This is work in progress, check TODO.
Provide UI for custom objects (argo workflows) with actions with authentication (OIDC) and authorization (group membership), and expose services uniformly with authenticating reverse proxy.
Provide per project (namespace) UI to run and manage argo workflows and expose pre-defined services with uniform access management.
Make workflow visible for group authors
:
kubectl -n $NAMESPACE label workflow/$NAME oidc.argovue.io/group=authors
ArgoVue uses custom resource definitions to configure what objects and services to expose.
OIDC server is required for the application to work. It could be either external OIDC provider (Okta, Auth0), or included dex.
Deploy Kubernetes objects to configure argovue
from kube
folder, and:
skaffold dev --port-forward
After successful deployment point your browser to http://localhost:8080/ui/
.
kubectl apply -f https://raw.githubusercontent.com/fluxcd/helm-operator/master/deploy/flux-helm-release-crd.yaml
helm upgrade -i helm-operator fluxcd/helm-operator --namespace fluxcd --set helm.versions=v3
kubectl -n fluxcd port-forward deployment/helm-operator 3030:3030 &
curl -XPOST http://localhost:3030/api/v1/sync-git