Skip to content

Commit

Permalink
chore: force an explicit executor clusterrole for stability
Browse files Browse the repository at this point in the history
Signed-off-by: Tim Collins <[email protected]>
  • Loading branch information
tico24 committed Apr 16, 2024
1 parent ace3a97 commit cf4510a
Showing 1 changed file with 27 additions and 0 deletions.
27 changes: 27 additions & 0 deletions argo-workflows/install.sh
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,33 @@ kubectl apply -f https://raw.githubusercontent.com/argoproj-labs/training-materi
kubectl apply -f https://raw.githubusercontent.com/argoproj-labs/training-material/main/config/argo-workflows/canary-workflow.yaml >/dev/null
kubectl apply -f https://raw.githubusercontent.com/argoproj-labs/training-material/main/config/argo-workflows/patchpod.yaml >/dev/null
kubectl apply -f https://raw.githubusercontent.com/argoproj-labs/training-material/main/config/argo-workflows/workflows-controller-configmap.yaml >/dev/null
cat <<EOF | kubectl apply -f - >/dev/null
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: executor
rules:
- apiGroups:
- argoproj.io
resources:
- workflowtaskresults
verbs:
- create
- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: argo-executor-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: executor
subjects:
- kind: ServiceAccount
name: argo
namespace: argo
EOF

echo "2. Installing Argo CLI..."

Expand Down

0 comments on commit cf4510a

Please sign in to comment.