File tree 10 files changed +215
-136
lines changed
10 files changed +215
-136
lines changed Original file line number Diff line number Diff line change 1
1
apiVersion : v1
2
2
name : sqs-chart
3
3
description : A Helm chart for the ACK service controller for Amazon Simple Queue Service (SQS)
4
- version : 1.0.7
5
- appVersion : 1.0.7
4
+ version : 1.0.8
5
+ appVersion : 1.0.8
6
6
home : https://github.com/aws-controllers-k8s/sqs-controller
7
7
icon : https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
8
8
sources :
Original file line number Diff line number Diff line change @@ -161,10 +161,10 @@ spec:
161
161
description : ' Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
162
162
type : string
163
163
name :
164
- description : ' Name of the referent. More info: http ://kubernetes.io/docs/user-guide/identifiers #names'
164
+ description : ' Name of the referent. More info: https ://kubernetes.io/docs/concepts/overview/working-with-objects/names #names'
165
165
type : string
166
166
uid :
167
- description : ' UID of the referent. More info: http ://kubernetes.io/docs/user-guide/identifiers #uids'
167
+ description : ' UID of the referent. More info: https ://kubernetes.io/docs/concepts/overview/working-with-objects/names #uids'
168
168
type : string
169
169
required :
170
170
- apiVersion
Original file line number Diff line number Diff line change 1
1
{{ .Chart.Name }} has been installed.
2
- This chart deploys "public.ecr.aws/aws-controllers-k8s/sqs-controller:1.0.7 ".
2
+ This chart deploys "public.ecr.aws/aws-controllers-k8s/sqs-controller:1.0.8 ".
3
3
4
4
Check its status by running:
5
5
kubectl --namespace {{ .Release.Namespace }} get pods -l "app.kubernetes.io/instance={{ .Release.Name }}"
Original file line number Diff line number Diff line change @@ -46,3 +46,122 @@ If release name contains chart name it will be used as a full name.
46
46
{ {- define " aws.credentials.path" -} }
47
47
{ {- printf " %s/%s" (include " aws.credentials.secret_mount_path" .) .Values.aws.credentials.secretKey -} }
48
48
{ {- end -} }
49
+
50
+ { {/* The rules a of ClusterRole or Role */} }
51
+ { {- define " controller-role-rules" } }
52
+ rules:
53
+ - apiGroups:
54
+ - ""
55
+ resources:
56
+ - configmaps
57
+ verbs:
58
+ - get
59
+ - list
60
+ - patch
61
+ - watch
62
+ - apiGroups:
63
+ - ""
64
+ resources:
65
+ - namespaces
66
+ verbs:
67
+ - get
68
+ - list
69
+ - watch
70
+ - apiGroups:
71
+ - ""
72
+ resources:
73
+ - secrets
74
+ verbs:
75
+ - get
76
+ - list
77
+ - patch
78
+ - watch
79
+ - apiGroups:
80
+ - iam.services.k8s.aws
81
+ resources:
82
+ - policies
83
+ verbs:
84
+ - get
85
+ - list
86
+ - apiGroups:
87
+ - iam.services.k8s.aws
88
+ resources:
89
+ - policies/status
90
+ verbs:
91
+ - get
92
+ - list
93
+ - apiGroups:
94
+ - kms.services.k8s.aws
95
+ resources:
96
+ - keys
97
+ verbs:
98
+ - get
99
+ - list
100
+ - apiGroups:
101
+ - kms.services.k8s.aws
102
+ resources:
103
+ - keys/status
104
+ verbs:
105
+ - get
106
+ - list
107
+ - apiGroups:
108
+ - services.k8s.aws
109
+ resources:
110
+ - adoptedresources
111
+ verbs:
112
+ - create
113
+ - delete
114
+ - get
115
+ - list
116
+ - patch
117
+ - update
118
+ - watch
119
+ - apiGroups:
120
+ - services.k8s.aws
121
+ resources:
122
+ - adoptedresources/status
123
+ verbs:
124
+ - get
125
+ - patch
126
+ - update
127
+ - apiGroups:
128
+ - services.k8s.aws
129
+ resources:
130
+ - fieldexports
131
+ verbs:
132
+ - create
133
+ - delete
134
+ - get
135
+ - list
136
+ - patch
137
+ - update
138
+ - watch
139
+ - apiGroups:
140
+ - services.k8s.aws
141
+ resources:
142
+ - fieldexports/status
143
+ verbs:
144
+ - get
145
+ - patch
146
+ - update
147
+ - apiGroups:
148
+ - sqs.services.k8s.aws
149
+ resources:
150
+ - queues
151
+ verbs:
152
+ - create
153
+ - delete
154
+ - get
155
+ - list
156
+ - patch
157
+ - update
158
+ - watch
159
+ - apiGroups:
160
+ - sqs.services.k8s.aws
161
+ resources:
162
+ - queues/status
163
+ verbs:
164
+ - get
165
+ - patch
166
+ - update
167
+ { {- end } }
Original file line number Diff line number Diff line change
1
+ apiVersion : rbac.authorization.k8s.io/v1
2
+ kind : ClusterRoleBinding
3
+ metadata :
4
+ name : ack-namespaces-cache-sqs-controller
5
+ roleRef :
6
+ kind : ClusterRole
7
+ apiGroup : rbac.authorization.k8s.io
8
+ name : ack-namespaces-cache-sqs-controller
9
+ subjects :
10
+ - kind : ServiceAccount
11
+ name : ack-sqs-controller
12
+ namespace : {{ .Release.Namespace }}
13
+ ---
14
+ apiVersion : rbac.authorization.k8s.io/v1
15
+ kind : RoleBinding
16
+ metadata :
17
+ name : ack-configmaps-cache-sqs-controller
18
+ namespace : {{ .Release.Namespace }}
19
+ roleRef :
20
+ kind : Role
21
+ apiGroup : rbac.authorization.k8s.io
22
+ name : ack-configmaps-cache-sqs-controller
23
+ subjects :
24
+ - kind : ServiceAccount
25
+ name : ack-sqs-controller
26
+ namespace : {{ .Release.Namespace }}
Original file line number Diff line number Diff line change
1
+ apiVersion : rbac.authorization.k8s.io/v1
2
+ kind : ClusterRole
3
+ metadata :
4
+ name : ack-namespaces-cache-sqs-controller
5
+ rules :
6
+ - apiGroups :
7
+ - " "
8
+ resources :
9
+ - namespaces
10
+ verbs :
11
+ - get
12
+ - list
13
+ - watch
14
+ ---
15
+ apiVersion : rbac.authorization.k8s.io/v1
16
+ kind : Role
17
+ metadata :
18
+ name : ack-configmaps-cache-sqs-controller
19
+ namespace : {{ .Release.Namespace }}
20
+ rules :
21
+ - apiGroups :
22
+ - " "
23
+ resources :
24
+ - configmaps
25
+ verbs :
26
+ - get
27
+ - list
28
+ - watch
Original file line number Diff line number Diff line change 1
- apiVersion : rbac.authorization.k8s.io/v1
2
1
{{ if eq .Values.installScope "cluster" }}
2
+ apiVersion : rbac.authorization.k8s.io/v1
3
3
kind : ClusterRoleBinding
4
4
metadata :
5
5
name : {{ include "app.fullname" . }}
6
6
roleRef :
7
7
kind : ClusterRole
8
- {{ else }}
8
+ apiGroup : rbac.authorization.k8s.io
9
+ name : ack-sqs-controller
10
+ subjects :
11
+ - kind : ServiceAccount
12
+ name : {{ include "service-account.name" . }}
13
+ namespace : {{ .Release.Namespace }}
14
+ {{ else if .Values.watchNamespace }}
15
+ {{ $namespaces := split "," .Values.watchNamespace }}
16
+ {{ $fullname := include "app.fullname" . }}
17
+ {{ $releaseNamespace := .Release.Namespace }}
18
+ {{ $serviceAccountName := include "service-account.name" . }}
19
+ {{ range $namespaces }}
20
+ ---
21
+ apiVersion : rbac.authorization.k8s.io/v1
9
22
kind : RoleBinding
10
23
metadata :
11
- name : {{ include "app. fullname" . }}
12
- namespace : {{ .Release.Namespace }}
24
+ name : {{ $ fullname }}
25
+ namespace : {{ . }}
13
26
roleRef :
14
27
kind : Role
15
- {{ end }}
16
28
apiGroup : rbac.authorization.k8s.io
17
29
name : ack-sqs-controller
18
30
subjects :
19
31
- kind : ServiceAccount
20
- name : {{ include "service-account.name" . }}
21
- namespace : {{ .Release.Namespace }}
32
+ name : {{ $serviceAccountName }}
33
+ namespace : {{ $releaseNamespace }}
34
+ {{ end }}
35
+ {{ end }}
You can’t perform that action at this time.
0 commit comments