Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion helm/core/templates/clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{{- if .Values.gateway.rbac.enabled }}
{{- if and .Values.gateway.rbac.enabled .Values.gateway.rbac.create }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
Expand Down
6 changes: 2 additions & 4 deletions helm/core/templates/controller-clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
{{- if .Values.controller.rbac.create }}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
Expand Down Expand Up @@ -144,7 +145,4 @@ rules:
- apiGroups: [""]
verbs: [ "get", "watch", "list", "update", "patch", "create", "delete" ]
resources: [ "serviceaccounts"]
# istio leader election need
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
verbs: ["get", "update", "patch", "create"]
{{- end }}
2 changes: 2 additions & 0 deletions helm/core/templates/controller-clusterrolebinding.yaml
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
{{- if .Values.controller.rbac.create }}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand All @@ -13,3 +14,4 @@ subjects:
- kind: ServiceAccount
name: {{ include "controller.serviceAccountName" . }}
namespace: {{ .Release.Namespace }}
{{- end }}
4 changes: 4 additions & 0 deletions helm/core/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -454,6 +454,9 @@ gateway:
# -- If enabled, roles will be created to enable accessing certificates from Gateways. This is not needed
# when using http://gateway-api.org/.
enabled: true
# -- If enabled, ClusterRole and ClusterRoleBinding will be created for the gateway.
# Set to false when cluster-level RBAC is pre-provisioned by a cluster admin.
create: true

serviceAccount:
# -- If set, a service account will be created. Otherwise, the default is used
Expand Down Expand Up @@ -588,6 +591,7 @@ controller:
imagePullSecrets: []

rbac:
# -- If enabled, ClusterRole and ClusterRoleBinding will be created for the controller. Set to false when cluster-level RBAC is pre-provisioned by a cluster admin.
create: true

serviceAccount:
Expand Down
3 changes: 2 additions & 1 deletion helm/higress/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ The command removes all the Kubernetes components associated with the chart and
| controller.probe.initialDelaySeconds | int | `1` | |
| controller.probe.periodSeconds | int | `3` | |
| controller.probe.timeoutSeconds | int | `5` | |
| controller.rbac.create | bool | `true` | |
| controller.rbac.create | bool | `true` | If enabled, ClusterRole and ClusterRoleBinding will be created for the controller. Set to false when cluster-level RBAC is pre-provisioned by a cluster admin. |
| controller.replicas | int | `1` | Number of Higress Controller pods |
| controller.resources.limits.cpu | string | `"1000m"` | |
| controller.resources.limits.memory | string | `"2048Mi"` | |
Expand Down Expand Up @@ -121,6 +121,7 @@ The command removes all the Kubernetes components associated with the chart and
| gateway.podAnnotations."prometheus.io/scrape" | string | `"true"` | |
| gateway.podAnnotations."sidecar.istio.io/inject" | string | `"false"` | |
| gateway.podLabels | object | `{}` | Labels to apply to the pod |
| gateway.rbac.create | bool | `true` | If enabled, ClusterRole and ClusterRoleBinding will be created for the gateway. Set to false when cluster-level RBAC is pre-provisioned by a cluster admin. |
| gateway.rbac.enabled | bool | `true` | If enabled, roles will be created to enable accessing certificates from Gateways. This is not needed when using http://gateway-api.org/. |
| gateway.readinessFailureThreshold | int | `30` | The number of successive failed probes before indicating readiness failure. |
| gateway.readinessInitialDelaySeconds | int | `1` | The initial delay for readiness probes in seconds. |
Expand Down
4 changes: 3 additions & 1 deletion helm/higress/README.zh.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ helm delete higress -n higress-system
| controller.probe.initialDelaySeconds | int | `1` | 初始延迟秒数 |
| controller.probe.periodSeconds | int | `3` | 健康检查间隔秒数 |
| controller.probe.timeoutSeconds | int | `5` | 超时秒数 |
| controller.rbac.create | bool | `true` | 是否创建 RBAC 相关资源 |
| controller.rbac.create | bool | `true` | 是否创建控制器的 ClusterRole 和 ClusterRoleBinding。当集群管理员已预先创建集群级 RBAC 资源时,可设为 false。 |
| controller.replicas | int | `1` | Higress 控制器 Pod 的数量 |
| controller.resources.limits.cpu | string | `"1000m"` | CPU 上限 |
| controller.resources.limits.memory | string | `"2048Mi"` | 内存上限 |
Expand Down Expand Up @@ -117,6 +117,8 @@ helm delete higress -n higress-system
| gateway.name | string | `"higress-gateway"` | 网关名称 |
| gateway.networkGateway | string | `""` | 网络网关指定 |
| gateway.nodeSelector | object | `{}` | 节点选择器 |
| gateway.rbac.enabled | bool | `true` | 是否创建网关访问证书所需的 RBAC 资源。使用 Gateway API 时不需要开启。 |
| gateway.rbac.create | bool | `true` | 是否创建网关的 ClusterRole 和 ClusterRoleBinding。当集群管理员已预先创建集群级 RBAC 资源时,可设为 false。 |
| gateway.replicas | int | `2` | Higress Gateway pod 的数量 |
| gateway.resources.limits.cpu | string | `"2000m"` | 容器资源限制的 CPU |
| gateway.resources.limits.memory | string | `"2048Mi"` | 容器资源限制的内存 |
Expand Down
Loading