Merge remote-tracking branch 'upstream/master' into argocd-helm-v1.0.0

This commit is contained in:
Jaret Deprin 2019-10-24 13:15:23 -07:00
commit ca0b489b4e
16 changed files with 96 additions and 19 deletions

View file

@ -3,3 +3,4 @@ Checklist:
* [ ] I have update the chart version in `Chart.yaml` following Semantic Versioning. * [ ] I have update the chart version in `Chart.yaml` following Semantic Versioning.
* [ ] Any new values are backwards compatible and/or have sensible default. * [ ] Any new values are backwards compatible and/or have sensible default.
* [ ] I have followed the testing instructions in the [contributing guide](https://github.com/argoproj/argo-helm/blob/master/CONTRIBUTING.md). * [ ] I have followed the testing instructions in the [contributing guide](https://github.com/argoproj/argo-helm/blob/master/CONTRIBUTING.md).
* [ ] I have signed the CLA.

View file

@ -1,7 +1,7 @@
apiVersion: v1 apiVersion: v1
description: A Helm chart to install Argo-Events in k8s Cluster description: A Helm chart to install Argo-Events in k8s Cluster
name: argo-events name: argo-events
version: 0.4.3 version: 0.5.0
keywords: keywords:
- argo-events - argo-events
- sensor-controller - sensor-controller
@ -11,5 +11,5 @@ sources:
maintainers: maintainers:
- name: Vaibhav Page - name: Vaibhav Page
- name: Matt Magaldi - name: Matt Magaldi
appVersion: 0.9.2 appVersion: 0.10
icon: https://raw.githubusercontent.com/argoproj/argo/master/argo.png icon: https://raw.githubusercontent.com/argoproj/argo/master/argo.png

View file

@ -1,8 +1,8 @@
# Argo-Events Chart # Argo-Events Chart
This is a **community maintained** chart. It installs the [argo-events](https://github.com/argoproj/argo-events) application. This application comes packaged with: This is a **community maintained** chart. It installs the [argo-events](https://github.com/argoproj/argo-events) application. This application comes packaged with:
- Sensor Custom Resource Definition - Sensor Custom Resource Definition (See CRD Notes)
- Gateway Custom Resource Definition - Gateway Custom Resource Definition (See CRD Notes)
- Sensor Controller Deployment - Sensor Controller Deployment
- Sensor Controller ConfigMap - Sensor Controller ConfigMap
- Gateway Controller Deployment - Gateway Controller Deployment
@ -10,3 +10,7 @@ This is a **community maintained** chart. It installs the [argo-events](https://
- Service Account - Service Account
- Cluster Roles - Cluster Roles
- Cluster Role Bindings - Cluster Role Bindings
## Notes on CRD Installation
Some users would prefer to install the CRDs _outside_ of the chart. You can disable the CRD installation of this chart by using `--set installCRD=false` when installing the chart.

View file

@ -1,3 +1,4 @@
{{- if .Values.installCRD }}
# Define a "gateway" custom resource definition # Define a "gateway" custom resource definition
apiVersion: apiextensions.k8s.io/v1beta1 apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition kind: CustomResourceDefinition
@ -12,3 +13,4 @@ spec:
singular: gateway singular: gateway
scope: Namespaced scope: Namespaced
version: v1alpha1 version: v1alpha1
{{- end }}

View file

@ -1,3 +1,4 @@
{{- if .Values.installCRD }}
# Define a "sensor" custom resource definition # Define a "sensor" custom resource definition
apiVersion: apiextensions.k8s.io/v1beta1 apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition kind: CustomResourceDefinition
@ -12,3 +13,4 @@ spec:
singular: sensor singular: sensor
scope: Namespaced scope: Namespaced
version: v1alpha1 version: v1alpha1
{{- end }}

View file

@ -4,6 +4,9 @@ registry: argoproj
# The image pull policy # The image pull policy
imagePullPolicy: Always imagePullPolicy: Always
# If set to false, skip installing the CRDs. Requires user to have them installed prior to helm chart installation.
installCRD: true
# ServiceAccount to use for running controller. # ServiceAccount to use for running controller.
serviceAccount: argo-events-sa serviceAccount: argo-events-sa
# Create service accounts in additional namespaces specified # Create service accounts in additional namespaces specified
@ -23,11 +26,11 @@ singleNamespace: true
sensorController: sensorController:
name: sensor-controller name: sensor-controller
image: sensor-controller image: sensor-controller
tag: v0.9.2 tag: v0.10
replicaCount: 1 replicaCount: 1
gatewayController: gatewayController:
name: gateway-controller name: gateway-controller
image: gateway-controller image: gateway-controller
tag: v0.9.2 tag: v0.10
replicaCount: 1 replicaCount: 1

View file

@ -1,6 +1,6 @@
apiVersion: v1 apiVersion: v1
appVersion: "v2.3.0" appVersion: "v2.4.2"
description: A Helm chart for Argo Workflows description: A Helm chart for Argo Workflows
name: argo name: argo
version: 0.5.4 version: 0.6.1
icon: https://raw.githubusercontent.com/argoproj/argo/master/argo.png icon: https://raw.githubusercontent.com/argoproj/argo/master/argo.png

View file

@ -8,7 +8,7 @@ If you want your deployment of this helm chart to most closely match the [argo C
This chart uses an install hook to configure the CRD definition. Installation of CRDs is a somewhat privileged process in itself and in RBAC enabled clusters the `default` service account for namespaces does not typically have the ability to do create these. This chart uses an install hook to configure the CRD definition. Installation of CRDs is a somewhat privileged process in itself and in RBAC enabled clusters the `default` service account for namespaces does not typically have the ability to do create these.
A few options are: A few options are:
- Setup the CRD yourself manually and use the `--no-hooks` options of `helm install` - Setup the CRD yourself manually and use `--set installCRD=false` when installing the helm chart. Find the CRDs in the [argo codebase](https://raw.githubusercontent.com/argoproj/argo/master/manifests/base/crds/workflow-crd.yaml)
- Manually create a ServiceAccount in the Namespace which your release will be deployed w/ appropriate bindings to perform this action and set the `init.serviceAccount` attribute - Manually create a ServiceAccount in the Namespace which your release will be deployed w/ appropriate bindings to perform this action and set the `init.serviceAccount` attribute
- Augment the `default` ServiceAccount permissions in the Namespace in which your Release is deployed to have the appropriate permissions - Augment the `default` ServiceAccount permissions in the Namespace in which your Release is deployed to have the appropriate permissions

View file

@ -1,4 +1,4 @@
{{- if .Values.ui.enabled -}} {{- if .Values.ui.enabled }}
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
@ -24,8 +24,9 @@ rules:
- argoproj.io - argoproj.io
resources: resources:
- workflows - workflows
- workflowtemplates
verbs: verbs:
- get - get
- list - list
- watch - watch
{{- end -}} {{- end }}

View file

@ -14,11 +14,12 @@ rules:
resources: resources:
- workflows - workflows
- workflows/finalizers - workflows/finalizers
- workflowtemplates
- workflowtemplates/finalizers
verbs: verbs:
- get - get
- list - list
- watch - watch
--- ---
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
@ -35,6 +36,8 @@ rules:
resources: resources:
- workflows - workflows
- workflows/finalizers - workflows/finalizers
- workflowtemplates
- workflowtemplates/finalizers
verbs: verbs:
- create - create
- delete - delete
@ -44,7 +47,6 @@ rules:
- patch - patch
- update - update
- watch - watch
--- ---
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
@ -61,6 +63,8 @@ rules:
resources: resources:
- workflows - workflows
- workflows/finalizers - workflows/finalizers
- workflowtemplates
- workflowtemplates/finalizers
verbs: verbs:
- create - create
- delete - delete

View file

@ -43,3 +43,20 @@ rules:
- update - update
- patch - patch
- delete - delete
- apiGroups:
- argoproj.io
resources:
- workflowtemplates
- workflowtemplates/finalizers
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- serviceaccounts
verbs:
- get
- list

View file

@ -43,3 +43,6 @@ data:
{{- if .Values.controller.telemetryConfig.enabled }} {{- if .Values.controller.telemetryConfig.enabled }}
telemetryConfig: telemetryConfig:
{{ toYaml .Values.controller.telemetryConfig | indent 6}}{{- end }} {{ toYaml .Values.controller.telemetryConfig | indent 6}}{{- end }}
{{- if .Values.controller.persistence }}
persistence:
{{ toYaml .Values.controller.persistence | indent 6 }}{{- end }}

View file

@ -1,3 +1,4 @@
{{- if .installCRD }}
apiVersion: apiextensions.k8s.io/v1beta1 apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition kind: CustomResourceDefinition
metadata: metadata:
@ -14,3 +15,4 @@ spec:
plural: workflows plural: workflows
shortNames: shortNames:
- wf - wf
{{- end }}

View file

@ -0,0 +1,18 @@
{{- if .installCRD }}
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
name: workflowtemplates.argoproj.io
annotations:
helm.sh/hook: crd-install
helm.sh/hook-delete-policy: before-hook-creation
spec:
group: argoproj.io
version: v1alpha1
scope: Namespaced
names:
kind: WorkflowTemplate
plural: workflowtemplates
shortNames:
- wftmpl
{{- end }}

View file

@ -4,9 +4,10 @@ images:
ui: argoui ui: argoui
executor: argoexec executor: argoexec
pullPolicy: Always pullPolicy: Always
tag: v2.3.0 tag: v2.4.2
crdVersion: v1alpha1 crdVersion: v1alpha1
installCRD: true
init: init:
# By default the installation will not set an explicit one, which will mean it uses `default` for the namespace the chart is # By default the installation will not set an explicit one, which will mean it uses `default` for the namespace the chart is
@ -28,6 +29,24 @@ controller:
enabled: false enabled: false
path: /metrics path: /metrics
port: 8080 port: 8080
persistence: {}
# connectionPool:
# maxIdleConns: 100
# maxOpenConns: 0
# # save the entire workflow into etcd and DB
# nodeStatusOffLoad: false
# postgresql:
# host: localhost
# port: 5432
# database: postgres
# tableName: argo_workflows
# # the database secrets must be in the same namespace of the controller
# userNameSecret:
# name: argo-postgres-config
# key: username
# passwordSecret:
# name: argo-postgres-config
# key: password
telemetryConfig: telemetryConfig:
enabled: false enabled: false
path: /telemetry path: /telemetry

View file

@ -1,16 +1,17 @@
#!/bin/bash #!/bin/bash
set -eux
SRCROOT="$(cd "$(dirname "$0")/.." && pwd)" SRCROOT="$(cd "$(dirname "$0")/.." && pwd)"
GIT_PUSH=${GIT_PUSH:-true} GIT_PUSH=${GIT_PUSH:-true}
rm -rf $SRCROOT/output && git clone -b gh-pages git@github.com:argoproj/argo-helm.git $SRCROOT/output rm -rf $SRCROOT/output && git clone -b gh-pages git@github.com:argoproj/argo-helm.git $SRCROOT/output
cd $SRCROOT/charts for dir in $(find $SRCROOT/charts -mindepth 1 -maxdepth 1 -type d);
for dir in *;
do do
echo "Processing $dir" echo "Processing $dir"
helm package $dir helm package $dir
done done
cp $SRCROOT/*.tgz output/
cd $SRCROOT/output && helm repo index . cd $SRCROOT/output && helm repo index .
cd $SRCROOT/output && git status cd $SRCROOT/output && git status