Allow extra customisations of pod security policies in the chart
This commit is contained in:
parent
95301c102e
commit
3d47849eed
|
|
@ -63,14 +63,14 @@ rules:
|
|||
- services
|
||||
verbs:
|
||||
- create
|
||||
{{- if toString .Values.configKubernetes.spilo_privileged | eq "true" }}
|
||||
{{- if or (toString .Values.configKubernetes.spilo_privileged | eq "true") (.Values.rbac.spiloRunWithPsp) }}
|
||||
# to run privileged pods
|
||||
- apiGroups:
|
||||
- extensions
|
||||
resources:
|
||||
- podsecuritypolicies
|
||||
resourceNames:
|
||||
- privileged
|
||||
- {{ .Values.rbac.spiloPrivilegedPodSecurityPolicy }}
|
||||
verbs:
|
||||
- use
|
||||
{{- end }}
|
||||
|
|
|
|||
|
|
@ -230,14 +230,14 @@ rules:
|
|||
verbs:
|
||||
- get
|
||||
- create
|
||||
{{- if toString .Values.configKubernetes.spilo_privileged | eq "true" }}
|
||||
{{- if or (toString .Values.configKubernetes.spilo_privileged | eq "true") (.Values.rbac.operatorRunWithPsp) }}
|
||||
# to run privileged pods
|
||||
- apiGroups:
|
||||
- extensions
|
||||
resources:
|
||||
- podsecuritypolicies
|
||||
resourceNames:
|
||||
- privileged
|
||||
- {{ .Values.rbac.operatorPrivilegedPodSecurityPolicy }}
|
||||
verbs:
|
||||
- use
|
||||
{{- end }}
|
||||
|
|
|
|||
|
|
@ -372,6 +372,11 @@ rbac:
|
|||
create: true
|
||||
# Specifies whether ClusterRoles that are aggregated into the K8s default roles should be created. (https://kubernetes.io/docs/reference/access-authn-authz/rbac/#default-roles-and-role-bindings)
|
||||
createAggregateClusterRoles: false
|
||||
# If cluster is set to run as privileged - which pod security policy should be used
|
||||
operatorRunWithPsp: false
|
||||
spiloRunWithPsp: false
|
||||
spiloPrivilegedPodSecurityPolicy: privileged
|
||||
operatorPrivilegedPodSecurityPolicy: privileged
|
||||
|
||||
serviceAccount:
|
||||
# Specifies whether a ServiceAccount should be created
|
||||
|
|
|
|||
Loading…
Reference in New Issue