Skip to content

Commit

Permalink
Helm Charts: Ability to opt out from namespace creation (#1153)
Browse files Browse the repository at this point in the history
* 🌟 enhancement(VSecM Helm Charts): Ability to opt-out from ns creation

Giving the helm charts the ability to create namespaces might not be acceptable
in certain situations, especially when you (as the cluster admin) want to have
a tighter control around resource quotas.

This PR gives the helm chart ability to opt-out automatic namespace creation.
-- When that happens, the operator will have to manually create vsecm-system,
spire-system, and spire-server namespaces.

Signed-off-by: Volkan Özçelik <[email protected]>

* changelog update

---------

Signed-off-by: Volkan Özçelik <[email protected]>
  • Loading branch information
v0lkan authored Oct 4, 2024
1 parent 4235abe commit 6453352
Show file tree
Hide file tree
Showing 12 changed files with 23 additions and 13 deletions.
4 changes: 3 additions & 1 deletion docs/content/timeline/changelog.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,9 @@ weight = 11

## Recent Changes

## [0.27.3] - 2024-09-30
* Added helm charts the ability to optionally disable custom namespace generation.

## [0.27.2] - 2024-09-30

### Added

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,9 @@
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

{{- if .Values.global.preInstallVSecMNamespaces }}
apiVersion: v1
kind: Namespace
metadata:
name: {{ .Values.global.vsecm.namespace }}
{{- end }}
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

{{- if .Values.global.preInstallSpireNamespaces }}
apiVersion: v1
kind: Namespace
metadata:
Expand All @@ -16,8 +17,9 @@ metadata:
pod-security.kubernetes.io/audit: privileged
pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/warn: privileged
{{- if .Values.global.enableOpenShift }}
{{- if .Values.global.enableOpenShift }}
security.openshift.io/scc.podSecurityLabelSync: "false"
{{- end }}
{{- end }}
annotations:
"helm.sh/hook": pre-install
"helm.sh/hook": pre-install
{{- end }}
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

{{- if .Values.global.preInstallSpireNamespaces }}
apiVersion: v1
kind: Namespace
metadata:
Expand All @@ -20,4 +21,5 @@ metadata:
security.openshift.io/scc.podSecurityLabelSync: "false"
{{- end }}
annotations:
"helm.sh/hook": pre-install
"helm.sh/hook": pre-install
{{- end }}
10 changes: 10 additions & 0 deletions helm-charts/0.27.3/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,16 @@ global:
# using kapp to deploy the VSecM components. (ref: https://carvel.dev/kapp/)
enableKAppAnnotations: false

# -- Set it to true to enable the pre-installation of the VSecM namespaces.
# If set to false, the VSecM namespaces will not be pre-installed; you will
# need to create a `vsecm-system` namespace manually.
preInstallVSecMNamespaces: true

# -- Set it to true to enable the pre-installation of the SPIRE namespaces.
# If set to false, the SPIRE namespaces will not be pre-installed; you will
# need to create `spire-system` and `spire-server` namespaces manually.
preInstallSpireNamespaces: true

# -- Set it to true for OpenShift deployments. This will add necessary
# annotations to the SPIRE components to make them work on OpenShift.
enableOpenShift: false
Expand Down
1 change: 0 additions & 1 deletion k8s/0.27.3/eks/vsecm-distroless-fips.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

apiVersion: v1
kind: Namespace
metadata:
Expand Down
1 change: 0 additions & 1 deletion k8s/0.27.3/eks/vsecm-distroless.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

apiVersion: v1
kind: Namespace
metadata:
Expand Down
1 change: 0 additions & 1 deletion k8s/0.27.3/local/vsecm-distroless-fips.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

apiVersion: v1
kind: Namespace
metadata:
Expand Down
1 change: 0 additions & 1 deletion k8s/0.27.3/local/vsecm-distroless.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

apiVersion: v1
kind: Namespace
metadata:
Expand Down
1 change: 0 additions & 1 deletion k8s/0.27.3/remote/vsecm-distroless-fips.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

apiVersion: v1
kind: Namespace
metadata:
Expand Down
1 change: 0 additions & 1 deletion k8s/0.27.3/remote/vsecm-distroless.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

apiVersion: v1
kind: Namespace
metadata:
Expand Down
2 changes: 0 additions & 2 deletions k8s/0.27.3/spire.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1289,7 +1289,6 @@ webhooks:
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

apiVersion: v1
kind: Namespace
metadata:
Expand All @@ -1311,7 +1310,6 @@ metadata:
# <>/' Copyright 2023-present VMware Secrets Manager contributors.
# >/' SPDX-License-Identifier: BSD-2-Clause
# */

apiVersion: v1
kind: Namespace
metadata:
Expand Down

0 comments on commit 6453352

Please sign in to comment.