Remove NS qualifier to cover clusterroles

Signed-off-by: Tim Collins <tim@thecollins.team>
This commit is contained in:
Tim Collins 2023-04-14 08:28:15 +01:00
parent 9d9aebec6d
commit e08447b28f
No known key found for this signature in database
GPG key ID: 09F625E00301ED18
2 changed files with 2 additions and 2 deletions

View file

@ -174,7 +174,7 @@ Fields to note:
| controller.podLabels | object | `{}` | Optional labels to add to the controller pods |
| controller.podSecurityContext | object | `{}` | SecurityContext to set on the controller pods |
| controller.priorityClassName | string | `""` | Leverage a PriorityClass to ensure your pods survive resource shortages. |
| controller.rbac.accessAllSecrets | bool | `false` | Allows controller to get, list and watch all k8s secrets in the namespace. Can only be used if secretWhitelist is empty. |
| controller.rbac.accessAllSecrets | bool | `false` | Allows controller to get, list and watch all k8s secrets. Can only be used if secretWhitelist is empty. |
| controller.rbac.create | bool | `true` | Adds Role and RoleBinding for the controller. |
| controller.rbac.secretWhitelist | list | `[]` | Allows controller to get, list, and watch certain k8s secrets |
| controller.rbac.writeConfigMaps | bool | `false` | Allows controller to create and update ConfigMaps. Enables memoization feature |

View file

@ -74,7 +74,7 @@ controller:
create: true
# -- Allows controller to get, list, and watch certain k8s secrets
secretWhitelist: []
# -- Allows controller to get, list and watch all k8s secrets in the namespace. Can only be used if secretWhitelist is empty.
# -- Allows controller to get, list and watch all k8s secrets. Can only be used if secretWhitelist is empty.
accessAllSecrets: false
# -- Allows controller to create and update ConfigMaps. Enables memoization feature
writeConfigMaps: false