File tree Expand file tree Collapse file tree 6 files changed +29
-3
lines changed
Expand file tree Collapse file tree 6 files changed +29
-3
lines changed Original file line number Diff line number Diff line change 11apiVersion : v1
22description : jaeger-operator Helm chart for Kubernetes
33name : jaeger-operator
4- version : 2.14.2
4+ version : 2.15.0
55appVersion : 1.17.1
66home : https://www.jaegertracing.io/
77icon : https://www.jaegertracing.io/img/jaeger-icon-reverse-color.svg
Original file line number Diff line number Diff line change @@ -59,7 +59,8 @@ The following table lists the configurable parameters of the jaeger-operator cha
5959| ` rbac.create ` | All required roles and rolebindings will be created | ` true ` |
6060| ` serviceAccount.create ` | Service account to use | ` true ` |
6161| ` rbac.pspEnabled ` | Pod security policy for pod will be created and included in rbac role | ` false ` |
62- | ` rbac.clusterRole ` | ClusterRole will be used by operator ServiceAccount | ` false ` |
62+ | ` rbac.clusterRole ` | ClusterRole will be used with ClusterRoleBinding by operator ServiceAccount to watch all namespaces | ` false ` |
63+ | ` rbac.watchNamespaces ` | ClusterRole will be used with RoleBindings in all specified namespaces by operator ServiceAccount | ` [] ` |
6364| ` serviceAccount.name ` | Service account name to use. If not set and create is true, a name is generated using the fullname template | ` nil ` |
6465| ` resources ` | K8s pod resources | ` None ` |
6566| ` nodeSelector ` | Node labels for pod assignment | ` {} ` |
Original file line number Diff line number Diff line change 4040 - name : WATCH_NAMESPACE
4141 {{- if .Values.rbac.clusterRole }}
4242 value : " "
43+ {{- else if .Values.rbac.watchNamespaces }}
44+ value : {{ join "," .Values.rbac.watchNamespaces | quote }}
4345 {{- else }}
4446 valueFrom :
4547 fieldRef :
Original file line number Diff line number Diff line change 11{{- if .Values.rbac.create }}
2+ {{- if not .Values.rbac.watchNamespaces }}
23kind : {{ if .Values.rbac.clusterRole }}Cluster{{ end }}RoleBinding
34apiVersion : rbac.authorization.k8s.io/v1
45metadata :
@@ -14,4 +15,24 @@ roleRef:
1415 kind : {{ if .Values.rbac.clusterRole }}Cluster{{ end }}Role
1516 name : {{ include "jaeger-operator.fullname" . }}
1617 apiGroup : rbac.authorization.k8s.io
18+ {{- else }}
19+ {{- range .Values.rbac.watchNamespaces }}
20+ kind : RoleBinding
21+ apiVersion : rbac.authorization.k8s.io/v1
22+ metadata :
23+ name : {{ include "jaeger-operator.fullname" $ }}
24+ namespace : {{ $.Release.Namespace }}
25+ labels :
26+ {{ include "jaeger-operator.labels" $ | indent 4 }}
27+ subjects :
28+ - kind : ServiceAccount
29+ namespace : {{ . }}
30+ name : {{ include "jaeger-operator.serviceAccountName" $ }}
31+ roleRef :
32+ kind : ClusterRole
33+ name : {{ include "jaeger-operator.fullname" $ }}
34+ apiGroup : rbac.authorization.k8s.io
35+ ---
36+ {{- end -}}
37+ {{- end -}}
1738{{- end }}
Original file line number Diff line number Diff line change 11{{- if .Values.rbac.create }}
2- kind : {{ if .Values.rbac.clusterRole }}Cluster{{ end }}Role
2+ kind : {{ if or .Values.rbac.clusterRole .Values.rbac.watchNamespaces }}Cluster{{ end }}Role
33apiVersion : rbac.authorization.k8s.io/v1
44metadata :
55 name : {{ include "jaeger-operator.fullname" . }}
Original file line number Diff line number Diff line change 2020 create : true
2121 pspEnabled : false
2222 clusterRole : false
23+ # Specifies arbitrary namespaces to be watched
24+ watchNamespaces : []
2325
2426serviceAccount :
2527 # Specifies whether a ServiceAccount should be created
You can’t perform that action at this time.
0 commit comments