-
Notifications
You must be signed in to change notification settings - Fork 3
🚨 Breaking Change - Dataplane - Sane defaults #210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 18 commits
Commits
Show all changes
95 commits
Select commit
Hold shift + click to select a range
5bd897c
Use helm to generate Certs for the webhook
EngHabu 1b3cb7d
Merge branch 'main' into enghabu/sane-defaults
EngHabu 8a5acfd
Disable unconfined for rootless buillkit
EngHabu f78d82f
Merge branch 'enghabu/sane-defaults' into enghabu/rootless-buildkit
EngHabu e2434b0
Merge branch 'main' into enghabu/sane-defaults
EngHabu 768363a
Merge branch 'enghabu/sane-defaults' into enghabu/rootless-buildkit
EngHabu eb08919
Merge branch 'main' into enghabu/sane-defaults
EngHabu f2e1562
Merge branch 'enghabu/sane-defaults' into enghabu/rootless-buildkit
EngHabu 64699f5
Static certs
EngHabu cd89675
Merge branch 'main' into enghabu/sane-defaults
EngHabu 6bea6d9
Merge branch 'enghabu/sane-defaults' into enghabu/rootless-buildkit
EngHabu 1f90c3b
Revert unconfined
EngHabu b4937c9
Merge pull request #209 from unionai/enghabu/rootless-buildkit
EngHabu c814ac7
Create a default union service account
EngHabu 4c9aa84
Merge branch 'main' into enghabu/sane-defaults
EngHabu ed77d5a
bring back legacy mode for MutatingWebhookConfiguration
EngHabu be81786
Merge branch 'main' into enghabu/sane-defaults
EngHabu b360cba
use helm 4 to generate
EngHabu b95c01a
Infer all required settings for single namespace from a single config
EngHabu 0286c4d
wip
EngHabu 68047d0
Merge branch 'main' into enghabu/sane-defaults
EngHabu dbffb12
Merge branch 'main' into enghabu/sane-defaults
EngHabu a8c70f8
Make ClusterRole for node executor fallback to Role in low-priv mode
EngHabu 44e35fd
-vvv
EngHabu f87b4ca
Merge branch 'main' into enghabu/sane-defaults
EngHabu ffd6ba6
No ClusterRole in low-priv
EngHabu ac7596c
Hardcode test certs
EngHabu e048a52
Add executor health check if enabled
EngHabu 65e053a
Add app.kubernetes.io/name and app.kubernetes.io/instance labels to e…
EngHabu 222553c
pod labels
EngHabu d724734
rename webhook to union- to avoid conflicting with flyte deployments
EngHabu f74b545
Fix duplicate keys in low priv
EngHabu d6208ac
fix SA
EngHabu 0ff7624
Merge branch 'main' into enghabu/sane-defaults
EngHabu 2bca9c3
regen with helm 4
EngHabu fb8f408
Merge branch 'main' into enghabu/sane-defaults
EngHabu 503d246
Merge branch 'main' into enghabu/sane-defaults
EngHabu 8b2f3f5
Create build-image-configmap when single_namespace is set
EngHabu 683ab0e
Merge branch 'main' into enghabu/sane-defaults
EngHabu c172324
EnableDepot
EngHabu 6492fbe
Add imagepull secrets by default to task template
EngHabu be7d07a
Automatically enable fluentbit
EngHabu 48aec7a
Add common ServiceAccount support to dataplane chart. Introduce `useC…
EngHabu 2f718f0
Merge branch 'main' into enghabu/sane-defaults
EngHabu e977886
Update `operator.enableDepot` helper to also check that no custom `bu…
EngHabu 8db2ed9
Merge branch 'main' into enghabu/sane-defaults
EngHabu b412bb4
Temporarily disable depot
EngHabu 9be071f
Enable prometheus and kube-state-metrics in low-priv mode
EngHabu 4c7d101
Merge branch 'main' into enghabu/sane-defaults
EngHabu f8630c7
Merge branch 'enghabu/sane-defaults' into enghabu/prometheus-deployment
EngHabu 7824c1d
Merge pull request #287 from unionai/enghabu/prometheus-deployment
EngHabu 94555a5
Merge branch 'main' into enghabu/sane-defaults
EngHabu 0bac8b9
Add buildkit.serviceAccountName helper to support common service acco…
EngHabu dc2ce46
Add buildkit.serviceAccount.annotations helper to merge global and bu…
EngHabu 4698a7f
add missing values.yaml options & generate
EngHabu 90c239c
Merge branch 'main' into enghabu/sane-defaults
EngHabu 0e59b9d
expose BACKEND_IAM_ROLE and WORKER_IAM_ROLE in values.yaml
EngHabu 5aac3c1
Update webhook svc name
davidmirror-ops 1a612f0
Switch buildkit from rootless to privileged mode and increase default…
EngHabu e23247b
Merge branch 'main' into enghabu/sane-defaults
EngHabu fcce24a
Merge remote-tracking branch 'origin/enghabu/sane-defaults' into engh…
EngHabu 1275f29
Consolidate Prometheus setup by replacing the static prometheus deplo…
EngHabu a784ba8
Add test certs to additional-templates
EngHabu ab1d4fc
Merge branch 'main' into enghabu/sane-defaults
EngHabu 48fba1f
Disable CRS controller and namespaces
davidmirror-ops 0600709
Disable cluster resource by default
EngHabu 27b4b8c
Merge branch 'main' into enghabu/sane-defaults
EngHabu b27c0d1
Merge remote-tracking branch 'origin/enghabu/sane-defaults' into engh…
EngHabu 4f65539
Fix up knative-operator ns
EngHabu 3057c00
Update webhook name
davidmirror-ops b00d316
Fix namespaces
EngHabu 0d0d9d6
Merge remote-tracking branch 'origin/enghabu/sane-defaults' into engh…
EngHabu 6df283a
fix knative operator
EngHabu 228b6e3
fix fluentbit service account
EngHabu d50abd6
Automatically configure imageBuilder.defaultRegistry
EngHabu 862a551
Merge branch 'main' into enghabu/sane-defaults
EngHabu eed9a30
Merge branch 'main' into enghabu/sane-defaults
EngHabu 86331d6
fix executor url
EngHabu c1cac61
Merge branch 'main' into enghabu/sane-defaults
EngHabu cb48bbc
set authentication-type automatically
EngHabu 09f3387
Enable serving by default
EngHabu 0af7d26
Revert knative Role change
EngHabu 0ace0db
Merge branch 'main' into enghabu/sane-defaults
EngHabu 4354f02
Enable DNS, Scheduler and security context setting for apps
EngHabu 923a420
Merge branch 'main' into enghabu/sane-defaults
EngHabu 6101199
separate knative crds
EngHabu 437f3b6
Disable serving in legacy
EngHabu b0175a5
Update versions
EngHabu d42284e
attempt to fix knative upgrade
EngHabu 18e1582
enable namespaces in legacy
EngHabu 33131e4
Merge branch 'main' into enghabu/sane-defaults
EngHabu dbce8c1
Bump app versions
EngHabu 69be116
Merge branch 'main' into enghabu/sane-defaults
EngHabu 7cf27c0
Bump versions
EngHabu 16cb8e3
Regen
EngHabu File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,9 @@ | ||
| {{- if (index .Values "controlplane" | default dict).enabled }} | ||
| apiVersion: v1 | ||
| kind: ServiceAccount | ||
| metadata: | ||
| name: union | ||
| namespace: {{ .Release.Namespace }} | ||
| labels: | ||
| {{- include "unionai.labels" (dict "key" "union" "Release" .Release "Values" .Values "Chart" .Chart) | nindent 4 }} | ||
| {{- end }} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,13 @@ | ||
| {{- if and (not .Values.clusterresourcesync.enabled) .Values.low_privilege }} | ||
| apiVersion: v1 | ||
| kind: PodTemplate | ||
| metadata: | ||
| name: task-template | ||
| namespace: {{ .Release.Namespace }} | ||
| template: | ||
| spec: | ||
| serviceAccountName: union | ||
| containers: | ||
| - name: default | ||
| image: docker.io/rwgrim/docker-noop | ||
| {{- end }} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
132 changes: 132 additions & 0 deletions
132
charts/dataplane/templates/propeller/mutatingwebhookconfiguration.yaml
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,132 @@ | ||
| {{- if .Values.flytepropellerwebhook.enabled }} | ||
| {{- $serviceName := include "flytepropellerwebhook.serviceName" . }} | ||
| {{- $secretName := include "flytepropellerwebhook.secretName" . }} | ||
| {{- $namespace := .Release.Namespace }} | ||
| {{- $useCertManager := include "flytepropellerwebhook.useCertManager" . }} | ||
| {{- $useLegacy := eq .Values.flytepropellerwebhook.certificate.provider "legacy" }} | ||
| {{- $lowPrivilege := .Values.low_privilege }} | ||
| {{- /* Generate certs once and reuse for both secret and webhook config */ -}} | ||
| {{- $certs := dict }} | ||
| {{- if eq .Values.flytepropellerwebhook.certificate.provider "helm" }} | ||
| {{- $certs = include "flytepropellerwebhook.generateCerts" . | fromYaml }} | ||
| {{- else if eq .Values.flytepropellerwebhook.certificate.provider "external" }} | ||
| {{- $_ := set $certs "caCert" .Values.flytepropellerwebhook.certificate.external.caCert }} | ||
| {{- $_ := set $certs "serverCert" .Values.flytepropellerwebhook.certificate.external.tlsCrt }} | ||
| {{- $_ := set $certs "serverKey" .Values.flytepropellerwebhook.certificate.external.tlsKey }} | ||
| {{- end }} | ||
| {{- /* Create the Secret (for helm, external, and legacy providers) */ -}} | ||
| {{- if ne .Values.flytepropellerwebhook.certificate.provider "certManager" }} | ||
| --- | ||
| apiVersion: v1 | ||
| kind: Secret | ||
| metadata: | ||
| name: {{ $secretName }} | ||
| namespace: {{ $namespace }} | ||
| labels: | ||
| {{- include "flytepropellerwebhook.labels" . | nindent 4 }} | ||
| type: Opaque | ||
| {{- if ne .Values.flytepropellerwebhook.certificate.provider "legacy" }} | ||
| data: | ||
| ca.crt: {{ $certs.caCert }} | ||
| tls.crt: {{ $certs.serverCert }} | ||
| tls.key: {{ $certs.serverKey }} | ||
| {{- end }} | ||
| {{- end }} | ||
| --- | ||
| {{- if .Values.flytepropellerwebhook.managedConfig }} | ||
| apiVersion: admissionregistration.k8s.io/v1 | ||
| kind: MutatingWebhookConfiguration | ||
| metadata: | ||
| name: {{ tpl .Values.flytepropellerwebhook.webhook.configurationName . }} | ||
| labels: | ||
| {{- include "flytepropellerwebhook.labels" . | nindent 4 }} | ||
| {{- if $useCertManager }} | ||
| annotations: | ||
| {{- $secretName := include "flytepropellerwebhook.secretName" . }} | ||
| cert-manager.io/inject-ca-from: {{ $namespace }}/{{ $secretName }}-cert | ||
| {{- end }} | ||
| webhooks: | ||
| {{- if .Values.flytepropellerwebhook.webhook.webhooks.secrets.enabled }} | ||
| - name: {{ .Values.flytepropellerwebhook.webhook.webhooks.secrets.name }} | ||
| admissionReviewVersions: | ||
| - v1 | ||
| - v1beta1 | ||
| clientConfig: | ||
| {{- if and (not $useCertManager) (not $useLegacy) }} | ||
| caBundle: {{ $certs.caCert }} | ||
| {{- end }} | ||
| service: | ||
| name: {{ $serviceName }} | ||
| namespace: {{ $namespace }} | ||
| path: {{ .Values.flytepropellerwebhook.webhook.webhooks.secrets.path }} | ||
| port: {{ .Values.flytepropellerwebhook.service.port }} | ||
| failurePolicy: {{ .Values.flytepropellerwebhook.webhook.failurePolicy }} | ||
| matchPolicy: Equivalent | ||
| {{- if $lowPrivilege }} | ||
| namespaceSelector: | ||
| matchLabels: | ||
| kubernetes.io/metadata.name: {{ $namespace }} | ||
| {{- else }} | ||
| namespaceSelector: {} | ||
| {{- end }} | ||
| objectSelector: | ||
| {{- with .Values.flytepropellerwebhook.webhook.webhooks.secrets.objectSelector }} | ||
| {{- tpl (toYaml .) $ | nindent 6 }} | ||
| {{- end }} | ||
| reinvocationPolicy: {{ .Values.flytepropellerwebhook.webhook.reinvocationPolicy }} | ||
| rules: | ||
| - apiGroups: | ||
| - '*' | ||
| apiVersions: | ||
| - v1 | ||
| operations: | ||
| - CREATE | ||
| resources: | ||
| - pods | ||
| scope: '*' | ||
| sideEffects: NoneOnDryRun | ||
| timeoutSeconds: {{ .Values.flytepropellerwebhook.webhook.timeoutSeconds }} | ||
| {{- end }} | ||
| {{- if .Values.flytepropellerwebhook.webhook.webhooks.managedImage.enabled }} | ||
| - name: {{ .Values.flytepropellerwebhook.webhook.webhooks.managedImage.name }} | ||
| admissionReviewVersions: | ||
| - v1 | ||
| - v1beta1 | ||
| clientConfig: | ||
| {{- if and (not $useCertManager) (not $useLegacy) }} | ||
| caBundle: {{ $certs.caCert }} | ||
| {{- end }} | ||
| service: | ||
| name: {{ $serviceName }} | ||
| namespace: {{ $namespace }} | ||
| path: {{ .Values.flytepropellerwebhook.webhook.webhooks.managedImage.path }} | ||
| port: {{ .Values.flytepropellerwebhook.service.port }} | ||
| failurePolicy: {{ .Values.flytepropellerwebhook.webhook.failurePolicy }} | ||
| matchPolicy: Equivalent | ||
| {{- if $lowPrivilege }} | ||
| namespaceSelector: | ||
| matchLabels: | ||
| kubernetes.io/metadata.name: {{ $namespace }} | ||
| {{- else }} | ||
| namespaceSelector: {} | ||
| {{- end }} | ||
| objectSelector: | ||
| {{- with .Values.flytepropellerwebhook.webhook.webhooks.managedImage.objectSelector }} | ||
| {{- tpl (toYaml .) $ | nindent 6 }} | ||
| {{- end }} | ||
| reinvocationPolicy: {{ .Values.flytepropellerwebhook.webhook.reinvocationPolicy }} | ||
| rules: | ||
| - apiGroups: | ||
| - '*' | ||
| apiVersions: | ||
| - v1 | ||
| operations: | ||
| - CREATE | ||
| resources: | ||
| - pods | ||
| scope: '*' | ||
| sideEffects: NoneOnDryRun | ||
| timeoutSeconds: {{ .Values.flytepropellerwebhook.webhook.timeoutSeconds }} | ||
| {{- end }} | ||
| {{- end }} | ||
| {{- end }} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
or something that doesn't clash with the Flyte OSS one. Whenever a customer needs to run Union and Flyte OSS in the same namespace, this will make deployment fail
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why can't these be installed in separate namespaces?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it can, but we have customers who only have permissions for a single namespace