create the service account and roles even if the rbac is not enabled. it will just be ignored

This commit is contained in:
Erwan Miran 2018-08-22 18:17:11 +02:00
parent 80cfeea957
commit a6a14e7f77
4 changed files with 0 additions and 8 deletions

View file

@ -43,9 +43,7 @@ spec:
securityContext:
runAsUser: {{ netchecker_agent_user | default('0') }}
runAsGroup: {{ netchecker_agent_group | default('0') }}
{% if rbac_enabled %}
serviceAccountName: netchecker-agent
{% endif %}
updateStrategy:
rollingUpdate:
maxUnavailable: 100%

View file

@ -47,9 +47,7 @@ spec:
securityContext:
runAsUser: {{ netchecker_agent_user | default('0') }}
runAsGroup: {{ netchecker_agent_group | default('0') }}
{% if rbac_enabled %}
serviceAccountName: netchecker-agent
{% endif %}
updateStrategy:
rollingUpdate:
maxUnavailable: 100%

View file

@ -21,9 +21,7 @@ spec:
kubernetes.io/cluster-service: "true"
version: v{{ registry_proxy_image_tag }}
spec:
{% if rbac_enabled %}
serviceAccountName: registry-proxy
{% endif %}
containers:
- name: registry-proxy
image: {{ registry_proxy_image_repo }}:{{ registry_proxy_image_tag }}

View file

@ -22,9 +22,7 @@ spec:
version: v{{ registry_image_tag }}
kubernetes.io/cluster-service: "true"
spec:
{% if rbac_enabled %}
serviceAccountName: registry
{% endif %}
containers:
- name: registry
image: {{ registry_image_repo }}:{{ registry_image_tag }}