Allow extra customisations of pod security policies in the chart

This commit is contained in:
wilsonge 2022-02-26 11:35:00 +00:00
parent 95301c102e
commit 3d47849eed
No known key found for this signature in database
GPG Key ID: EF81319318FC9D04
3 changed files with 9 additions and 4 deletions

View File

@ -63,14 +63,14 @@ rules:
- services
verbs:
- create
{{- if toString .Values.configKubernetes.spilo_privileged | eq "true" }}
{{- if or (toString .Values.configKubernetes.spilo_privileged | eq "true") (.Values.rbac.spiloRunWithPsp) }}
# to run privileged pods
- apiGroups:
- extensions
resources:
- podsecuritypolicies
resourceNames:
- privileged
- {{ .Values.rbac.spiloPrivilegedPodSecurityPolicy }}
verbs:
- use
{{- end }}

View File

@ -230,14 +230,14 @@ rules:
verbs:
- get
- create
{{- if toString .Values.configKubernetes.spilo_privileged | eq "true" }}
{{- if or (toString .Values.configKubernetes.spilo_privileged | eq "true") (.Values.rbac.operatorRunWithPsp) }}
# to run privileged pods
- apiGroups:
- extensions
resources:
- podsecuritypolicies
resourceNames:
- privileged
- {{ .Values.rbac.operatorPrivilegedPodSecurityPolicy }}
verbs:
- use
{{- end }}

View File

@ -372,6 +372,11 @@ rbac:
create: true
# Specifies whether ClusterRoles that are aggregated into the K8s default roles should be created. (https://kubernetes.io/docs/reference/access-authn-authz/rbac/#default-roles-and-role-bindings)
createAggregateClusterRoles: false
# If cluster is set to run as privileged - which pod security policy should be used
operatorRunWithPsp: false
spiloRunWithPsp: false
spiloPrivilegedPodSecurityPolicy: privileged
operatorPrivilegedPodSecurityPolicy: privileged
serviceAccount:
# Specifies whether a ServiceAccount should be created