Skip to content

Commit

Permalink
manifest changes (#1039)
Browse files Browse the repository at this point in the history
* generated files for the playground

Signed-off-by: Volkan Özçelik <volkan.ozcelik@broadcom.com>

* testing alignment chnages

Signed-off-by: Volkan Özçelik <volkan.ozcelik@broadcom.com>

---------

Signed-off-by: Volkan Özçelik <volkan.ozcelik@broadcom.com>
  • Loading branch information
v0lkan authored Jul 4, 2024
1 parent ed30e3d commit bfbc68f
Show file tree
Hide file tree
Showing 41 changed files with 457 additions and 112 deletions.
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: manager-role
name: spire-server-spire-controller-manager
rules:
- apiGroups: [ "" ]
resources: [ "endpoints" ]
verbs: [ "get", "list", "watch" ]
- apiGroups: [""]
resources: ["namespaces"]
verbs: ["get", "list", "watch"]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: manager-rolebinding
name: spire-server-spire-controller-manager
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: manager-role
name: spire-server-spire-controller-manager
subjects:
- kind: ServiceAccount
name: spire-server
namespace: spire-system
namespace: spire-server
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ metadata:
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-agent-cluster-role
name: spire-agent
rules:
- apiGroups: [""]
resources: ["pods","nodes","nodes/proxy"]
Expand All @@ -23,14 +23,14 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-agent-cluster-role-binding
name: spire-agent
subjects:
- kind: ServiceAccount
name: spire-agent
namespace: spire-system
roleRef:
kind: ClusterRole
name: spire-agent-cluster-role
name: spire-agent
apiGroup: rbac.authorization.k8s.io


Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ metadata:
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-server-cluster-role
name: spire-server-spire-server
rules:
- apiGroups: [""]
resources: ["nodes"]
Expand All @@ -28,15 +28,14 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-server-cluster-role-binding
namespace: spire-system
name: spire-server-spire-server
subjects:
- kind: ServiceAccount
name: spire-server
namespace: spire-system
namespace: spire-server
roleRef:
kind: ClusterRole
name: spire-server-cluster-role
name: spire-server-spire-server
apiGroup: rbac.authorization.k8s.io

---
Expand Down
1 change: 0 additions & 1 deletion examples/workshop_federation/cluster-2/safe/Role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,6 @@ metadata:
subjects:
- kind: ServiceAccount
name: vsecm-safe
namespace: vsecm-system
roleRef:
kind: ClusterRole
name: vsecm-secret-readwriter
Expand Down
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: manager-role
name: spire-server-spire-controller-manager
rules:
- apiGroups: [ "" ]
resources: [ "endpoints" ]
verbs: [ "get", "list", "watch" ]
- apiGroups: [""]
resources: ["namespaces"]
verbs: ["get", "list", "watch"]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: manager-rolebinding
name: spire-server-spire-controller-manager
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: manager-role
name: spire-server-spire-controller-manager
subjects:
- kind: ServiceAccount
name: spire-server
namespace: spire-system
namespace: spire-server
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ metadata:
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-agent-cluster-role
name: spire-agent
rules:
- apiGroups: [""]
resources: ["pods","nodes","nodes/proxy"]
Expand All @@ -23,14 +23,14 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-agent-cluster-role-binding
name: spire-agent
subjects:
- kind: ServiceAccount
name: spire-agent
namespace: spire-system
roleRef:
kind: ClusterRole
name: spire-agent-cluster-role
name: spire-agent
apiGroup: rbac.authorization.k8s.io


Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ metadata:
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-server-cluster-role
name: spire-server-spire-server
rules:
- apiGroups: [""]
resources: ["nodes"]
Expand All @@ -28,15 +28,14 @@ rules:
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-server-cluster-role-binding
namespace: spire-system
name: spire-server-spire-server
subjects:
- kind: ServiceAccount
name: spire-server
namespace: spire-system
namespace: spire-server
roleRef:
kind: ClusterRole
name: spire-server-cluster-role
name: spire-server-spire-server
apiGroup: rbac.authorization.k8s.io

---
Expand Down
4 changes: 2 additions & 2 deletions hack/uninstall.sh
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,8 @@ if kubectl get ns | grep vsecm-system; then
kubectl delete ClusterSPIFFEID vsecm-safe
kubectl delete CSIDriver csi.spiffe.io
kubectl delete ValidatingWebhookConfiguration spire-controller-manager-webhook
kubectl delete clusterrolebinding vsecm-secret-readwriter-binding manager-rolebinding spire-agent-cluster-role-binding spire-server-cluster-role-binding
kubectl delete clusterrole spire-agent-cluster-role spire-server-cluster-role vsecm-secret-readwriter manager-role
kubectl delete clusterrolebinding vsecm-secret-readwriter-binding spire-server-spire-controller-manager spire-agent spire-server-spire-server
kubectl delete clusterrole spire-agent spire-server-spire-server vsecm-secret-readwriter spire-server-spire-controller-manager

else
echo "Nothing to clean."
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: spire-server-post-install
annotations:
"helm.sh/hook": post-install
"helm.sh/hook-delete-policy": before-hook-creation, hook-succeeded, hook-failed
rules:
- apiGroups: ["admissionregistration.k8s.io"]
resources: ["validatingwebhookconfigurations"]
resourceNames: ["spire-server-spire-controller-manager-webhook"]
verbs: ["get", "patch"]
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: spire-server-post-upgrade
annotations:
"helm.sh/hook": post-upgrade
"helm.sh/hook-delete-policy": before-hook-creation, hook-succeeded, hook-failed
rules:
- apiGroups: ["admissionregistration.k8s.io"]
resources: ["validatingwebhookconfigurations"]
resourceNames: ["spire-server-spire-controller-manager-webhook"]
verbs: ["get", "patch"]
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: spire-server-pre-upgrade
annotations:
"helm.sh/hook": pre-upgrade
"helm.sh/hook-delete-policy": before-hook-creation, hook-succeeded, hook-failed
rules:
- apiGroups: ["admissionregistration.k8s.io"]
resources: ["validatingwebhookconfigurations"]
resourceNames: ["spire-server-spire-controller-manager-webhook"]
verbs: ["get", "patch"]
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-server-post-install
annotations:
"helm.sh/hook": post-install
"helm.sh/hook-delete-policy": before-hook-creation, hook-succeeded, hook-failed
subjects:
- kind: ServiceAccount
name: spire-server-post-install
namespace: spire-server
roleRef:
kind: ClusterRole
name: spire-server-post-install
apiGroup: rbac.authorization.k8s.io
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-server-post-upgrade
annotations:
"helm.sh/hook": post-upgrade
"helm.sh/hook-delete-policy": before-hook-creation, hook-succeeded, hook-failed
subjects:
- kind: ServiceAccount
name: spire-server-post-upgrade
namespace: spire-server
roleRef:
kind: ClusterRole
name: spire-server-post-upgrade
apiGroup: rbac.authorization.k8s.io
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-server-pre-upgrade
annotations:
"helm.sh/hook": pre-upgrade
"helm.sh/hook-delete-policy": before-hook-creation, hook-succeeded, hook-failed
subjects:
- kind: ServiceAccount
name: spire-server-pre-upgrade
namespace: spire-server
roleRef:
kind: ClusterRole
name: spire-server-pre-upgrade
apiGroup: rbac.authorization.k8s.io
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
apiVersion: spire.spiffe.io/v1alpha1
kind: ClusterSPIFFEID
metadata:
name: spire-server-spire-default
spec:
className: "spire-server-spire"
spiffeIDTemplate: "spiffe://{{ .TrustDomain }}/ns/{{ .PodMeta.Namespace }}/sa/{{ .PodSpec.ServiceAccountName }}"
namespaceSelector:
matchExpressions:
- key: kubernetes.io/metadata.name
operator: NotIn
values:
- spire-server
- spire-system
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
apiVersion: spire.spiffe.io/v1alpha1
kind: ClusterSPIFFEID
metadata:
name: spire-server-spire-oidc-discovery-provider
spec:
className: "spire-server-spire"
spiffeIDTemplate: "spiffe://{{ .TrustDomain }}/ns/{{ .PodMeta.Namespace }}/sa/{{ .PodSpec.ServiceAccountName }}"
podSelector:
matchLabels:
component: oidc-discovery-provider
release: spire
release-namespace: spire-server
namespaceSelector:
matchExpressions:
- key: kubernetes.io/metadata.name
operator: In
values:
- spire-server
- spire-system
dnsNameTemplates:
- oidc-discovery.{{ .TrustDomain }}
autoPopulateDNSNames: true
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
apiVersion: spire.spiffe.io/v1alpha1
kind: ClusterSPIFFEID
metadata:
name: spire-server-spire-test-keys
spec:
className: "spire-server-spire"
spiffeIDTemplate: "spiffe://{{ .TrustDomain }}/ns/{{ .PodMeta.Namespace }}/sa/{{ .PodSpec.ServiceAccountName }}"
podSelector:
matchLabels:
component: test-keys
release: spire
release-namespace: spire-server
namespaceSelector:
matchExpressions:
- key: kubernetes.io/metadata.name
operator: In
values:
- spire-server
- spire-system
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: spire-server-spire-controller-manager
rules:
- apiGroups: [ "" ]
resources: [ "endpoints" ]
verbs: [ "get", "list", "watch" ]
- apiGroups: [""]
resources: ["namespaces"]
verbs: ["get", "list", "watch"]
- apiGroups: ["admissionregistration.k8s.io"]
resources: ["validatingwebhookconfigurations"]
verbs: ["get", "list", "patch", "watch"]
- apiGroups: [""]
resources: ["nodes"]
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["pods"]
verbs: ["get", "list", "watch"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterfederatedtrustdomains"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterfederatedtrustdomains/finalizers"]
verbs: ["update"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterfederatedtrustdomains/status"]
verbs: ["get", "patch", "update"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterspiffeids"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterspiffeids/finalizers"]
verbs: ["update"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterspiffeids/status"]
verbs: ["get", "patch", "update"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterstaticentries"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterstaticentries/finalizers"]
verbs: ["update"]
- apiGroups: ["spire.spiffe.io"]
resources: ["clusterstaticentries/status"]
verbs: ["get", "patch", "update"]
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: spire-server-spire-server
rules:
- apiGroups: [""]
resources: ["nodes"]
verbs: ["get"]
- apiGroups: ["authentication.k8s.io"]
resources: ["tokenreviews"]
verbs: ["get", "create"]
Loading

0 comments on commit bfbc68f

Please # to comment.