cluster-role.yaml 1.2 KB

1234567891011121314151617181920212223242526272829303132333435
  1. {{- if .Values.global.createClusterRole }}
  2. #hack for delete pod master after migration
  3. ---
  4. kind: ClusterRole
  5. apiVersion: rbac.authorization.k8s.io/v1
  6. metadata:
  7. name: {{ .Values.global.serviceAccountName }}-rw-cr
  8. labels:
  9. app.kubernetes.io/name: {{ template "seaweedfs.name" . }}
  10. helm.sh/chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}
  11. app.kubernetes.io/managed-by: {{ .Release.Service }}
  12. app.kubernetes.io/instance: {{ .Release.Name }}
  13. rules:
  14. - apiGroups: [""]
  15. resources: ["pods"]
  16. verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
  17. ---
  18. kind: ClusterRoleBinding
  19. apiVersion: rbac.authorization.k8s.io/v1
  20. metadata:
  21. name: system:serviceaccount:{{ .Values.global.serviceAccountName }}:default
  22. labels:
  23. app.kubernetes.io/name: {{ template "seaweedfs.name" . }}
  24. helm.sh/chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}
  25. app.kubernetes.io/managed-by: {{ .Release.Service }}
  26. app.kubernetes.io/instance: {{ .Release.Name }}
  27. subjects:
  28. - kind: ServiceAccount
  29. name: {{ .Values.global.serviceAccountName }}
  30. namespace: {{ .Release.Namespace }}
  31. roleRef:
  32. apiGroup: rbac.authorization.k8s.io
  33. kind: ClusterRole
  34. name: {{ .Values.global.serviceAccountName }}-rw-cr
  35. {{- end }}