-
Notifications
You must be signed in to change notification settings - Fork 34
Expand file tree
/
Copy pathrbac.yaml
More file actions
106 lines (101 loc) · 2.59 KB
/
rbac.yaml
File metadata and controls
106 lines (101 loc) · 2.59 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
{{- if .Values.rbac.create -}}
---
# ClusterRole for pod management
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: {{ include "controller.fullname" . }}-pods
labels:
{{- include "controller.labels" . | nindent 4 }}
rules:
- apiGroups:
- '*'
resources:
- 'pods'
- 'pods/status'
- 'pods/finalizers'
verbs:
- '*'
---
# RoleBinding in the sandbox namespace for pod management
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ include "controller.fullname" . }}-pods
namespace: {{ .Values.sandboxNamespace }}
labels:
{{- include "controller.labels" . | nindent 4 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: {{ include "controller.fullname" . }}-pods
subjects:
- kind: ServiceAccount
name: {{ include "controller.serviceAccountName" . }}
namespace: {{ .Values.global.namespace }}
{{- if .Values.rbac.additionalNamespaces }}
{{- range .Values.rbac.additionalNamespaces }}
---
# RoleBinding in additional namespace: {{ . }}
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ include "controller.fullname" $ }}-pods
namespace: {{ . }}
labels:
{{- include "controller.labels" $ | nindent 4 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: {{ include "controller.fullname" $ }}-pods
subjects:
- kind: ServiceAccount
name: {{ include "controller.serviceAccountName" $ }}
namespace: {{ $.Values.global.namespace }}
{{- end }}
{{- end }}
---
# Role in the controller namespace for full access
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: {{ include "controller.fullname" . }}-role
namespace: {{ .Values.global.namespace }}
labels:
{{- include "controller.labels" . | nindent 4 }}
rules:
- apiGroups:
- '*'
resources:
- '*'
- '*/status'
- '*/finalizers'
verbs:
- '*'
# 特别添加 ConfigMap 权限用于读取 Pod 模板
- apiGroups:
- ''
resources:
- 'configmaps'
verbs:
- 'get'
- 'list'
- 'watch'
---
# RoleBinding in the controller namespace
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ include "controller.fullname" . }}-rolebinding
namespace: {{ .Values.global.namespace }}
labels:
{{- include "controller.labels" . | nindent 4 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: {{ include "controller.fullname" . }}-role
subjects:
- kind: ServiceAccount
name: {{ include "controller.serviceAccountName" . }}
namespace: {{ .Values.global.namespace }}
{{- end }}