12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091 |
- # This YAML file contains all RBAC objects that are necessary to run external
- # CSI resizer.
- #
- # In production, each CSI driver deployment has to be customized:
- # - to avoid conflicts, use non-default namespace and different names
- # for non-namespaced entities like the ClusterRole
- # - decide whether the deployment replicates the external CSI
- # resizer, in which case leadership election must be enabled;
- # this influences the RBAC setup, see below
- apiVersion: v1
- kind: ServiceAccount
- metadata:
- name: csi-resizer
- # replace with non-default namespace name
- namespace: default
- ---
- # Resizer must be able to work with PVCs, PVs, SCs.
- kind: ClusterRole
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: external-resizer-runner
- rules:
- # The following rule should be uncommented for plugins that require secrets
- # for provisioning.
- # - apiGroups: [""]
- # resources: ["secrets"]
- # verbs: ["get", "list", "watch"]
- - apiGroups: [""]
- resources: ["persistentvolumes"]
- verbs: ["get", "list", "watch", "update", "patch"]
- - apiGroups: [""]
- resources: ["persistentvolumeclaims"]
- verbs: ["get", "list", "watch"]
- - apiGroups: [""]
- resources: ["persistentvolumeclaims/status"]
- verbs: ["update", "patch"]
- - apiGroups: ["storage.k8s.io"]
- resources: ["storageclasses"]
- verbs: ["get", "list", "watch"]
- - apiGroups: [""]
- resources: ["events"]
- verbs: ["list", "watch", "create", "update", "patch"]
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-resizer-role
- subjects:
- - kind: ServiceAccount
- name: csi-resizer
- # replace with non-default namespace name
- namespace: default
- roleRef:
- kind: ClusterRole
- name: external-resizer-runner
- apiGroup: rbac.authorization.k8s.io
- ---
- # Resizer must be able to work with leases in current namespace
- # if (and only if) leadership election is enabled
- kind: Role
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- # replace with non-default namespace name
- namespace: default
- name: external-resizer-cfg
- rules:
- - apiGroups: ["coordination.k8s.io"]
- resources: ["leases"]
- verbs: ["get", "watch", "list", "delete", "update", "create"]
- ---
- kind: RoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-resizer-role-cfg
- # replace with non-default namespace name
- namespace: default
- subjects:
- - kind: ServiceAccount
- name: csi-resizer
- # replace with non-default namespace name
- namespace: default
- roleRef:
- kind: Role
- name: external-resizer-cfg
- apiGroup: rbac.authorization.k8s.io
|