parent
652a8e62b7
commit
a53ccec682
4 changed files with 4 additions and 2 deletions
|
@ -220,6 +220,7 @@ Parameter | Description | Default
|
|||
`defaultBackend.serviceAccount.name` | The name of the backend service account to use. If not set and `create` is `true`, a name is generated using the fullname template. Only useful if you need a pod security policy to run the backend. | ``
|
||||
`imagePullSecrets` | name of Secret resource containing private registry credentials | `nil`
|
||||
`rbac.create` | if `true`, create & use RBAC resources | `true`
|
||||
`rbac.scope` | if `true`, do not create & use clusterrole and -binding. Set to `true` in combination with `controller.scope.enabled=true` to disable load-balancer status updates and scope the ingress entirely. | `false`
|
||||
`podSecurityPolicy.enabled` | if `true`, create & use Pod Security Policy resources | `false`
|
||||
`serviceAccount.create` | if `true`, create a service account for the controller | `true`
|
||||
`serviceAccount.name` | The name of the controller service account to use. If not set and `create` is `true`, a name is generated using the fullname template. | ``
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{{- if .Values.rbac.create -}}
|
||||
{{- if and (.Values.rbac.create) (not .Values.rbac.scope) -}}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{{- if .Values.rbac.create -}}
|
||||
{{- if and (.Values.rbac.create) (not .Values.rbac.scope) -}}
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
|
|
|
@ -527,6 +527,7 @@ defaultBackend:
|
|||
## Enable RBAC as per https://github.com/kubernetes/ingress/tree/master/examples/rbac/nginx and https://github.com/kubernetes/ingress/issues/266
|
||||
rbac:
|
||||
create: true
|
||||
scope: false
|
||||
|
||||
# If true, create & use Pod Security Policy resources
|
||||
# https://kubernetes.io/docs/concepts/policy/pod-security-policy/
|
||||
|
|
Loading…
Reference in a new issue