|
|
@@ -58,7 +58,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|
|
| certController.podAnnotations | object | `{}` | Annotations to add to Pod |
|
|
|
| certController.podDisruptionBudget | object | `{"enabled":false,"minAvailable":1}` | Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/ |
|
|
|
| certController.podLabels | object | `{}` | |
|
|
|
-| certController.podSecurityContext | object | `{}` | |
|
|
|
+| certController.podSecurityContext.enabled | bool | `true` | |
|
|
|
| certController.priorityClassName | string | `""` | Pod priority class name. |
|
|
|
| certController.rbac.create | bool | `true` | Specifies whether role and rolebinding resources should be created. |
|
|
|
| certController.readinessProbe.address | string | `""` | Address for readiness probe |
|
|
|
@@ -69,6 +69,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|
|
| certController.revisionHistoryLimit | int | `10` | Specifies the amount of historic ReplicaSets k8s should keep (see https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#clean-up-policy) |
|
|
|
| certController.securityContext.allowPrivilegeEscalation | bool | `false` | |
|
|
|
| certController.securityContext.capabilities.drop[0] | string | `"ALL"` | |
|
|
|
+| certController.securityContext.enabled | bool | `true` | |
|
|
|
| certController.securityContext.readOnlyRootFilesystem | bool | `true` | |
|
|
|
| certController.securityContext.runAsNonRoot | bool | `true` | |
|
|
|
| certController.securityContext.runAsUser | int | `1000` | |
|
|
|
@@ -95,11 +96,12 @@ The command removes all the Kubernetes components associated with the chart and
|
|
|
| extraArgs | object | `{}` | |
|
|
|
| extraContainers | list | `[]` | |
|
|
|
| extraEnv | list | `[]` | |
|
|
|
-| extraObjects | list | `[]` | Extra Kubernetes manifests to deploy with the chart |
|
|
|
+| extraObjects | list | `[]` | |
|
|
|
| extraVolumeMounts | list | `[]` | |
|
|
|
| extraVolumes | list | `[]` | |
|
|
|
| fullnameOverride | string | `""` | |
|
|
|
| global.affinity | object | `{}` | |
|
|
|
+| global.compatibility.openshift.adaptSecurityContext | string | `"auto"` | Manages the securityContext properties to make them compatible with OpenShift. Possible values: auto - Apply configurations if it is detected that OpenShift is the target platform. force - Always apply configurations. disabled - No modification applied. |
|
|
|
| global.nodeSelector | object | `{}` | |
|
|
|
| global.tolerations | list | `[]` | |
|
|
|
| global.topologySpreadConstraints | list | `[]` | |
|
|
|
@@ -121,7 +123,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|
|
| podAnnotations | object | `{}` | Annotations to add to Pod |
|
|
|
| podDisruptionBudget | object | `{"enabled":false,"minAvailable":1}` | Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/ |
|
|
|
| podLabels | object | `{}` | |
|
|
|
-| podSecurityContext | object | `{}` | |
|
|
|
+| podSecurityContext.enabled | bool | `true` | |
|
|
|
| podSpecExtra | object | `{}` | Any extra pod spec on the deployment |
|
|
|
| priorityClassName | string | `""` | Pod priority class name. |
|
|
|
| processClusterExternalSecret | bool | `true` | if true, the operator will process cluster external secret. Else, it will ignore them. |
|
|
|
@@ -136,6 +138,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|
|
| scopedRBAC | bool | `false` | Must be used with scopedNamespace. If true, create scoped RBAC roles under the scoped namespace and implicitly disable cluster stores and cluster external secrets |
|
|
|
| securityContext.allowPrivilegeEscalation | bool | `false` | |
|
|
|
| securityContext.capabilities.drop[0] | string | `"ALL"` | |
|
|
|
+| securityContext.enabled | bool | `true` | |
|
|
|
| securityContext.readOnlyRootFilesystem | bool | `true` | |
|
|
|
| securityContext.runAsNonRoot | bool | `true` | |
|
|
|
| securityContext.runAsUser | int | `1000` | |
|
|
|
@@ -191,7 +194,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|
|
| webhook.podAnnotations | object | `{}` | Annotations to add to Pod |
|
|
|
| webhook.podDisruptionBudget | object | `{"enabled":false,"minAvailable":1}` | Pod disruption budget - for more details see https://kubernetes.io/docs/concepts/workloads/pods/disruptions/ |
|
|
|
| webhook.podLabels | object | `{}` | |
|
|
|
-| webhook.podSecurityContext | object | `{}` | |
|
|
|
+| webhook.podSecurityContext.enabled | bool | `true` | |
|
|
|
| webhook.port | int | `10250` | The port the webhook will listen to |
|
|
|
| webhook.priorityClassName | string | `""` | Pod priority class name. |
|
|
|
| webhook.rbac.create | bool | `true` | Specifies whether role and rolebinding resources should be created. |
|
|
|
@@ -203,6 +206,7 @@ The command removes all the Kubernetes components associated with the chart and
|
|
|
| webhook.secretAnnotations | object | `{}` | Annotations to add to Secret |
|
|
|
| webhook.securityContext.allowPrivilegeEscalation | bool | `false` | |
|
|
|
| webhook.securityContext.capabilities.drop[0] | string | `"ALL"` | |
|
|
|
+| webhook.securityContext.enabled | bool | `true` | |
|
|
|
| webhook.securityContext.readOnlyRootFilesystem | bool | `true` | |
|
|
|
| webhook.securityContext.runAsNonRoot | bool | `true` | |
|
|
|
| webhook.securityContext.runAsUser | int | `1000` | |
|