File tree 7 files changed +17
-4
lines changed
7 files changed +17
-4
lines changed Original file line number Diff line number Diff line change @@ -2,7 +2,7 @@ apiVersion: v2
2
2
name : seashell
3
3
description : A tool that provides a shell to debug Kubernetes workloads
4
4
type : application
5
- version : 0.2 .0
5
+ version : 0.3 .0
6
6
appVersion : 0.1
7
7
keywords :
8
8
- debug
Original file line number Diff line number Diff line change @@ -31,11 +31,14 @@ helm install seashell puckpuck/seashell
31
31
| ` image.repository ` | seashell Image repository | ` puckpuck/seashell ` |
32
32
| ` image.tag ` | seashell Image tag (leave blank to use app version) | ` nil ` |
33
33
| ` image.pullPolicy ` | seashell Image pull policy | ` IfNotPresent ` |
34
+ | ` extraVolumeMounts ` | Additional volume mounts to add to the container | ` [] ` |
35
+ | ` extraVolumes ` | Additional volumes to add to the pod | ` [] ` |
34
36
| ` serviceAccount.create ` | Specify whether a ServiceAccount should be created | ` true ` |
35
37
| ` serviceAccount.annotations ` | Annotations to be applied to ServiceAccount | ` {} ` |
36
38
| ` serviceAccount.name ` | The name of the ServiceAccount to create | Generated using the ` seashell.fullname ` template |
37
39
| ` rbac.create ` | Specify whether RBAC resources should be created and used | ` true ` |
38
40
| ` rbac.readAll ` | Specify whether to include READ permssions on ALL Kubernetes resources | ` false ` |
41
+ | ` rbac.extraRules ` | Additional rules to add to the ClusterRole | ` [] ` |
39
42
| ` podAnnotations ` | Pod annotations | ` {} ` |
40
43
| ` podSecurityContext ` | Security context for pod | ` {} ` |
41
44
| ` securityContext ` | Security context for container | ` {} ` |
Original file line number Diff line number Diff line change 1
1
seashell is installed. Start an interactive shell on any of the daemonset pods to use it.
2
- {{- if .Values.rbac.create }}
2
+ {{- if .Values.rbac.readAll }}
3
3
4
4
*** WARNING ***
5
5
Original file line number Diff line number Diff line change 1
- {{- if and .Values.rbac.create .Values.rbac.readAll }}
1
+ {{- if and .Values.rbac.create }}
2
2
apiVersion : rbac.authorization.k8s.io/v1
3
3
kind : ClusterRoleBinding
4
4
metadata :
Original file line number Diff line number Diff line change 1
- {{- if and .Values.rbac.create .Values.rbac.readAll }}
1
+ {{- if .Values.rbac.create }}
2
2
apiVersion : rbac.authorization.k8s.io/v1
3
3
kind : ClusterRole
4
4
metadata :
@@ -8,6 +8,7 @@ metadata:
8
8
annotations :
9
9
rbac.authorization.kubernetes.io/autoupdate : " true"
10
10
rules :
11
+ {{- if .Values.rbac.readAll }}
11
12
- apiGroups :
12
13
- " *"
13
14
resources :
16
17
- get
17
18
- list
18
19
- watch
20
+ {{- end }}
21
+ {{- toYaml .Values.rbac.extraRules | nindent 2 }}
19
22
{{- end }}
Original file line number Diff line number Diff line change @@ -43,10 +43,12 @@ spec:
43
43
- name : kubernetes
44
44
mountPath : /etc/kubernetes
45
45
readOnly : true
46
+ {{- toYaml .Values.extraVolumeMounts | nindent 12}}
46
47
volumes :
47
48
- name : kubernetes
48
49
hostPath :
49
50
path : /etc/kubernetes
51
+ {{- toYaml .Values.extraVolumes | nindent 8 }}
50
52
{{- with .Values.nodeSelector }}
51
53
nodeSelector :
52
54
{{- toYaml . | nindent 8 }}
Original file line number Diff line number Diff line change @@ -12,6 +12,9 @@ imagePullSecrets: [ ]
12
12
nameOverride : " "
13
13
fullnameOverride : " "
14
14
15
+ extraVolumeMounts : [ ]
16
+ extraVolumes : [ ]
17
+
15
18
serviceAccount :
16
19
# Specifies whether a service account should be created
17
20
create : true
26
29
create : true
27
30
# If set to true, a Role and RoleBinding with READ permissions on ALL objects will be created
28
31
readAll : false
32
+ # additional rules to add to the Role
33
+ extraRules : [ ]
29
34
30
35
podAnnotations : { }
31
36
You can’t perform that action at this time.
0 commit comments