123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167 |
- ##### Controller Service Account, Roles, Rolebindings
- apiVersion: v1
- kind: ServiceAccount
- metadata:
- name: csi-gce-pd-controller-sa
- ---
- # xref: https://github.com/kubernetes-csi/external-provisioner/blob/master/deploy/kubernetes/rbac.yaml
- kind: ClusterRole
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-gce-pd-provisioner-role
- rules:
- - apiGroups: [""]
- resources: ["persistentvolumes"]
- verbs: ["get", "list", "watch", "create", "delete"]
- - apiGroups: [""]
- resources: ["persistentvolumeclaims"]
- verbs: ["get", "list", "watch", "update"]
- - apiGroups: ["storage.k8s.io"]
- resources: ["storageclasses"]
- verbs: ["get", "list", "watch"]
- - apiGroups: [""]
- resources: ["events"]
- verbs: ["list", "watch", "create", "update", "patch"]
- - apiGroups: ["storage.k8s.io"]
- resources: ["csinodes"]
- verbs: ["get", "list", "watch"]
- - apiGroups: [""]
- resources: ["nodes"]
- verbs: ["get", "list", "watch"]
- - apiGroups: ["snapshot.storage.k8s.io"]
- resources: ["volumesnapshots"]
- verbs: ["get", "list"]
- - apiGroups: ["snapshot.storage.k8s.io"]
- resources: ["volumesnapshotcontents"]
- verbs: ["get", "list"]
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-gce-pd-controller-provisioner-binding
- subjects:
- - kind: ServiceAccount
- name: csi-gce-pd-controller-sa
- roleRef:
- kind: ClusterRole
- name: csi-gce-pd-provisioner-role
- apiGroup: rbac.authorization.k8s.io
-
- ---
- # xref: https://github.com/kubernetes-csi/external-attacher/blob/master/deploy/kubernetes/rbac.yaml
- kind: ClusterRole
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-gce-pd-attacher-role
- rules:
- - apiGroups: [""]
- resources: ["persistentvolumes"]
- verbs: ["get", "list", "watch", "update", "patch"]
- - apiGroups: [""]
- resources: ["nodes"]
- verbs: ["get", "list", "watch"]
- - apiGroups: ["storage.k8s.io"]
- resources: ["csinodes"]
- verbs: ["get", "list", "watch"]
- - apiGroups: ["storage.k8s.io"]
- resources: ["volumeattachments"]
- verbs: ["get", "list", "watch", "update", "patch"]
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-gce-pd-controller-attacher-binding
- subjects:
- - kind: ServiceAccount
- name: csi-gce-pd-controller-sa
- roleRef:
- kind: ClusterRole
- name: csi-gce-pd-attacher-role
- apiGroup: rbac.authorization.k8s.io
- ---
- # Resizer must be able to work with PVCs, PVs, SCs.
- kind: ClusterRole
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-gce-pd-resizer-role
- rules:
- - apiGroups: [""]
- resources: ["persistentvolumes"]
- verbs: ["get", "list", "watch", "update", "patch"]
- - apiGroups: [""]
- resources: ["persistentvolumeclaims"]
- verbs: ["get", "list", "watch"]
- - apiGroups: [""]
- resources: ["persistentvolumeclaims/status"]
- verbs: ["update", "patch"]
- - apiGroups: [""]
- resources: ["events"]
- verbs: ["list", "watch", "create", "update", "patch"]
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-gce-pd-resizer-binding
- subjects:
- - kind: ServiceAccount
- name: csi-gce-pd-controller-sa
- roleRef:
- kind: ClusterRole
- name: csi-gce-pd-resizer-role
- apiGroup: rbac.authorization.k8s.io
- ---
- # xref: https://github.com/kubernetes-csi/external-snapshotter/blob/master/deploy/kubernetes/csi-snapshotter/rbac-csi-snapshotter.yaml
- kind: ClusterRole
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-gce-pd-snapshotter-role
- rules:
- - apiGroups: [""]
- resources: ["events"]
- verbs: ["list", "watch", "create", "update", "patch"]
- - apiGroups: ["snapshot.storage.k8s.io"]
- resources: ["volumesnapshotclasses"]
- verbs: ["get", "list", "watch"]
- - apiGroups: ["snapshot.storage.k8s.io"]
- resources: ["volumesnapshotcontents"]
- verbs: ["get", "list", "watch", "update", "delete", "patch"]
- - apiGroups: ["snapshot.storage.k8s.io"]
- resources: ["volumesnapshotcontents/status"]
- verbs: ["update", "patch"]
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-gce-pd-controller-snapshotter-binding
- subjects:
- - kind: ServiceAccount
- name: csi-gce-pd-controller-sa
- roleRef:
- kind: ClusterRole
- name: csi-gce-pd-snapshotter-role
- apiGroup: rbac.authorization.k8s.io
- ---
- # priviledged Pod Security Policy, previously defined via PrivilegedTestPSPClusterRoleBinding()
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: psp-csi-controller-driver-registrar-role
- subjects:
- - kind: ServiceAccount
- name: csi-gce-pd-controller-sa
- roleRef:
- kind: ClusterRole
- name: e2e-test-privileged-psp
- apiGroup: rbac.authorization.k8s.io
|