mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-14 18:34:31 -05:00
a87b7894db
* add current chart add current helm chart * disable service controller for aws ccm * add new iam roles * doc AWS internet LB + add to LB test * pass clusterName to helm for AWS LB * fix update-aws-lb chart to also include .helmignore * move chart outside services * working state * add subnet tags for AWS subnet discovery * fix .helmignore load rule with file in subdirectory * upgrade iam profile * revert new loader impl since cilium is not correctly loaded * install chart if not already present during `upgrade apply` * cleanup PR + fix build + add todos cleanup PR + add todos * shared helm pkg for cli install and bootstrapper * add link to eks docs * refactor iamMigrationCmd * delete unused helm.symwallk * move iammigrate to upgrade pkg * fixup! delete unused helm.symwallk * add to upgradecheck * remove nodeSelector from go code (Otto) * update iam docs and sort permission + remove duplicate roles * fix bug in `upgrade check` * better upgrade check output when svc version upgrade not possible * pr feedback * remove force flag in upgrade_test * use upgrader.GetUpgradeID instead of extra type * remove todos + fix check * update doc lb (leo) * remove bootstrapper helm package * Update cli/internal/cmd/upgradecheck.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * final nits * add docs for e2e upgrade test setup * Apply suggestions from code review Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update cli/internal/helm/loader.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update cli/internal/cmd/tfmigrationclient.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * fix daniel review * link to the iam permissions instead of manually updating them (agreed with leo) * disable iam upgrade in upgrade apply --------- Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> Co-authored-by: Malte Poll
241 lines
6.6 KiB
YAML
241 lines
6.6 KiB
YAML
{{ $tls := fromYaml ( include "aws-load-balancer-controller.webhookCerts" . ) }}
|
|
---
|
|
apiVersion: admissionregistration.k8s.io/v1
|
|
kind: MutatingWebhookConfiguration
|
|
metadata:
|
|
{{- if $.Values.enableCertManager }}
|
|
annotations:
|
|
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ template "aws-load-balancer-controller.namePrefix" . }}-serving-cert
|
|
{{- end }}
|
|
name: {{ include "aws-load-balancer-controller.namePrefix" . }}-webhook
|
|
labels:
|
|
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
|
|
webhooks:
|
|
- clientConfig:
|
|
{{ if not $.Values.enableCertManager -}}
|
|
caBundle: {{ $tls.caCert }}
|
|
{{ end }}
|
|
service:
|
|
name: {{ template "aws-load-balancer-controller.webhookService" . }}
|
|
namespace: {{ $.Release.Namespace }}
|
|
path: /mutate-v1-pod
|
|
failurePolicy: Fail
|
|
name: mpod.elbv2.k8s.aws
|
|
admissionReviewVersions:
|
|
- v1beta1
|
|
namespaceSelector:
|
|
matchExpressions:
|
|
{{ if .Values.webhookNamespaceSelectors }}
|
|
{{ toYaml .Values.webhookNamespaceSelectors | nindent 4 }}
|
|
{{ else }}
|
|
- key: elbv2.k8s.aws/pod-readiness-gate-inject
|
|
operator: In
|
|
values:
|
|
- enabled
|
|
{{ end }}
|
|
objectSelector:
|
|
matchExpressions:
|
|
- key: app.kubernetes.io/name
|
|
operator: NotIn
|
|
values:
|
|
- {{ include "aws-load-balancer-controller.name" . }}
|
|
{{- if .Values.objectSelector.matchExpressions }}
|
|
{{- toYaml .Values.objectSelector.matchExpressions | nindent 4 }}
|
|
{{- end }}
|
|
{{- if .Values.objectSelector.matchLabels }}
|
|
matchLabels:
|
|
{{- toYaml .Values.objectSelector.matchLabels | nindent 6 }}
|
|
{{- end }}
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
apiVersions:
|
|
- v1
|
|
operations:
|
|
- CREATE
|
|
resources:
|
|
- pods
|
|
sideEffects: None
|
|
{{- if .Values.enableServiceMutatorWebhook }}
|
|
- clientConfig:
|
|
{{ if not $.Values.enableCertManager -}}
|
|
caBundle: {{ $tls.caCert }}
|
|
{{ end }}
|
|
service:
|
|
name: {{ template "aws-load-balancer-controller.webhookService" . }}
|
|
namespace: {{ $.Release.Namespace }}
|
|
path: /mutate-v1-service
|
|
failurePolicy: Fail
|
|
name: mservice.elbv2.k8s.aws
|
|
admissionReviewVersions:
|
|
- v1beta1
|
|
objectSelector:
|
|
matchExpressions:
|
|
- key: app.kubernetes.io/name
|
|
operator: NotIn
|
|
values:
|
|
- {{ include "aws-load-balancer-controller.name" . }}
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
apiVersions:
|
|
- v1
|
|
operations:
|
|
- CREATE
|
|
resources:
|
|
- services
|
|
sideEffects: None
|
|
{{- end }}
|
|
- clientConfig:
|
|
{{ if not $.Values.enableCertManager -}}
|
|
caBundle: {{ $tls.caCert }}
|
|
{{ end }}
|
|
service:
|
|
name: {{ template "aws-load-balancer-controller.webhookService" . }}
|
|
namespace: {{ $.Release.Namespace }}
|
|
path: /mutate-elbv2-k8s-aws-v1beta1-targetgroupbinding
|
|
failurePolicy: Fail
|
|
name: mtargetgroupbinding.elbv2.k8s.aws
|
|
admissionReviewVersions:
|
|
- v1beta1
|
|
rules:
|
|
- apiGroups:
|
|
- elbv2.k8s.aws
|
|
apiVersions:
|
|
- v1beta1
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- targetgroupbindings
|
|
sideEffects: None
|
|
---
|
|
apiVersion: admissionregistration.k8s.io/v1
|
|
kind: ValidatingWebhookConfiguration
|
|
metadata:
|
|
{{- if $.Values.enableCertManager }}
|
|
annotations:
|
|
cert-manager.io/inject-ca-from: {{ .Release.Namespace }}/{{ template "aws-load-balancer-controller.namePrefix" . }}-serving-cert
|
|
{{- end }}
|
|
name: {{ include "aws-load-balancer-controller.namePrefix" . }}-webhook
|
|
labels:
|
|
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
|
|
webhooks:
|
|
- clientConfig:
|
|
{{ if not $.Values.enableCertManager -}}
|
|
caBundle: {{ $tls.caCert }}
|
|
{{ end }}
|
|
service:
|
|
name: {{ template "aws-load-balancer-controller.webhookService" . }}
|
|
namespace: {{ $.Release.Namespace }}
|
|
path: /validate-elbv2-k8s-aws-v1beta1-ingressclassparams
|
|
failurePolicy: Fail
|
|
name: vingressclassparams.elbv2.k8s.aws
|
|
admissionReviewVersions:
|
|
- v1beta1
|
|
objectSelector:
|
|
matchExpressions:
|
|
- key: app.kubernetes.io/name
|
|
operator: NotIn
|
|
values:
|
|
- {{ include "aws-load-balancer-controller.name" . }}
|
|
rules:
|
|
- apiGroups:
|
|
- elbv2.k8s.aws
|
|
apiVersions:
|
|
- v1beta1
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- ingressclassparams
|
|
sideEffects: None
|
|
- clientConfig:
|
|
{{ if not $.Values.enableCertManager -}}
|
|
caBundle: {{ $tls.caCert }}
|
|
{{ end }}
|
|
service:
|
|
name: {{ template "aws-load-balancer-controller.webhookService" . }}
|
|
namespace: {{ $.Release.Namespace }}
|
|
path: /validate-elbv2-k8s-aws-v1beta1-targetgroupbinding
|
|
failurePolicy: Fail
|
|
name: vtargetgroupbinding.elbv2.k8s.aws
|
|
admissionReviewVersions:
|
|
- v1beta1
|
|
rules:
|
|
- apiGroups:
|
|
- elbv2.k8s.aws
|
|
apiVersions:
|
|
- v1beta1
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- targetgroupbindings
|
|
sideEffects: None
|
|
- clientConfig:
|
|
{{ if not $.Values.enableCertManager -}}
|
|
caBundle: {{ $tls.caCert }}
|
|
{{ end }}
|
|
service:
|
|
name: {{ template "aws-load-balancer-controller.webhookService" . }}
|
|
namespace: {{ $.Release.Namespace }}
|
|
path: /validate-networking-v1-ingress
|
|
failurePolicy: Fail
|
|
matchPolicy: Equivalent
|
|
name: vingress.elbv2.k8s.aws
|
|
admissionReviewVersions:
|
|
- v1beta1
|
|
rules:
|
|
- apiGroups:
|
|
- networking.k8s.io
|
|
apiVersions:
|
|
- v1
|
|
operations:
|
|
- CREATE
|
|
- UPDATE
|
|
resources:
|
|
- ingresses
|
|
sideEffects: None
|
|
---
|
|
{{- if not $.Values.enableCertManager }}
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: {{ template "aws-load-balancer-controller.webhookCertSecret" . }}
|
|
namespace: {{ .Release.Namespace }}
|
|
labels:
|
|
{{ include "aws-load-balancer-controller.labels" . | indent 4 }}
|
|
type: kubernetes.io/tls
|
|
data:
|
|
ca.crt: {{ $tls.caCert }}
|
|
tls.crt: {{ $tls.clientCert }}
|
|
tls.key: {{ $tls.clientKey }}
|
|
{{- else }}
|
|
apiVersion: cert-manager.io/v1
|
|
kind: Certificate
|
|
metadata:
|
|
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-serving-cert
|
|
namespace: {{ .Release.Namespace }}
|
|
labels:
|
|
{{ include "aws-load-balancer-controller.labels" . | indent 4 }}
|
|
spec:
|
|
dnsNames:
|
|
- {{ template "aws-load-balancer-controller.webhookService" . }}.{{ .Release.Namespace }}.svc
|
|
- {{ template "aws-load-balancer-controller.webhookService" . }}.{{ .Release.Namespace }}.svc.{{ .Values.cluster.dnsDomain }}
|
|
issuerRef:
|
|
kind: Issuer
|
|
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-selfsigned-issuer
|
|
secretName: {{ template "aws-load-balancer-controller.webhookCertSecret" . }}
|
|
---
|
|
apiVersion: cert-manager.io/v1
|
|
kind: Issuer
|
|
metadata:
|
|
name: {{ template "aws-load-balancer-controller.namePrefix" . }}-selfsigned-issuer
|
|
namespace: {{ .Release.Namespace }}
|
|
labels:
|
|
{{ include "aws-load-balancer-controller.labels" . | indent 4 }}
|
|
spec:
|
|
selfSigned: {}
|
|
{{- end }}
|