feat: add kubelet-cerT
This commit is contained in:
@@ -12,3 +12,13 @@ Selector labels
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
ClusterRole names
|
||||
*/}}
|
||||
{{- define "custom.certificatesName" -}}
|
||||
"certificates-{{ .Release.Name }}"
|
||||
{{- end -}}
|
||||
{{- define "custom.eventsName" -}}
|
||||
"events-{{ .Release.Name }}"
|
||||
{{- end -}}
|
||||
|
||||
@@ -9,7 +9,7 @@ metadata:
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: "certificates-{{ .Release.Name }}"
|
||||
name: {{ include "custom.certificatesName" . }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: kubelet-serving-cert-approver
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: "certificates-{{ .Release.Name }}"
|
||||
name: {{ include "custom.certificatesName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: "certificates-{{ .Release.Name }}"
|
||||
app.kubernetes.io/name: {{ include "custom.certificatesName" . }}
|
||||
{{- include "custom.labels" . | nindent 4 }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
@@ -40,10 +40,10 @@ rules:
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: "events-{{ .Release.Name }}"
|
||||
name: {{ include "custom.eventsName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: "events-{{ .Release.Name }}"
|
||||
app.kubernetes.io/name: {{ include "custom.eventsName" . }}
|
||||
{{- include "custom.labels" . | nindent 4 }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: kubelet-serving-cert-approver
|
||||
name: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: kubelet-serving-cert-approver
|
||||
app.kubernetes.io/name: {{ .Release.Namespace }}
|
||||
{{- include "custom.labels" . | nindent 4 }}
|
||||
pod-security.kubernetes.io/audit: restricted
|
||||
pod-security.kubernetes.io/enforce: restricted
|
||||
pod-security.kubernetes.io/warn: restricted
|
||||
pod-security.kubernetes.io/audit: privileged
|
||||
pod-security.kubernetes.io/enforce: privileged
|
||||
pod-security.kubernetes.io/warn: privileged
|
||||
|
||||
@@ -1,15 +1,15 @@
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: "events-{{ .Release.Name }}"
|
||||
name: {{ include "custom.eventsName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: "events-{{ .Release.Name }}"
|
||||
app.kubernetes.io/name: {{ include "custom.eventsName" . }}
|
||||
{{- include "custom.labels" . | nindent 4 }}
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: "events-{{ .Release.Name }}"
|
||||
name: {{ include "custom.eventsName" . }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: kubelet-serving-cert-approver
|
||||
|
||||
Reference in New Issue
Block a user