parent
652a8e62b7
commit
a53ccec682
4 changed files with 4 additions and 2 deletions
|
@ -220,6 +220,7 @@ Parameter | Description | Default
|
||||||
`defaultBackend.serviceAccount.name` | The name of the backend service account to use. If not set and `create` is `true`, a name is generated using the fullname template. Only useful if you need a pod security policy to run the backend. | ``
|
`defaultBackend.serviceAccount.name` | The name of the backend service account to use. If not set and `create` is `true`, a name is generated using the fullname template. Only useful if you need a pod security policy to run the backend. | ``
|
||||||
`imagePullSecrets` | name of Secret resource containing private registry credentials | `nil`
|
`imagePullSecrets` | name of Secret resource containing private registry credentials | `nil`
|
||||||
`rbac.create` | if `true`, create & use RBAC resources | `true`
|
`rbac.create` | if `true`, create & use RBAC resources | `true`
|
||||||
|
`rbac.scope` | if `true`, do not create & use clusterrole and -binding. Set to `true` in combination with `controller.scope.enabled=true` to disable load-balancer status updates and scope the ingress entirely. | `false`
|
||||||
`podSecurityPolicy.enabled` | if `true`, create & use Pod Security Policy resources | `false`
|
`podSecurityPolicy.enabled` | if `true`, create & use Pod Security Policy resources | `false`
|
||||||
`serviceAccount.create` | if `true`, create a service account for the controller | `true`
|
`serviceAccount.create` | if `true`, create a service account for the controller | `true`
|
||||||
`serviceAccount.name` | The name of the controller service account to use. If not set and `create` is `true`, a name is generated using the fullname template. | ``
|
`serviceAccount.name` | The name of the controller service account to use. If not set and `create` is `true`, a name is generated using the fullname template. | ``
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{{- if .Values.rbac.create -}}
|
{{- if and (.Values.rbac.create) (not .Values.rbac.scope) -}}
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{{- if .Values.rbac.create -}}
|
{{- if and (.Values.rbac.create) (not .Values.rbac.scope) -}}
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
|
|
@ -527,6 +527,7 @@ defaultBackend:
|
||||||
## Enable RBAC as per https://github.com/kubernetes/ingress/tree/master/examples/rbac/nginx and https://github.com/kubernetes/ingress/issues/266
|
## Enable RBAC as per https://github.com/kubernetes/ingress/tree/master/examples/rbac/nginx and https://github.com/kubernetes/ingress/issues/266
|
||||||
rbac:
|
rbac:
|
||||||
create: true
|
create: true
|
||||||
|
scope: false
|
||||||
|
|
||||||
# If true, create & use Pod Security Policy resources
|
# If true, create & use Pod Security Policy resources
|
||||||
# https://kubernetes.io/docs/concepts/policy/pod-security-policy/
|
# https://kubernetes.io/docs/concepts/policy/pod-security-policy/
|
||||||
|
|
Loading…
Reference in a new issue