Allow extra customisations of pod security policies in the chart
This commit is contained in:
		
							parent
							
								
									95301c102e
								
							
						
					
					
						commit
						3d47849eed
					
				|  | @ -63,14 +63,14 @@ rules: | ||||||
|   - services |   - services | ||||||
|   verbs: |   verbs: | ||||||
|   - create |   - create | ||||||
| {{- if toString .Values.configKubernetes.spilo_privileged | eq "true" }} | {{- if or (toString .Values.configKubernetes.spilo_privileged | eq "true") (.Values.rbac.spiloRunWithPsp) }} | ||||||
| # to run privileged pods | # to run privileged pods | ||||||
| - apiGroups: | - apiGroups: | ||||||
|   - extensions |   - extensions | ||||||
|   resources: |   resources: | ||||||
|   - podsecuritypolicies |   - podsecuritypolicies | ||||||
|   resourceNames: |   resourceNames: | ||||||
|   - privileged |   - {{ .Values.rbac.spiloPrivilegedPodSecurityPolicy }} | ||||||
|   verbs: |   verbs: | ||||||
|   - use |   - use | ||||||
| {{- end }} | {{- end }} | ||||||
|  |  | ||||||
|  | @ -230,14 +230,14 @@ rules: | ||||||
|   verbs: |   verbs: | ||||||
|   - get |   - get | ||||||
|   - create |   - create | ||||||
| {{- if toString .Values.configKubernetes.spilo_privileged | eq "true" }} | {{- if or (toString .Values.configKubernetes.spilo_privileged | eq "true") (.Values.rbac.operatorRunWithPsp) }} | ||||||
| # to run privileged pods | # to run privileged pods | ||||||
| - apiGroups: | - apiGroups: | ||||||
|   - extensions |   - extensions | ||||||
|   resources: |   resources: | ||||||
|   - podsecuritypolicies |   - podsecuritypolicies | ||||||
|   resourceNames: |   resourceNames: | ||||||
|   - privileged |   - {{ .Values.rbac.operatorPrivilegedPodSecurityPolicy }} | ||||||
|   verbs: |   verbs: | ||||||
|   - use |   - use | ||||||
| {{- end }} | {{- end }} | ||||||
|  |  | ||||||
|  | @ -372,6 +372,11 @@ rbac: | ||||||
|   create: true |   create: true | ||||||
|   # Specifies whether ClusterRoles that are aggregated into the K8s default roles should be created. (https://kubernetes.io/docs/reference/access-authn-authz/rbac/#default-roles-and-role-bindings) |   # Specifies whether ClusterRoles that are aggregated into the K8s default roles should be created. (https://kubernetes.io/docs/reference/access-authn-authz/rbac/#default-roles-and-role-bindings) | ||||||
|   createAggregateClusterRoles: false |   createAggregateClusterRoles: false | ||||||
|  |   # If cluster is set to run as privileged - which pod security policy should be used | ||||||
|  |   operatorRunWithPsp: false | ||||||
|  |   spiloRunWithPsp: false | ||||||
|  |   spiloPrivilegedPodSecurityPolicy: privileged | ||||||
|  |   operatorPrivilegedPodSecurityPolicy: privileged | ||||||
| 
 | 
 | ||||||
| serviceAccount: | serviceAccount: | ||||||
|   # Specifies whether a ServiceAccount should be created |   # Specifies whether a ServiceAccount should be created | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue