
kind: Role
metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name }}-role
{{ else }}
kind: ClusterRole
metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name }}-cluster-role
{{- end }}
rules:
- apiGroups:
- ""

View file

@ -16,6 +16,11 @@ data:
{{- end }}
{{- end }}
containerRuntimeExecutor: {{ .Values.controller.containerRuntimeExecutor }}
{{- with .Values.executor.resources }}
executor:
resources:
{{- toYaml . | nindent 8 }}
{{- end }}
artifactRepository:
{{- if or .Values.minio.install .Values.useDefaultArtifactRepo }}
{{- if .Values.artifactRepository.archiveLogs }}
@ -39,6 +44,12 @@ data:
{{- if .Values.artifactRepository.s3.region }}
region: {{ .Values.artifactRepository.s3.region }}
{{- end }}
{{- if .Values.artifactRepository.s3.roleARN }}
roleARN: {{ .Values.artifactRepository.s3.roleARN }}
{{- end }}
{{- if .Values.artifactRepository.s3.useSDKCreds }}
useSDKCreds: {{ .Values.artifactRepository.s3.useSDKCreds }}
{{- end }}
{{- end}}
{{- if .Values.controller.metricsConfig.enabled }}
metricsConfig:

View file

@ -1,11 +1,20 @@
apiVersion: rbac.authorization.k8s.io/v1
{{- if .Values.singleNamespace }}
kind: RoleBinding
{{ else }}
kind: ClusterRoleBinding
{{- end }}
metadata:
name: {{ .Release.Name }}-{{ .Values.controller.name }}-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
{{- if .Values.singleNamespace }}
kind: Role
name: {{ .Release.Name }}-{{ .Values.controller.name }}-role
{{ else }}
kind: ClusterRole
name: {{ .Release.Name }}-{{ .Values.controller.name }}-cluster-role
{{- end }}
subjects:
- kind: ServiceAccount
name: {{ .Values.controller.serviceAccount }}

View file

@ -40,6 +40,9 @@ spec:
- "{{ .Values.controller.logging.level }}"
- "--gloglevel"
- "{{ .Values.controller.logging.globallevel }}"
{{- if .Values.singleNamespace }}
- "--namespaced"
{{- end }}
env:
- name: ARGO_NAMESPACE
valueFrom:

View file

@ -2,3 +2,5 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ .Values.controller.serviceAccount }}
annotations:
{{ toYaml .Values.controller.serviceAccountAnnotations | indent 4 }}

View file

@ -16,6 +16,10 @@ init:
createAggregateRoles: true
# Restrict Argo to only deploy into a single namespace by apply Roles and RoleBindings instead of the Cluster equivalents,
# and start argo-cli with the --namespaced flag. Use it in clusters with strict access policy.
singleNamespace: false
controller:
image:
# Overrides .images.tag if defined.
@ -59,6 +63,8 @@ controller:
enabled: false
additionalLabels: {}
serviceAccount: argo
# Service account annotations
serviceAccountAnnotations: {}
name: workflow-controller
workflowNamespaces:
- default
@ -99,15 +105,15 @@ controller:
tolerations: []
affinity: {}
# executor controls how the init and wait container should be customized
executor:
image:
# Overrides .images.tag if defined.
tag: ""
resources: {}
server:
enabled: true
# only show workflows where UI installed
forceNamespaceIsolation: false
# only updates base url of resources on client side,
# it's expected that a proxy server rewrites the request URL and gets rid of this prefix
# https://github.com/argoproj/argo/issues/716#issuecomment-433213190
@ -124,6 +130,8 @@ server:
servicePort: 2746
# servicePortName: http
serviceAccount: argo-server
# Service account annotations
serviceAccountAnnotations: {}
# Annotations to be applied to the UI Service
serviceAnnotations: {}
# Optional labels to add to the UI Service
@ -168,6 +176,11 @@ server:
# hosts:
# - argo.domain.com
## Additional Paths for each host
# paths:
# - serviceName: "ssl-redirect"
# servicePort: "use-annotation"
## TLS configuration.
## Secrets must be manually created in the namespace.
##
@ -195,6 +208,8 @@ artifactRepository:
# bucket:
# endpoint:
# region:
# roleARN:
# useSDKCreds: true
# NOTE: These are setting attributes for the `minio` optional dependency
minio: