linkerd2/chart/templates
Andrew Seigner ec5a0ca8d9
Authorization-aware control-plane components (#2349)
The control-plane components relied on a `--single-namespace` param,
passed from `linkerd install` into each individual component, to
determine which namespaces they were authorized to access, and whether
to support ServiceProfiles. This command-line flag was redundant given
the authorization rules encoded in the parent `linkerd install` output,
via [Cluster]Role[Binding]s.

Modify the control-plane components to query Kubernetes at startup to
determine which namespaces they are authorized to access, and whether
ServiceProfile support is available. This allows removal of the
`--single-namespace` flag on the components.

Also update `bin/test-cleanup` to cleanup the ServiceProfile CRD.

TODO:
- Remove `--single-namespace` flag on `linkerd install`, part of #2164

Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-02-26 11:54:52 -08:00
..
ca.yaml Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
controller.yaml Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
grafana.yaml Split install template into component-specific files (#2313) 2019-02-18 15:31:17 -08:00
namespace.yaml Split install template into component-specific files (#2313) 2019-02-18 15:31:17 -08:00
prometheus.yaml Split install template into component-specific files (#2313) 2019-02-18 15:31:17 -08:00
proxy_injector.yaml Implement resource limit (#2307) 2019-02-20 15:07:10 -05:00
serviceprofile.yaml Split install template into component-specific files (#2313) 2019-02-18 15:31:17 -08:00
web.yaml Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00