Skip to content

Commit 11ac7ca

Browse files
author
Serhii Rudenko
committed
chart edt
1 parent 1fc041c commit 11ac7ca

File tree

4 files changed

+15
-20
lines changed

4 files changed

+15
-20
lines changed

README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
# aws-auth-controller
22
[![codecov](https://codecov.io/github/redacid/aws-auth-controller/graph/badge.svg?token=3B6KI6EJCR)](https://codecov.io/github/redacid/aws-auth-controller)
33
[![unit-test](https://github.com/redacid/aws-auth-controller/actions/workflows/test.yml/badge.svg?branch=init)](https://github.com/redacid/aws-auth-controller/actions/workflows/test.yml)
4-
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://github.com/redacid/aws-auth-controller/blob/init/LICENSE)
4+
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://github.com/redacid/aws-auth-controller/blob/init/LICENSE)
5+
6+
[Helm chart README.md](charts/aws-auth-operator/README.md)

charts/aws-auth-operator/README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,24 +9,24 @@ Kubernetes operator to declaratively manage the EKS aws-auth configmap
99
| Key | Type | Default | Description |
1010
|-----|------|---------|-------------|
1111
| affinity | object | `{}` | Affinity for pod assignment |
12-
| configMapName | string | `"aws-auth-test"` | ConfigMap for MapAccount, MapUser, MapRoles in kube-system ns, aws-auth bu default |
12+
| configMapName | string | `"aws-auth"` | ConfigMap for MapAccount, MapUser, MapRoles in kube-system ns, aws-auth bu default |
1313
| controllerArguments | list | `["--zap-devel=true","--zap-encoder=console","--zap-log-level=info","--zap-time-encoding=iso8601","--zap-stacktrace-level=panic"]` | Other commandline controller arguments |
14-
| crdCreationAllowedNS | string | `"kube-system"` | Allow creating crds only on this ns, if blank allowing in any ns |
14+
| crdCreationAllowedNS | string | `""` | Allow creating crds only on this ns, if blank allowing in any ns |
1515
| fullnameOverride | string | `""` | Override the `fullname` of the chart |
1616
| image.pullPolicy | string | `"IfNotPresent"` | Image pull policy |
1717
| image.repository | string | `"ghcr.io/redacid/aws-auth-controller"` | Image repository |
1818
| image.tag | string | `"0.1.0"` | Image tag, will override the default tag derived from the chart app version |
1919
| imagePullSecrets | list | `[]` | Image pull secrets |
20-
| mustPresentAccountID | string | `"123456789012"` | This account id must allways present in cm, and disallow to delete crd MapAccount with this id |
20+
| mustPresentAccountID | string | `""` | This account id must allways present in cm, and disallow to delete crd MapAccount with this id |
2121
| nameOverride | string | `""` | Override the `name` of the chart |
2222
| nodeSelector | object | `{}` | Node labels for pod assignment |
2323
| podAnnotations | object | `{}` | Annotations to add to the pod |
2424
| podDisruptionBudget | object | `{"enabled":false}` | If true, create PodDisruptionBudget resource |
25-
| podSecurityContext | object | `{"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}}` | Security context for the pod |
26-
| reconcileTime | string | `"30m"` | Reconcile time in controller, recheck all crds, and recreate cm records if needed |
27-
| replicaCount | int | `2` | Controller Pod replica count |
28-
| resources | object | `{"limits":{"cpu":"100m","memory":"128Mi"},"requests":{"cpu":"100m","memory":"128Mi"}}` | Resource requests and limits for the manager container |
29-
| securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]}}` | Security context for the manager container |
25+
| podSecurityContext | object | `{}` | Security context for the pod |
26+
| reconcileTime | string | `"120m"` | Reconcile time in controller, recheck all crds, and recreate cm records if needed |
27+
| replicaCount | int | `1` | Controller Pod replica count |
28+
| resources | object | `{}` | Resource requests and limits for the manager container |
29+
| securityContext | object | `{}` | Security context for the manager container |
3030
| selfSignedIssuer | object | `{"enabled":true}` | Enable cert-manager issuer and create self-signed certs |
3131
| tolerations | list | `[]` | Tolerations for pod assignment |
3232

charts/aws-auth-operator/values.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ selfSignedIssuer:
8585
enabled: true
8686

8787
# -- ConfigMap for MapAccount, MapUser, MapRoles in kube-system ns, aws-auth bu default
88-
configMapName: "aws-auth-test"
88+
configMapName: "aws-auth"
8989
# -- This account id must allways present in cm, and disallow to delete crd MapAccount with this id
9090
mustPresentAccountID: ""
9191

charts/values.yaml

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -28,19 +28,12 @@ securityContext:
2828
capabilities:
2929
drop:
3030
- ALL
31-
# capabilities:
32-
# drop:
33-
# - ALL
34-
# readOnlyRootFilesystem: true
35-
# runAsNonRoot: true
36-
# runAsUser: 1000
31+
# readOnlyRootFilesystem: true
32+
# runAsNonRoot: true
33+
# runAsUser: 1000
3734

3835
# -- Security context for the pod
3936
podSecurityContext:
40-
#{}
41-
# Projects are configured by default to adhere to the "restricted" Pod Security Standards.
42-
# This ensures that deployments meet the highest security requirements for Kubernetes.
43-
# For more details, see: https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
4437
runAsNonRoot: true
4538
seccompProfile:
4639
type: RuntimeDefault

0 commit comments

Comments
 (0)