feat(Argo): Add secret access whitelist for server. (#499)
Signed-off-by: Vlad Losev <vladimir.losev@sage.com>
This commit is contained in:
parent
d265f7dd75
commit
af9a14a1ec
3 changed files with 25 additions and 14 deletions
|
@ -2,7 +2,7 @@ apiVersion: v1
|
||||||
appVersion: v2.11.7
|
appVersion: v2.11.7
|
||||||
description: A Helm chart for Argo Workflows
|
description: A Helm chart for Argo Workflows
|
||||||
name: argo
|
name: argo
|
||||||
version: 0.13.6
|
version: 0.13.7
|
||||||
icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png
|
icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png
|
||||||
home: https://github.com/argoproj/argo-helm
|
home: https://github.com/argoproj/argo-helm
|
||||||
maintainers:
|
maintainers:
|
||||||
|
|
|
@ -13,12 +13,6 @@ rules:
|
||||||
- get
|
- get
|
||||||
- watch
|
- watch
|
||||||
- list
|
- list
|
||||||
- apiGroups:
|
|
||||||
- ""
|
|
||||||
resources:
|
|
||||||
- secrets
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
|
@ -30,6 +24,21 @@ rules:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
- delete
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- serviceaccounts
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- secrets
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
{{- with .Values.server.rbac.secretWhitelist }}
|
||||||
|
resourceNames: {{- toYaml . | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
|
@ -41,15 +50,14 @@ rules:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- secrets
|
- secrets
|
||||||
- serviceaccounts
|
|
||||||
resourceNames:
|
resourceNames:
|
||||||
{{- if .Values.controller.persistence.postgresql }}
|
{{- with .Values.controller.persistence.postgresql }}
|
||||||
- {{ .Values.controller.persistence.postgresql.userNameSecret.name }}
|
- {{ .userNameSecret.name }}
|
||||||
- {{ .Values.controller.persistence.postgresql.passwordSecret.name }}
|
- {{ .passwordSecret.name }}
|
||||||
{{- end}}
|
{{- end}}
|
||||||
{{- if .Values.controller.persistence.mysql }}
|
{{- with .Values.controller.persistence.mysql }}
|
||||||
- {{ .Values.controller.persistence.mysql.userNameSecret.name }}
|
- {{ .userNameSecret.name }}
|
||||||
- {{ .Values.controller.persistence.mysql.passwordSecret.name }}
|
- {{ .passwordSecret.name }}
|
||||||
{{- end}}
|
{{- end}}
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
|
|
|
@ -164,6 +164,9 @@ server:
|
||||||
serviceType: ClusterIP
|
serviceType: ClusterIP
|
||||||
servicePort: 2746
|
servicePort: 2746
|
||||||
# servicePortName: http
|
# servicePortName: http
|
||||||
|
rbac:
|
||||||
|
# When present, restricts secrets the server can read to a given list.
|
||||||
|
secretWhitelist: []
|
||||||
serviceAccount: argo-server
|
serviceAccount: argo-server
|
||||||
# Whether to create the service account with the name specified in
|
# Whether to create the service account with the name specified in
|
||||||
# server.serviceAccount and bind it to the server role.
|
# server.serviceAccount and bind it to the server role.
|
||||||
|
|
Loading…
Reference in a new issue