Skip to content

Commit

Permalink
Merge pull request hashicorp#382 from hashicorp/deprecate-bootstrapacls
Browse files Browse the repository at this point in the history
Deprecate bootstrapACLs for acls.enabled
  • Loading branch information
lkysow authored Apr 3, 2020
2 parents fcdaa4f + 0d089f0 commit 8c1fbb2
Show file tree
Hide file tree
Showing 55 changed files with 280 additions and 255 deletions.
2 changes: 1 addition & 1 deletion templates/NOTES.txt
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ To learn more about the release if you are using Helm 3, run:
$ helm get all {{ .Release.Name }}


{{- if (and .Values.global.bootstrapACLs (gt (len .Values.server.extraConfig) 3)) }}
{{- if (and (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) (gt (len .Values.server.extraConfig) 3)) }}
Warning: Defining server extraConfig potentially disrupts the automatic ACL
bootstrapping required settings. This may cause future issues if
there are conflicts.
Expand Down
4 changes: 2 additions & 2 deletions templates/client-clusterrole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ metadata:
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
{{- if (or .Values.global.enablePodSecurityPolicies .Values.global.bootstrapACLs) }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs .Values.global.enablePodSecurityPolicies) }}
rules:
{{- if .Values.global.enablePodSecurityPolicies }}
- apiGroups: ["policy"]
Expand All @@ -18,7 +18,7 @@ rules:
verbs:
- use
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- apiGroups: [""]
resources:
- secrets
Expand Down
10 changes: 5 additions & 5 deletions templates/client-daemonset.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ spec:
secretName: {{ .name }}
{{- end }}
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: aclconfig
emptyDir: {}
{{- end }}
Expand Down Expand Up @@ -197,7 +197,7 @@ spec:
-config-dir=/consul/userconfig/{{ .name }} \
{{- end }}
{{- end }}
{{- if .Values.global.bootstrapACLs}}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
-config-dir=/consul/aclconfig \
{{- end }}
-datacenter={{ .Values.global.datacenter }} \
Expand Down Expand Up @@ -237,7 +237,7 @@ spec:
readOnly: true
mountPath: /consul/userconfig/{{ .name }}
{{- end }}
{{- if .Values.global.bootstrapACLs}}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: aclconfig
mountPath: /consul/aclconfig
{{- end }}
Expand Down Expand Up @@ -297,9 +297,9 @@ spec:
resources:
{{ tpl .Values.client.resources . | nindent 12 | trim }}
{{- end }}
{{- if (or .Values.global.bootstrapACLs (and .Values.global.tls.enabled (not .Values.global.tls.enableAutoEncrypt))) }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs (and .Values.global.tls.enabled (not .Values.global.tls.enableAutoEncrypt))) }}
initContainers:
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: client-acl-init
image: {{ .Values.global.imageK8S }}
command:
Expand Down
9 changes: 4 additions & 5 deletions templates/client-snapshot-agent-clusterrole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,8 @@ metadata:
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
{{- if not (or .Values.global.enablePodSecurityPolicies .Values.global.bootstrapACLs) }}
rules: []
{{- else }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs .Values.global.enablePodSecurityPolicies) }}
rules:
{{- end }}
{{- if .Values.global.enablePodSecurityPolicies }}
- apiGroups: ["policy"]
resources: ["podsecuritypolicies"]
Expand All @@ -22,7 +19,7 @@ rules:
verbs:
- use
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- apiGroups: [""]
resources:
- secrets
Expand All @@ -32,5 +29,7 @@ rules:
- get
{{- end }}
{{- else }}
rules: []
{{- end }}
{{- end }}
{{- end }}
16 changes: 8 additions & 8 deletions templates/client-snapshot-agent-deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ spec:
{{- if .Values.client.priorityClassName }}
priorityClassName: {{ .Values.client.priorityClassName | quote }}
{{- end }}
{{- if (or .Values.global.bootstrapACLs .Values.global.tls.enabled (and .Values.client.snapshotAgent.configSecret.secretName .Values.client.snapshotAgent.configSecret.secretKey)) }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs .Values.global.tls.enabled (and .Values.client.snapshotAgent.configSecret.secretName .Values.client.snapshotAgent.configSecret.secretKey)) }}
volumes:
{{- if (and .Values.client.snapshotAgent.configSecret.secretName .Values.client.snapshotAgent.configSecret.secretKey) }}
- name: snapshot-config
Expand All @@ -47,7 +47,7 @@ spec:
- key: {{ .Values.client.snapshotAgent.configSecret.secretKey }}
path: snapshot-config.json
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: aclconfig
emptyDir: {}
{{- end }}
Expand Down Expand Up @@ -88,7 +88,7 @@ spec:
- name: CONSUL_HTTP_ADDR
value: http://$(HOST_IP):8500
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: CONSUL_HTTP_TOKEN
valueFrom:
secretKeyRef:
Expand All @@ -103,17 +103,17 @@ spec:
{{- if (and .Values.client.snapshotAgent.configSecret.secretName .Values.client.snapshotAgent.configSecret.secretKey) }}
-config-dir=/consul/config \
{{- end }}
{{- if .Values.global.bootstrapACLs}}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
-config-dir=/consul/aclconfig \
{{- end }}
{{- if (or .Values.global.bootstrapACLs .Values.global.tls.enabled (and .Values.client.snapshotAgent.configSecret.secretName .Values.client.snapshotAgent.configSecret.secretKey) ) }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs .Values.global.tls.enabled (and .Values.client.snapshotAgent.configSecret.secretName .Values.client.snapshotAgent.configSecret.secretKey) ) }}
volumeMounts:
{{- if (and .Values.client.snapshotAgent.configSecret.secretName .Values.client.snapshotAgent.configSecret.secretKey) }}
- name: snapshot-config
readOnly: true
mountPath: /consul/config
{{- end }}
{{- if .Values.global.bootstrapACLs}}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: aclconfig
mountPath: /consul/aclconfig
{{- end }}
Expand All @@ -127,9 +127,9 @@ spec:
readOnly: true
{{- end }}
{{- end }}
{{- if (or .Values.global.bootstrapACLs (and .Values.global.tls.enabled .Values.global.tls.enableAutoEncrypt)) }}
{{- if (or (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) (and .Values.global.tls.enabled .Values.global.tls.enableAutoEncrypt)) }}
initContainers:
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: client-snapshot-agent-acl-init
image: {{ .Values.global.imageK8S }}
command:
Expand Down
2 changes: 1 addition & 1 deletion templates/connect-inject-authmethod-clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if and (not .Values.connectInject.certs.secretName) (or (and (ne (.Values.connectInject.enabled | toString) "-") .Values.connectInject.enabled) (and (eq (.Values.connectInject.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if and (not .Values.connectInject.certs.secretName) (or (and (ne (.Values.connectInject.enabled | toString) "-") .Values.connectInject.enabled) (and (eq (.Values.connectInject.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
Expand Down
2 changes: 1 addition & 1 deletion templates/connect-inject-authmethod-serviceaccount.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if and (not .Values.connectInject.certs.secretName) (or (and (ne (.Values.connectInject.enabled | toString) "-") .Values.connectInject.enabled) (and (eq (.Values.connectInject.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: v1
kind: ServiceAccount
metadata:
Expand Down
2 changes: 1 addition & 1 deletion templates/connect-inject-clusterrole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ rules:
verbs:
- use
{{- end }}
{{- if and .Values.global.bootstrapACLs .Values.global.enableConsulNamespaces }}
{{- if and (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) .Values.global.enableConsulNamespaces }}
- apiGroups: [""]
resources:
- secrets
Expand Down
10 changes: 5 additions & 5 deletions templates/connect-inject-deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ spec:
secretKeyRef:
name: {{ .Values.connectInject.aclInjectToken.secretName }}
key: {{ .Values.connectInject.aclInjectToken.secretKey }}
{{- else if .Values.global.bootstrapACLs }}
{{- else if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: CONSUL_HTTP_TOKEN
valueFrom:
secretKeyRef:
Expand Down Expand Up @@ -87,7 +87,7 @@ spec:
-listen=:8080 \
{{- if .Values.connectInject.overrideAuthMethodName }}
-acl-auth-method="{{ .Values.connectInject.overrideAuthMethodName }}" \
{{- else if .Values.global.bootstrapACLs }}
{{- else if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
-acl-auth-method="{{ template "consul.fullname" . }}-k8s-auth-method" \
{{- end }}
{{- if .Values.connectInject.centralConfig.enabled }}
Expand All @@ -113,7 +113,7 @@ spec:
-k8s-namespace-mirroring-prefix={{ .Values.connectInject.consulNamespaces.mirroringK8SPrefix }} \
{{- end }}
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
-consul-cross-namespace-acl-policy=cross-namespace-policy \
{{- end }}
{{- end }}
Expand Down Expand Up @@ -188,9 +188,9 @@ spec:
{{- end }}
{{- end }}
{{- end }}
{{- if or (and .Values.global.bootstrapACLs .Values.global.enableConsulNamespaces) (and .Values.global.tls.enabled .Values.global.tls.enableAutoEncrypt) }}
{{- if or (and (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) .Values.global.enableConsulNamespaces) (and .Values.global.tls.enabled .Values.global.tls.enableAutoEncrypt) }}
initContainers:
{{- if and .Values.global.bootstrapACLs .Values.global.enableConsulNamespaces }}
{{- if and (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) .Values.global.enableConsulNamespaces }}
- name: injector-acl-init
image: {{ .Values.global.imageK8S }}
command:
Expand Down
4 changes: 2 additions & 2 deletions templates/enterprise-license-clusterrole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ metadata:
chart: {{ template "consul.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
{{- if or .Values.global.bootstrapACLs .Values.global.enablePodSecurityPolicies }}
{{- if or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs .Values.global.enablePodSecurityPolicies }}
rules:
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- apiGroups: [""]
resources:
- secrets
Expand Down
4 changes: 2 additions & 2 deletions templates/enterprise-license-job.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ spec:
- name: CONSUL_CACERT
value: /consul/tls/ca/tls.crt
{{- end}}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: CONSUL_HTTP_TOKEN
valueFrom:
secretKeyRef:
Expand Down Expand Up @@ -99,7 +99,7 @@ spec:
mountPath: /consul/tls/ca
readOnly: true
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
initContainers:
- name: ent-license-acl-init
image: {{ .Values.global.imageK8S }}
Expand Down
4 changes: 2 additions & 2 deletions templates/mesh-gateway-clusterrole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ metadata:
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
component: mesh-gateway
{{- if or .Values.global.bootstrapACLs .Values.global.enablePodSecurityPolicies (eq .Values.meshGateway.wanAddress.source "Service") }}
{{- if or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs .Values.global.enablePodSecurityPolicies (eq .Values.meshGateway.wanAddress.source "Service") }}
rules:
{{- if .Values.global.enablePodSecurityPolicies }}
- apiGroups: ["policy"]
Expand All @@ -19,7 +19,7 @@ rules:
verbs:
- use
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- apiGroups: [""]
resources:
- secrets
Expand Down
10 changes: 5 additions & 5 deletions templates/mesh-gateway-deployment.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- if .Values.meshGateway.enabled }}
{{- if not .Values.connectInject.enabled }}{{ fail "connectInject.enabled must be true" }}{{ end -}}
{{- if not .Values.client.grpc }}{{ fail "client.grpc must be true" }}{{ end -}}
{{- if and .Values.global.bootstrapACLs (ne .Values.meshGateway.consulServiceName "") (ne .Values.meshGateway.consulServiceName "mesh-gateway") }}{{ fail "if global.bootstrapACLs is true, meshGateway.consulServiceName cannot be set" }}{{ end -}}
{{- if and (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) (ne .Values.meshGateway.consulServiceName "") (ne .Values.meshGateway.consulServiceName "mesh-gateway") }}{{ fail "if global.acls.manageSystemACLs is true, meshGateway.consulServiceName cannot be set" }}{{ end -}}
{{- /* The below test checks if clients are disabled (and if so, fails). We use the conditional from other client files and prepend 'not' */ -}}
{{- if not (or (and (ne (.Values.client.enabled | toString) "-") .Values.client.enabled) (and (eq (.Values.client.enabled | toString) "-") .Values.global.enabled)) }}{{ fail "clients must be enabled" }}{{ end -}}
apiVersion: apps/v1
Expand Down Expand Up @@ -118,7 +118,7 @@ spec:
- "/bin/sh"
- "-ec"
- |
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
consul-k8s acl-init \
-secret-name="{{ template "consul.fullname" . }}-mesh-gateway-acl-token" \
-k8s-namespace={{ .Release.Namespace }} \
Expand Down Expand Up @@ -189,7 +189,7 @@ spec:
EOF
consul services register \
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
-token-file=/consul/service/acl-token \
{{- end }}
/consul/service/service.hcl
Expand Down Expand Up @@ -239,7 +239,7 @@ spec:
fieldRef:
fieldPath: spec.nodeName
{{- end }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- name: CONSUL_HTTP_TOKEN
valueFrom:
secretKeyRef:
Expand Down Expand Up @@ -333,7 +333,7 @@ spec:
- lifecycle-sidecar
- -service-config=/consul/service/service.hcl
- -consul-binary=/bin/consul
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
- -token-file=/consul/service/acl-token
{{- end }}
{{- if .Values.meshGateway.priorityClassName }}
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-cleanup-clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-cleanup-clusterrolebinding.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-cleanup-job.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
{{- /* See reason for this in server-acl-init-job.yaml */ -}}
{{- if eq (int .Values.server.updatePartition) 0 }}
# This job deletes the server-acl-init job once it completes successfully.
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-cleanup-podsecuritypolicy.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
{{- if .Values.global.enablePodSecurityPolicies }}
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-cleanup-serviceaccount.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: v1
kind: ServiceAccount
metadata:
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-clusterrolebinding.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-job.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
{{- /* We don't render this job when server.updatePartition > 0 because that
means a server rollout is in progress and this job won't complete unless
the rollout is finished (which won't happen until the partition is 0).
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-podsecuritypolicy.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
{{- if .Values.global.enablePodSecurityPolicies }}
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
Expand Down
2 changes: 1 addition & 1 deletion templates/server-acl-init-serviceaccount.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{{- if (or (and (ne (.Values.server.enabled | toString) "-") .Values.server.enabled) (and (eq (.Values.server.enabled | toString) "-") .Values.global.enabled)) }}
{{- if .Values.global.bootstrapACLs }}
{{- if (or .Values.global.acls.manageSystemACLs .Values.global.bootstrapACLs) }}
apiVersion: v1
kind: ServiceAccount
metadata:
Expand Down
Loading

0 comments on commit 8c1fbb2

Please sign in to comment.