File tree Expand file tree Collapse file tree 4 files changed +61
-0
lines changed Expand file tree Collapse file tree 4 files changed +61
-0
lines changed Original file line number Diff line number Diff line change @@ -308,6 +308,11 @@ post_apply:
308
308
- name : role-sync-controller
309
309
kind : ServiceAccount
310
310
namespace : kube-system
311
+ # secret-read role/bindings
312
+ - name : cdp-deployer-poweruser-secret-read
313
+ kind : ClusterRoleBinding
314
+ - name : deployment-service-executor-poweruser-secret-read
315
+ kind : ClusterRoleBinding
311
316
{{- end }}
312
317
{{- if ne .Cluster.ConfigItems.kube_janitor_enabled "true" }}
313
318
- name : kube-janitor
Original file line number Diff line number Diff line change @@ -123,6 +123,29 @@ subjects:
123
123
name : " deployment-service-controller"
124
124
namespace : " kube-system"
125
125
# {{ end }}
126
+ # {{ if eq .Cluster.ConfigItems.role_sync_controller_enabled "true" }}
127
+ ---
128
+ kind : ClusterRoleBinding
129
+ apiVersion : rbac.authorization.k8s.io/v1
130
+ metadata :
131
+ name : " deployment-service-executor-poweruser-secret-read"
132
+ labels :
133
+ application : " deployment-service"
134
+ component : " controller"
135
+ roleRef :
136
+ kind : ClusterRole
137
+ name : poweruser-secret-read
138
+ apiGroup : rbac.authorization.k8s.io
139
+ subjects :
140
+ - apiGroup : rbac.authorization.k8s.io
141
+ kind : User
142
+ name : zalando-iam:zalando:service:k8sapi-local_deployment-service-executor
143
+ # {{ if eq .Cluster.Provider "zalando-eks" }}
144
+ - kind : ServiceAccount
145
+ name : " deployment-service-controller"
146
+ namespace : " kube-system"
147
+ # {{ end }}
148
+ # {{ end }}
126
149
---
127
150
kind : ClusterRoleBinding
128
151
apiVersion : rbac.authorization.k8s.io/v1
Original file line number Diff line number Diff line change @@ -10,3 +10,18 @@ subjects:
10
10
- kind : ServiceAccount
11
11
name : cdp
12
12
namespace : default
13
+ # {{ if eq .Cluster.ConfigItems.role_sync_controller_enabled "true" }}
14
+ ---
15
+ kind : ClusterRoleBinding
16
+ apiVersion : rbac.authorization.k8s.io/v1
17
+ metadata :
18
+ name : cdp-deployer-poweruser-secret-read
19
+ roleRef :
20
+ apiGroup : rbac.authorization.k8s.io
21
+ kind : ClusterRole
22
+ name : poweruser-secret-read
23
+ subjects :
24
+ - kind : ServiceAccount
25
+ name : cdp
26
+ namespace : default
27
+ # {{ end }}
Original file line number Diff line number Diff line change 58
58
- services/proxy
59
59
verbs :
60
60
- get
61
+ # {{ if ne .Cluster.ConfigItems.role_sync_controller_enabled "true" }}
61
62
- apiGroups :
62
63
- ' '
63
64
resources :
66
67
- get
67
68
- list
68
69
- watch
70
+ # {{ end }}
69
71
- apiGroups :
70
72
- ' '
71
73
- extensions
@@ -248,3 +250,19 @@ rules:
248
250
- update
249
251
- patch
250
252
- delete
253
+ # {{ if eq .Cluster.ConfigItems.role_sync_controller_enabled "true" }}
254
+ ---
255
+ apiVersion : rbac.authorization.k8s.io/v1
256
+ kind : ClusterRole
257
+ metadata :
258
+ name : poweruser-secret-read
259
+ rules :
260
+ - apiGroups :
261
+ - ' '
262
+ resources :
263
+ - secrets
264
+ verbs :
265
+ - get
266
+ - list
267
+ - watch
268
+ # {{ end }}
You can’t perform that action at this time.
0 commit comments