@@ -206,6 +206,7 @@ spec:
206
206
{{- $_ := set $tree.Values.proxy "await" false }}
207
207
{{- $_ := set $tree.Values.proxy "loadTrustBundleFromConfigMap" true }}
208
208
{{- $_ := set $tree.Values.proxy "podInboundPorts" "8080,9990" }}
209
+ {{- $_ := set $tree.Values.proxy "nativeSidecar" false }}
209
210
{{- /*
210
211
The identity controller cannot discover policies, so we configure it with defaults that
211
212
enforce TLS on the identity service.
@@ -215,9 +216,7 @@ spec:
215
216
{{- $_ := set $tree.Values.proxy "capabilities" (dict "drop" (list "ALL")) }}
216
217
{{- $_ := set $tree.Values.proxy "outboundDiscoveryCacheUnusedTimeout" "5s" }}
217
218
{{- $_ := set $tree.Values.proxy "inboundDiscoveryCacheUnusedTimeout" "90s" }}
218
- {{- if not $tree.Values.proxy.nativeSidecar }}
219
219
- {{- include "partials.proxy" $tree | indent 8 | trimPrefix (repeat 7 " ") }}
220
- {{- end }}
221
220
initContainers :
222
221
{{ if .Values.cniEnabled -}}
223
222
- {{- include "partials.network-validator" $tree | indent 8 | trimPrefix (repeat 7 " ") }}
@@ -230,9 +229,6 @@ spec:
230
229
{{- $_ := set $tree.Values.proxyInit "ignoreOutboundPorts" .Values.proxyInit.kubeAPIServerPorts -}}
231
230
- {{- include "partials.proxy-init" $tree | indent 8 | trimPrefix (repeat 7 " ") }}
232
231
{{ end -}}
233
- {{- if $tree.Values.proxy.nativeSidecar }}
234
- - {{- include "partials.proxy" $tree | indent 8 | trimPrefix (repeat 7 " ") }}
235
- {{ end -}}
236
232
{{- if .Values.priorityClassName -}}
237
233
priorityClassName : {{ .Values.priorityClassName }}
238
234
{{ end -}}
0 commit comments