diff --git a/charts/kyverno/README.md b/charts/kyverno/README.md index 0c71dab8a8..b3746b9580 100644 --- a/charts/kyverno/README.md +++ b/charts/kyverno/README.md @@ -215,7 +215,6 @@ The command removes all the Kubernetes components associated with the chart and | test.resources.requests | object | `{"cpu":"10m","memory":"64Mi"}` | Pod resource requests | | test.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"privileged":false,"readOnlyRootFilesystem":true,"runAsGroup":65534,"runAsNonRoot":true,"runAsUser":65534,"seccompProfile":{"type":"RuntimeDefault"}}` | Security context for the test containers | | customLabels | object | `{}` | Additional labels | -| generatecontrollerExtraResources | list | `[]` | Additional resources to be added to controller RBAC permissions. | | excludeKyvernoNamespace | bool | `true` | Exclude Kyverno namespace Determines if default Kyverno namespace exclusion is enabled for webhooks and resourceFilters | | resourceFiltersExcludeNamespaces | list | `[]` | resourceFilter namespace exclude Namespaces to exclude from the default resourceFilters | | networkPolicy.enabled | bool | `false` | When true, use a NetworkPolicy to allow ingress to the webhook This is useful on clusters using Calico and/or native k8s network policies in a default-deny setup. | diff --git a/charts/kyverno/values.yaml b/charts/kyverno/values.yaml index 4a1e1174b5..cab392423d 100644 --- a/charts/kyverno/values.yaml +++ b/charts/kyverno/values.yaml @@ -199,11 +199,6 @@ test: # -- Additional labels customLabels: {} -# -- Additional resources to be added to controller RBAC permissions. -generatecontrollerExtraResources: [] -# - ResourceA -# - ResourceB - # -- Exclude Kyverno namespace # Determines if default Kyverno namespace exclusion is enabled for webhooks and resourceFilters excludeKyvernoNamespace: true