fix(Argo): Unify settings for activating rbac. (#544)

Signed-off-by: Vlad Losev <vladimir.losev@sage.com>
pull/546/head
Vlad Losev 2021-01-13 10:07:56 -08:00 committed by GitHub
parent 391c439de6
commit 4f7fe688cf
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 21 additions and 6 deletions

View File

@ -2,7 +2,7 @@ apiVersion: v2
appVersion: v2.12.3
description: A Helm chart for Argo Workflows
name: argo
version: 0.15.0
version: 0.15.1
icon: https://raw.githubusercontent.com/argoproj/argo/master/docs/assets/argo.png
home: https://github.com/argoproj/argo-helm
maintainers:

View File

@ -41,7 +41,8 @@ rules:
verbs:
- create
{{- end}}
{{- if .Values.server.rbac }}
{{- if .Values.server.sso }}
{{- if .Values.server.sso.rbac }}
- apiGroups:
- ""
resources:
@ -49,6 +50,7 @@ rules:
verbs:
- get
- list
{{- end }}
{{- end }}
- apiGroups:
- ""
@ -56,8 +58,12 @@ rules:
- secrets
verbs:
- get
{{- with .Values.server.rbac.secretWhitelist }}
{{- if .Values.server.sso }}
{{- if .Values.server.sso.rbac }}
{{- with .Values.server.sso.rbac.secretWhitelist }}
resourceNames: {{- toYaml . | nindent 4 }}
{{- end }}
{{- end }}
{{- end }}
- apiGroups:
- ""

View File

@ -167,9 +167,6 @@ server:
serviceType: ClusterIP
servicePort: 2746
# servicePortName: http
rbac:
# When present, restricts secrets the server can read to a given list.
secretWhitelist: []
serviceAccount: argo-server
# Whether to create the service account with the name specified in
# server.serviceAccount and bind it to the server role.
@ -267,6 +264,18 @@ server:
# key: client-secret
## The OIDC redirect URL. Should be in the form <argo-root-url>/oauth2/callback.
# redirectUrl: https://argo/oauth2/callback
# rbac:
# enabled: true
## When present, restricts secrets the server can read to a given list.
## You can use it to restrict the server to only be able to access the
## service account token secrets that are associated with service accounts
## used for authorization.
# secretWhitelist: []
## Scopes requested from the SSO ID provider. The 'groups' scope requests
## group membership information, which is usually used for authorization
## decisions.
# scopes:
# - groups
# Influences the creation of the ConfigMap for the workflow-controller itself.
useDefaultArtifactRepo: false