mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-29 01:16:12 -05:00
a87b7894db
* add current chart add current helm chart * disable service controller for aws ccm * add new iam roles * doc AWS internet LB + add to LB test * pass clusterName to helm for AWS LB * fix update-aws-lb chart to also include .helmignore * move chart outside services * working state * add subnet tags for AWS subnet discovery * fix .helmignore load rule with file in subdirectory * upgrade iam profile * revert new loader impl since cilium is not correctly loaded * install chart if not already present during `upgrade apply` * cleanup PR + fix build + add todos cleanup PR + add todos * shared helm pkg for cli install and bootstrapper * add link to eks docs * refactor iamMigrationCmd * delete unused helm.symwallk * move iammigrate to upgrade pkg * fixup! delete unused helm.symwallk * add to upgradecheck * remove nodeSelector from go code (Otto) * update iam docs and sort permission + remove duplicate roles * fix bug in `upgrade check` * better upgrade check output when svc version upgrade not possible * pr feedback * remove force flag in upgrade_test * use upgrader.GetUpgradeID instead of extra type * remove todos + fix check * update doc lb (leo) * remove bootstrapper helm package * Update cli/internal/cmd/upgradecheck.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * final nits * add docs for e2e upgrade test setup * Apply suggestions from code review Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update cli/internal/helm/loader.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * Update cli/internal/cmd/tfmigrationclient.go Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> * fix daniel review * link to the iam permissions instead of manually updating them (agreed with leo) * disable iam upgrade in upgrade apply --------- Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com> Co-authored-by: Malte Poll
105 lines
3.1 KiB
YAML
105 lines
3.1 KiB
YAML
{{- if .Values.rbac.create }}
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: {{ template "aws-load-balancer-controller.fullname" . }}-leader-election-role
|
|
namespace: {{ .Release.Namespace }}
|
|
labels:
|
|
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: [configmaps]
|
|
verbs: [create]
|
|
- apiGroups: [""]
|
|
resources: [configmaps]
|
|
resourceNames: [aws-load-balancer-controller-leader]
|
|
verbs: [get, patch, update]
|
|
- apiGroups:
|
|
- "coordination.k8s.io"
|
|
resources:
|
|
- leases
|
|
verbs:
|
|
- create
|
|
- apiGroups:
|
|
- "coordination.k8s.io"
|
|
resources:
|
|
- leases
|
|
resourceNames:
|
|
- aws-load-balancer-controller-leader
|
|
verbs:
|
|
- get
|
|
- update
|
|
- patch
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: {{ template "aws-load-balancer-controller.fullname" . }}-leader-election-rolebinding
|
|
namespace: {{ .Release.Namespace }}
|
|
labels:
|
|
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: {{ template "aws-load-balancer-controller.fullname" . }}-leader-election-role
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: {{ template "aws-load-balancer-controller.serviceAccountName" . }}
|
|
namespace: {{ .Release.Namespace }}
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: {{ template "aws-load-balancer-controller.fullname" . }}-role
|
|
labels:
|
|
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
|
|
rules:
|
|
- apiGroups: ["elbv2.k8s.aws"]
|
|
resources: [targetgroupbindings]
|
|
verbs: [create, delete, get, list, patch, update, watch]
|
|
- apiGroups: ["elbv2.k8s.aws"]
|
|
resources: [ingressclassparams]
|
|
verbs: [get, list, watch]
|
|
- apiGroups: [""]
|
|
resources: [events]
|
|
verbs: [create, patch]
|
|
- apiGroups: [""]
|
|
resources: [pods]
|
|
verbs: [get, list, watch]
|
|
- apiGroups: ["networking.k8s.io"]
|
|
resources: [ingressclasses]
|
|
verbs: [get, list, watch]
|
|
- apiGroups: ["", "extensions", "networking.k8s.io"]
|
|
resources: [services, ingresses]
|
|
verbs: [get, list, patch, update, watch]
|
|
- apiGroups: [""]
|
|
resources: [nodes, namespaces, endpoints]
|
|
verbs: [get, list, watch]
|
|
{{- if .Values.clusterSecretsPermissions.allowAllSecrets }}
|
|
- apiGroups: [""]
|
|
resources: [secrets]
|
|
verbs: [get, list, watch]
|
|
{{- end }}
|
|
- apiGroups: ["elbv2.k8s.aws", "", "extensions", "networking.k8s.io"]
|
|
resources: [targetgroupbindings/status, pods/status, services/status, ingresses/status]
|
|
verbs: [update, patch]
|
|
- apiGroups: ["discovery.k8s.io"]
|
|
resources: [endpointslices]
|
|
verbs: [get, list, watch]
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: {{ template "aws-load-balancer-controller.fullname" . }}-rolebinding
|
|
labels:
|
|
{{- include "aws-load-balancer-controller.labels" . | nindent 4 }}
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: {{ template "aws-load-balancer-controller.fullname" . }}-role
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: {{ template "aws-load-balancer-controller.serviceAccountName" . }}
|
|
namespace: {{ .Release.Namespace }}
|
|
{{- end }}
|