Skip to content

Commit 9dfc400

Browse files
break(helm/v2-alpha): Add support to install solution as namespaced scope
1 parent c040452 commit 9dfc400

34 files changed

Lines changed: 527 additions & 74 deletions

docs/book/src/cronjob-tutorial/testdata/project/dist/chart/templates/rbac/cronjob-admin-role.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
{{- if .Values.rbacHelpers.enable }}
1+
{{- if .Values.rbac.helpers.create }}
22
apiVersion: rbac.authorization.k8s.io/v1
33
kind: ClusterRole
44
metadata:

docs/book/src/cronjob-tutorial/testdata/project/dist/chart/templates/rbac/cronjob-editor-role.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
{{- if .Values.rbacHelpers.enable }}
1+
{{- if .Values.rbac.helpers.create }}
22
apiVersion: rbac.authorization.k8s.io/v1
33
kind: ClusterRole
44
metadata:

docs/book/src/cronjob-tutorial/testdata/project/dist/chart/templates/rbac/cronjob-viewer-role.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
{{- if .Values.rbacHelpers.enable }}
1+
{{- if .Values.rbac.helpers.create }}
22
apiVersion: rbac.authorization.k8s.io/v1
33
kind: ClusterRole
44
metadata:

docs/book/src/cronjob-tutorial/testdata/project/dist/chart/templates/rbac/manager-role.yaml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,13 @@
11
apiVersion: rbac.authorization.k8s.io/v1
2+
{{- if .Values.rbac.namespaced }}
3+
kind: Role
4+
{{- else }}
25
kind: ClusterRole
6+
{{- end }}
37
metadata:
8+
{{- if .Values.rbac.namespaced }}
9+
namespace: {{ .Release.Namespace }}
10+
{{- end }}
411
name: {{ include "project.resourceName" (dict "suffix" "manager-role" "context" $) }}
512
rules:
613
- apiGroups:

docs/book/src/cronjob-tutorial/testdata/project/dist/chart/templates/rbac/manager-rolebinding.yaml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,13 @@
11
apiVersion: rbac.authorization.k8s.io/v1
2+
{{- if .Values.rbac.namespaced }}
3+
kind: RoleBinding
4+
{{- else }}
25
kind: ClusterRoleBinding
6+
{{- end }}
37
metadata:
8+
{{- if .Values.rbac.namespaced }}
9+
namespace: {{ .Release.Namespace }}
10+
{{- end }}
411
labels:
512
app.kubernetes.io/managed-by: {{ .Release.Service }}
613
app.kubernetes.io/name: {{ include "project.name" . }}
@@ -9,7 +16,11 @@ metadata:
916
name: {{ include "project.resourceName" (dict "suffix" "manager-rolebinding" "context" $) }}
1017
roleRef:
1118
apiGroup: rbac.authorization.k8s.io
19+
{{- if .Values.rbac.namespaced }}
20+
kind: Role
21+
{{- else }}
1222
kind: ClusterRole
23+
{{- end }}
1324
name: {{ include "project.resourceName" (dict "suffix" "manager-role" "context" $) }}
1425
subjects:
1526
- kind: ServiceAccount

docs/book/src/cronjob-tutorial/testdata/project/dist/chart/values.yaml

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,22 @@ manager:
7272
##
7373
tolerations: []
7474

75-
## Helper RBAC roles for managing custom resources
75+
## RBAC configuration
7676
##
77-
rbacHelpers:
78-
# Install convenience admin/editor/viewer roles for CRDs
79-
enable: false
77+
rbac:
78+
# Operator RBAC scope
79+
#
80+
# - false (default): ClusterRole/ClusterRoleBinding (all namespaces)
81+
# - true: Role/RoleBinding (release namespace only)
82+
#
83+
# Note: metrics-auth-role is always a ClusterRole
84+
# (requires TokenReview and SubjectAccessReview APIs).
85+
namespaced: false
86+
87+
# Helper roles for CRD management (admin/editor/viewer)
88+
helpers:
89+
# Install convenience admin/editor/viewer roles for CRDs
90+
create: false
8091

8192
## Custom Resource Definitions
8293
##

docs/book/src/getting-started/testdata/project/dist/chart/templates/rbac/manager-role.yaml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,13 @@
11
apiVersion: rbac.authorization.k8s.io/v1
2+
{{- if .Values.rbac.namespaced }}
3+
kind: Role
4+
{{- else }}
25
kind: ClusterRole
6+
{{- end }}
37
metadata:
8+
{{- if .Values.rbac.namespaced }}
9+
namespace: {{ .Release.Namespace }}
10+
{{- end }}
411
name: {{ include "project.resourceName" (dict "suffix" "manager-role" "context" $) }}
512
rules:
613
- apiGroups:

docs/book/src/getting-started/testdata/project/dist/chart/templates/rbac/manager-rolebinding.yaml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,13 @@
11
apiVersion: rbac.authorization.k8s.io/v1
2+
{{- if .Values.rbac.namespaced }}
3+
kind: RoleBinding
4+
{{- else }}
25
kind: ClusterRoleBinding
6+
{{- end }}
37
metadata:
8+
{{- if .Values.rbac.namespaced }}
9+
namespace: {{ .Release.Namespace }}
10+
{{- end }}
411
labels:
512
app.kubernetes.io/managed-by: {{ .Release.Service }}
613
app.kubernetes.io/name: {{ include "project.name" . }}
@@ -9,7 +16,11 @@ metadata:
916
name: {{ include "project.resourceName" (dict "suffix" "manager-rolebinding" "context" $) }}
1017
roleRef:
1118
apiGroup: rbac.authorization.k8s.io
19+
{{- if .Values.rbac.namespaced }}
20+
kind: Role
21+
{{- else }}
1222
kind: ClusterRole
23+
{{- end }}
1324
name: {{ include "project.resourceName" (dict "suffix" "manager-role" "context" $) }}
1425
subjects:
1526
- kind: ServiceAccount

docs/book/src/getting-started/testdata/project/dist/chart/templates/rbac/memcached-admin-role.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
{{- if .Values.rbacHelpers.enable }}
1+
{{- if .Values.rbac.helpers.create }}
22
apiVersion: rbac.authorization.k8s.io/v1
33
kind: ClusterRole
44
metadata:

docs/book/src/getting-started/testdata/project/dist/chart/templates/rbac/memcached-editor-role.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
{{- if .Values.rbacHelpers.enable }}
1+
{{- if .Values.rbac.helpers.create }}
22
apiVersion: rbac.authorization.k8s.io/v1
33
kind: ClusterRole
44
metadata:

0 commit comments

Comments
 (0)