move cluster Admin Access to controller
Ability enable the cluster admin access to deploy to the local cluster.
This commit is contained in:
parent
0f7aba1300
commit
e2215f864a
6 changed files with 14 additions and 13 deletions
|
@ -49,6 +49,7 @@ $ helm install --name my-release argo/argo-cd
|
||||||
| controller.affinity | Assign custom affinity rules to the deployment https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ | `{}` |
|
| controller.affinity | Assign custom affinity rules to the deployment https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ | `{}` |
|
||||||
| controller.args.operationProcessors | define the controller `--operation-processors` | `"10"` |
|
| controller.args.operationProcessors | define the controller `--operation-processors` | `"10"` |
|
||||||
| controller.args.statusProcessors | define the controller `--status-processors` | `"20"` |
|
| controller.args.statusProcessors | define the controller `--status-processors` | `"20"` |
|
||||||
|
| controller.clusterAdminAccess.enabled | Enable RBAC for local cluster deployments. | `true` |
|
||||||
| controller.containerPort | Controller listening port. | `8082` |
|
| controller.containerPort | Controller listening port. | `8082` |
|
||||||
| controller.extraArgs | Additional arguments for the controller. | `[]` |
|
| controller.extraArgs | Additional arguments for the controller. | `[]` |
|
||||||
| controller.image.repository | Repository to use for the controller | `global.image.repository` |
|
| controller.image.repository | Repository to use for the controller | `global.image.repository` |
|
||||||
|
@ -135,7 +136,6 @@ $ helm install --name my-release argo/argo-cd
|
||||||
| server.certificate.domain | Certificate manager domain | `"argocd.example.com"` |
|
| server.certificate.domain | Certificate manager domain | `"argocd.example.com"` |
|
||||||
| server.certificate.enabled | Enables a certificate manager certificate. | `false` |
|
| server.certificate.enabled | Enables a certificate manager certificate. | `false` |
|
||||||
| server.certificate.issuer | Certificate manager issuer | `{}` |
|
| server.certificate.issuer | Certificate manager issuer | `{}` |
|
||||||
| server.clusterAdminAccess.enabled | Enable RBAC for cluster admin access | `true` |
|
|
||||||
| server.config | URL for Argo CD | `{}` |
|
| server.config | URL for Argo CD | `{}` |
|
||||||
| server.containerPort | Server container port. | `8080` |
|
| server.containerPort | Server container port. | `8080` |
|
||||||
| server.extraArgs | Additional arguments for the server | `[]` |
|
| server.extraArgs | Additional arguments for the server | `[]` |
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
{{- if .Values.controller.clusterAdminAccess.enabled }}
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -20,3 +21,4 @@ rules:
|
||||||
- '*'
|
- '*'
|
||||||
verbs:
|
verbs:
|
||||||
- '*'
|
- '*'
|
||||||
|
{{- end }}
|
|
@ -1,3 +1,4 @@
|
||||||
|
{{- if .Values.controller.clusterAdminAccess.enabled }}
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -17,3 +18,4 @@ subjects:
|
||||||
- kind: ServiceAccount
|
- kind: ServiceAccount
|
||||||
name: {{ template "argo-cd.controllerServiceAccountName" . }}
|
name: {{ template "argo-cd.controllerServiceAccountName" . }}
|
||||||
namespace: {{ .Release.Namespace }}
|
namespace: {{ .Release.Namespace }}
|
||||||
|
{{- end }}
|
|
@ -1,4 +1,3 @@
|
||||||
{{- if .Values.server.clusterAdminAccess.enabled }}
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -32,4 +31,3 @@ rules:
|
||||||
- pods/log
|
- pods/log
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
{{- end }}
|
|
||||||
|
|
|
@ -1,4 +1,3 @@
|
||||||
{{- if .Values.server.clusterAdminAccess.enabled }}
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -18,4 +17,3 @@ subjects:
|
||||||
- kind: ServiceAccount
|
- kind: ServiceAccount
|
||||||
name: {{ template "argo-cd.serverServiceAccountName" . }}
|
name: {{ template "argo-cd.serverServiceAccountName" . }}
|
||||||
namespace: {{ .Release.Namespace }}
|
namespace: {{ .Release.Namespace }}
|
||||||
{{- end -}}
|
|
||||||
|
|
|
@ -103,6 +103,11 @@ controller:
|
||||||
# namespace: monitoring
|
# namespace: monitoring
|
||||||
# additionalLabels: {}
|
# additionalLabels: {}
|
||||||
|
|
||||||
|
## Enable Admin ClusterRole resources.
|
||||||
|
## Enable if you would like to grant rights to ArgoCD to deploy to the local kuberentes cluster.
|
||||||
|
clusterAdminAccess:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
## Dex
|
## Dex
|
||||||
dex:
|
dex:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
@ -198,10 +203,6 @@ server:
|
||||||
## Argo server log level
|
## Argo server log level
|
||||||
logLevel: info
|
logLevel: info
|
||||||
|
|
||||||
## Enable Admin ClusterRole resources
|
|
||||||
clusterAdminAccess:
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
## Annotations to be added to controller pods
|
## Annotations to be added to controller pods
|
||||||
##
|
##
|
||||||
podAnnotations: {}
|
podAnnotations: {}
|
||||||
|
|
Loading…
Reference in a new issue