Helm chart: Fix role and rb templates for case with jenkins ns being empty string (#624)
This commit is contained in:
parent
ba78896ea6
commit
65bc574cb8
|
|
@ -1,4 +1,15 @@
|
||||||
{{ template "jenkins-operator.role" .Release.Namespace }}
|
{{ if eq .Values.jenkins.namespace "" }}
|
||||||
{{ if ne .Release.Namespace .Values.jenkins.namespace }}
|
{{- /*
|
||||||
{{ template "jenkins-operator.role" .Values.jenkins.namespace }}
|
# This is a special case when .Values.jenkins.namespace is equal to empty
|
||||||
|
# string which leads to WATCH_NAMESPACE env of jenkins-operator to be set to
|
||||||
|
# empty string and leads to operator actually watching all namespaces. In this
|
||||||
|
# case we need to create clusterrole and clusterrolebinding instead of role and
|
||||||
|
# rolebinding
|
||||||
|
*/ -}}
|
||||||
|
{{- template "jenkins-operator.role" .Values.jenkins.namespace }}
|
||||||
|
{{ else }}
|
||||||
|
{{- template "jenkins-operator.role" .Release.Namespace }}
|
||||||
|
{{- if ne .Release.Namespace .Values.jenkins.namespace -}}
|
||||||
|
{{- template "jenkins-operator.role" .Values.jenkins.namespace }}
|
||||||
|
{{- end }}
|
||||||
{{ end }}
|
{{ end }}
|
||||||
|
|
@ -1,3 +1,25 @@
|
||||||
|
{{ if eq .Values.jenkins.namespace "" }}
|
||||||
|
{{- /*
|
||||||
|
# This is a special case when .Values.jenkins.namespace is equal to empty
|
||||||
|
# string which leads to WATCH_NAMESPACE env of jenkins-operator to be set to
|
||||||
|
# empty string and leads to operator actually watching all namespaces. In this
|
||||||
|
# case we need to create clusterrole and clusterrolebinding instead of role and
|
||||||
|
# rolebinding
|
||||||
|
*/ -}}
|
||||||
|
---
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
metadata:
|
||||||
|
name: jenkins-operator
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: jenkins-operator
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
roleRef:
|
||||||
|
kind: ClusterRole
|
||||||
|
name: jenkins-operator
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
{{ else }}
|
||||||
---
|
---
|
||||||
kind: RoleBinding
|
kind: RoleBinding
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
|
@ -12,28 +34,7 @@ roleRef:
|
||||||
kind: Role
|
kind: Role
|
||||||
name: jenkins-operator
|
name: jenkins-operator
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
{{ if eq .Values.jenkins.namespace "" }}
|
{{ if ne .Release.Namespace .Values.jenkins.namespace }}
|
||||||
{{- /*
|
|
||||||
# This is a special case when .Values.jenkins.namespace is equal to empty
|
|
||||||
# string which leads to WATCH_NAMESPACE env of jenkins-operator to be set to
|
|
||||||
# empty string and leads to operator actually watching all namespaces. In this
|
|
||||||
# case we need to create clusterrole and clusterrolebinding instead of role and
|
|
||||||
# rolebinding
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
metadata:
|
|
||||||
name: jenkins-operator
|
|
||||||
subjects:
|
|
||||||
- kind: ServiceAccount
|
|
||||||
name: jenkins-operator
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
roleRef:
|
|
||||||
kind: ClusterRole
|
|
||||||
name: jenkins-operator
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{ else if ne .Release.Namespace .Values.jenkins.namespace }}
|
|
||||||
---
|
---
|
||||||
kind: RoleBinding
|
kind: RoleBinding
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
|
@ -49,3 +50,4 @@ roleRef:
|
||||||
name: jenkins-operator
|
name: jenkins-operator
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
{{ end }}
|
{{ end }}
|
||||||
|
{{ end }}
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue