@@ -3,45 +3,3 @@ kind: ServiceAccount
33metadata :
44 name : {{ include "iam.authzServerFullname" . }}
55 namespace : {{ .Release.Namespace }}
6- ---
7- kind : ClusterRole
8- apiVersion : rbac.authorization.k8s.io/v1
9- metadata :
10- name : {{ include "iam.authzServerFullname" . }}
11- rules :
12- - apiGroups : [ "" ]
13- resources : [ "configmaps" ]
14- verbs : [ "get", "list", "watch" ]
15- # Rules below is used generate admission service secret
16- - apiGroups : [ "certificates.k8s.io" ]
17- resources : [ "certificatesigningrequests" ]
18- verbs : [ "get", "list", "create", "delete" ]
19- - apiGroups : [ "certificates.k8s.io" ]
20- resources : [ "certificatesigningrequests/approval" ]
21- verbs : [ "create", "update" ]
22- - apiGroups : [ "" ]
23- resources : [ "secrets" ]
24- verbs : [ "create", "get", "patch" ]
25- - apiGroups : [ "scheduling.incubator.k8s.io", "scheduling.volcano.sh" ]
26- resources : [ "queues" ]
27- verbs : [ "get", "list" ]
28- - apiGroups : [ "" ]
29- resources : [ "services" ]
30- verbs : [ "get" ]
31- - apiGroups : [ "scheduling.incubator.k8s.io", "scheduling.volcano.sh" ]
32- resources : [ "podgroups" ]
33- verbs : [ "get", "list", "watch" ]
34-
35- ---
36- kind : ClusterRoleBinding
37- apiVersion : rbac.authorization.k8s.io/v1
38- metadata :
39- name : {{ include "iam.authzServerFullname" . }}-role
40- subjects :
41- - kind : ServiceAccount
42- name : {{ include "iam.authzServerFullname" . }}
43- namespace : {{ .Release.Namespace }}
44- roleRef :
45- kind : ClusterRole
46- name : {{ include "iam.authzServerFullname" . }}
47- apiGroup : rbac.authorization.k8s.io
0 commit comments