updated access-manager to 0.3.0 (#17)
Signed-off-by: Christian Kotzbauer <christian.kotzbauer@gmail.com>
This commit is contained in:
parent
5c20089278
commit
1ec23dc5cd
|
|
@ -1,8 +1,8 @@
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
description: Kubernetes-Operator to simplify RBAC configurations
|
description: Kubernetes-Operator to simplify RBAC configurations
|
||||||
name: access-manager
|
name: access-manager
|
||||||
version: 0.2.0
|
version: 0.3.0
|
||||||
appVersion: 0.2.0
|
appVersion: 0.3.0
|
||||||
home: https://github.com/ckotzbauer/access-manager
|
home: https://github.com/ckotzbauer/access-manager
|
||||||
sources:
|
sources:
|
||||||
- https://github.com/ckotzbauer/access-manager
|
- https://github.com/ckotzbauer/access-manager
|
||||||
|
|
|
||||||
|
|
@ -12,7 +12,8 @@ $ helm install ckotzbauer/access-manager
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
- Kubernetes 1.9+
|
- Kubernetes 1.9+ (Helm chart)
|
||||||
|
- Kubernetes 1.16+ (Operator)
|
||||||
|
|
||||||
## Installing the Chart
|
## Installing the Chart
|
||||||
|
|
||||||
|
|
@ -40,7 +41,7 @@ The following table lists the configurable parameters of the Access-Manager char
|
||||||
| Parameter | Description | Default |
|
| Parameter | Description | Default |
|
||||||
| -------------------------------------- | ------------------------------------------------- | ----------------------------- |
|
| -------------------------------------- | ------------------------------------------------- | ----------------------------- |
|
||||||
| `image.repository` | container image repository | `ckotzbauer/access-manager` |
|
| `image.repository` | container image repository | `ckotzbauer/access-manager` |
|
||||||
| `image.tag` | container image tag | `0.2.0` |
|
| `image.tag` | container image tag | `0.3.0` |
|
||||||
| `image.pullPolicy` | container image pull policy | `IfNotPresent` |
|
| `image.pullPolicy` | container image pull policy | `IfNotPresent` |
|
||||||
| `nodeSelector` | node labels for pod assignment | `{}` |
|
| `nodeSelector` | node labels for pod assignment | `{}` |
|
||||||
| `tolerations` | node tolerations for pod assignment | `[]` |
|
| `tolerations` | node tolerations for pod assignment | `[]` |
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,11 @@
|
||||||
|
|
||||||
|
---
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.4.0
|
||||||
|
creationTimestamp: null
|
||||||
name: rbacdefinitions.access-manager.io
|
name: rbacdefinitions.access-manager.io
|
||||||
spec:
|
spec:
|
||||||
group: access-manager.io
|
group: access-manager.io
|
||||||
|
|
@ -30,77 +35,167 @@ spec:
|
||||||
type: object
|
type: object
|
||||||
spec:
|
spec:
|
||||||
description: RbacDefinitionSpec defines the desired state of RbacDefinition
|
description: RbacDefinitionSpec defines the desired state of RbacDefinition
|
||||||
type: object
|
|
||||||
properties:
|
properties:
|
||||||
paused:
|
cluster:
|
||||||
type: boolean
|
|
||||||
namespaced:
|
|
||||||
description: Defines the desired state of RoleBindings
|
|
||||||
type: array
|
|
||||||
items:
|
items:
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
namespace:
|
|
||||||
type: object
|
|
||||||
properties:
|
properties:
|
||||||
|
clusterRoleName:
|
||||||
|
type: string
|
||||||
name:
|
name:
|
||||||
type: string
|
type: string
|
||||||
namespaceSelector:
|
subjects:
|
||||||
type: object
|
|
||||||
properties:
|
|
||||||
matchLabels:
|
|
||||||
type: object
|
|
||||||
x-kubernetes-preserve-unknown-fields: true
|
|
||||||
matchExpressions:
|
|
||||||
type: array
|
|
||||||
items:
|
items:
|
||||||
|
description: Subject contains a reference to the object or
|
||||||
|
user identities a role binding applies to. This can either
|
||||||
|
hold a direct API object reference, or a value for non-objects
|
||||||
|
such as user and group names.
|
||||||
|
properties:
|
||||||
|
apiGroup:
|
||||||
|
description: APIGroup holds the API group of the referenced
|
||||||
|
subject. Defaults to "" for ServiceAccount subjects.
|
||||||
|
Defaults to "rbac.authorization.k8s.io" for User and
|
||||||
|
Group subjects.
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: Kind of object being referenced. Values defined
|
||||||
|
by this API group are "User", "Group", and "ServiceAccount".
|
||||||
|
If the Authorizer does not recognized the kind value,
|
||||||
|
the Authorizer should report an error.
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: Name of the object being referenced.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: Namespace of the referenced object. If the
|
||||||
|
object kind is non-namespace, such as "User" or "Group",
|
||||||
|
and this value is not empty the Authorizer should report
|
||||||
|
an error.
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- kind
|
||||||
|
- name
|
||||||
type: object
|
type: object
|
||||||
x-kubernetes-preserve-unknown-fields: true
|
type: array
|
||||||
|
required:
|
||||||
|
- clusterRoleName
|
||||||
|
- name
|
||||||
|
- subjects
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
namespaced:
|
||||||
|
items:
|
||||||
|
properties:
|
||||||
bindings:
|
bindings:
|
||||||
type: array
|
|
||||||
items:
|
items:
|
||||||
type: object
|
|
||||||
properties:
|
properties:
|
||||||
|
kind:
|
||||||
|
type: string
|
||||||
name:
|
name:
|
||||||
type: string
|
type: string
|
||||||
roleName:
|
roleName:
|
||||||
type: string
|
type: string
|
||||||
kind:
|
|
||||||
type: string
|
|
||||||
subjects:
|
subjects:
|
||||||
type: array
|
|
||||||
items:
|
items:
|
||||||
type: object
|
description: Subject contains a reference to the object
|
||||||
|
or user identities a role binding applies to. This
|
||||||
|
can either hold a direct API object reference, or
|
||||||
|
a value for non-objects such as user and group names.
|
||||||
properties:
|
properties:
|
||||||
name:
|
apiGroup:
|
||||||
|
description: APIGroup holds the API group of the
|
||||||
|
referenced subject. Defaults to "" for ServiceAccount
|
||||||
|
subjects. Defaults to "rbac.authorization.k8s.io"
|
||||||
|
for User and Group subjects.
|
||||||
type: string
|
type: string
|
||||||
kind:
|
kind:
|
||||||
|
description: Kind of object being referenced. Values
|
||||||
|
defined by this API group are "User", "Group",
|
||||||
|
and "ServiceAccount". If the Authorizer does not
|
||||||
|
recognized the kind value, the Authorizer should
|
||||||
|
report an error.
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: Name of the object being referenced.
|
||||||
type: string
|
type: string
|
||||||
namespace:
|
namespace:
|
||||||
|
description: Namespace of the referenced object. If
|
||||||
|
the object kind is non-namespace, such as "User"
|
||||||
|
or "Group", and this value is not empty the Authorizer
|
||||||
|
should report an error.
|
||||||
type: string
|
type: string
|
||||||
|
required:
|
||||||
cluster:
|
- kind
|
||||||
description: Defines the desired state of ClusterRoleBindings
|
- name
|
||||||
type: array
|
|
||||||
items:
|
|
||||||
type: object
|
type: object
|
||||||
properties:
|
|
||||||
name:
|
|
||||||
type: string
|
|
||||||
clusterRoleName:
|
|
||||||
type: string
|
|
||||||
subjects:
|
|
||||||
type: array
|
type: array
|
||||||
items:
|
required:
|
||||||
|
- kind
|
||||||
|
- name
|
||||||
|
- roleName
|
||||||
|
- subjects
|
||||||
type: object
|
type: object
|
||||||
properties:
|
type: array
|
||||||
name:
|
|
||||||
type: string
|
|
||||||
kind:
|
|
||||||
type: string
|
|
||||||
namespace:
|
namespace:
|
||||||
|
properties:
|
||||||
|
name:
|
||||||
type: string
|
type: string
|
||||||
|
required:
|
||||||
|
- name
|
||||||
|
type: object
|
||||||
|
namespaceSelector:
|
||||||
|
description: A label selector is a label query over a set of
|
||||||
|
resources. The result of matchLabels and matchExpressions
|
||||||
|
are ANDed. An empty label selector matches all objects. A
|
||||||
|
null label selector matches no objects.
|
||||||
|
properties:
|
||||||
|
matchExpressions:
|
||||||
|
description: matchExpressions is a list of label selector
|
||||||
|
requirements. The requirements are ANDed.
|
||||||
|
items:
|
||||||
|
description: A label selector requirement is a selector
|
||||||
|
that contains values, a key, and an operator that relates
|
||||||
|
the key and values.
|
||||||
|
properties:
|
||||||
|
key:
|
||||||
|
description: key is the label key that the selector
|
||||||
|
applies to.
|
||||||
|
type: string
|
||||||
|
operator:
|
||||||
|
description: operator represents a key's relationship
|
||||||
|
to a set of values. Valid operators are In, NotIn,
|
||||||
|
Exists and DoesNotExist.
|
||||||
|
type: string
|
||||||
|
values:
|
||||||
|
description: values is an array of string values.
|
||||||
|
If the operator is In or NotIn, the values array
|
||||||
|
must be non-empty. If the operator is Exists or
|
||||||
|
DoesNotExist, the values array must be empty. This
|
||||||
|
array is replaced during a strategic merge patch.
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
required:
|
||||||
|
- key
|
||||||
|
- operator
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
matchLabels:
|
||||||
|
additionalProperties:
|
||||||
|
type: string
|
||||||
|
description: matchLabels is a map of {key,value} pairs.
|
||||||
|
A single {key,value} in the matchLabels map is equivalent
|
||||||
|
to an element of matchExpressions, whose key field is
|
||||||
|
"key", the operator is "In", and the values array contains
|
||||||
|
only "value". The requirements are ANDed.
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- bindings
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
paused:
|
||||||
|
type: boolean
|
||||||
|
type: object
|
||||||
status:
|
status:
|
||||||
description: RbacDefinitionStatus defines the observed state of RbacDefinition
|
description: RbacDefinitionStatus defines the observed state of RbacDefinition
|
||||||
type: object
|
type: object
|
||||||
|
|
@ -109,3 +204,9 @@ spec:
|
||||||
storage: true
|
storage: true
|
||||||
subresources:
|
subresources:
|
||||||
status: {}
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
||||||
|
|
|
||||||
|
|
@ -28,19 +28,8 @@ spec:
|
||||||
- name: {{ .Chart.Name }}
|
- name: {{ .Chart.Name }}
|
||||||
image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}"
|
image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}"
|
||||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||||
command:
|
args:
|
||||||
- access-manager
|
- --enable-leader-election
|
||||||
env:
|
|
||||||
- name: WATCH_NAMESPACE
|
|
||||||
valueFrom:
|
|
||||||
fieldRef:
|
|
||||||
fieldPath: metadata.namespace
|
|
||||||
- name: POD_NAME
|
|
||||||
valueFrom:
|
|
||||||
fieldRef:
|
|
||||||
fieldPath: metadata.name
|
|
||||||
- name: OPERATOR_NAME
|
|
||||||
value: "access-manager"
|
|
||||||
securityContext:
|
securityContext:
|
||||||
{{ toYaml .Values.securityContext | indent 12 }}
|
{{ toYaml .Values.securityContext | indent 12 }}
|
||||||
resources:
|
resources:
|
||||||
|
|
|
||||||
|
|
@ -4,7 +4,7 @@
|
||||||
|
|
||||||
image:
|
image:
|
||||||
repository: ckotzbauer/access-manager
|
repository: ckotzbauer/access-manager
|
||||||
tag: 0.2.0
|
tag: 0.3.0
|
||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
|
|
||||||
podAnnotations: {}
|
podAnnotations: {}
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue