File tree 10 files changed +287
-213
lines changed
10 files changed +287
-213
lines changed Original file line number Diff line number Diff line change 1
1
apiVersion : v1
2
2
name : iam-chart
3
3
description : A Helm chart for the ACK service controller for AWS Identity & Access Management (IAM)
4
- version : 1.3.2
5
- appVersion : 1.3.2
4
+ version : 1.3.3
5
+ appVersion : 1.3.3
6
6
home : https://github.com/aws-controllers-k8s/iam-controller
7
7
icon : https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png
8
8
sources :
Original file line number Diff line number Diff line change @@ -161,10 +161,10 @@ spec:
161
161
description : ' Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
162
162
type : string
163
163
name :
164
- description : ' Name of the referent. More info: http ://kubernetes.io/docs/user-guide/identifiers #names'
164
+ description : ' Name of the referent. More info: https ://kubernetes.io/docs/concepts/overview/working-with-objects/names #names'
165
165
type : string
166
166
uid :
167
- description : ' UID of the referent. More info: http ://kubernetes.io/docs/user-guide/identifiers #uids'
167
+ description : ' UID of the referent. More info: https ://kubernetes.io/docs/concepts/overview/working-with-objects/names #uids'
168
168
type : string
169
169
required :
170
170
- apiVersion
Original file line number Diff line number Diff line change 1
1
{{ .Chart.Name }} has been installed.
2
- This chart deploys "public.ecr.aws/aws-controllers-k8s/iam-controller:1.3.2 ".
2
+ This chart deploys "public.ecr.aws/aws-controllers-k8s/iam-controller:1.3.3 ".
3
3
4
4
Check its status by running:
5
5
kubectl --namespace {{ .Release.Namespace }} get pods -l "app.kubernetes.io/instance={{ .Release.Name }}"
Original file line number Diff line number Diff line change @@ -46,3 +46,194 @@ If release name contains chart name it will be used as a full name.
46
46
{ {- define " aws.credentials.path" -} }
47
47
{ {- printf " %s/%s" (include " aws.credentials.secret_mount_path" .) .Values.aws.credentials.secretKey -} }
48
48
{ {- end -} }
49
+
50
+ { {/* The rules a of ClusterRole or Role */} }
51
+ { {- define " controller-role-rules" } }
52
+ rules:
53
+ - apiGroups:
54
+ - ""
55
+ resources:
56
+ - configmaps
57
+ verbs:
58
+ - get
59
+ - list
60
+ - patch
61
+ - watch
62
+ - apiGroups:
63
+ - ""
64
+ resources:
65
+ - namespaces
66
+ verbs:
67
+ - get
68
+ - list
69
+ - watch
70
+ - apiGroups:
71
+ - ""
72
+ resources:
73
+ - secrets
74
+ verbs:
75
+ - get
76
+ - list
77
+ - patch
78
+ - watch
79
+ - apiGroups:
80
+ - iam.services.k8s.aws
81
+ resources:
82
+ - groups
83
+ verbs:
84
+ - create
85
+ - delete
86
+ - get
87
+ - list
88
+ - patch
89
+ - update
90
+ - watch
91
+ - apiGroups:
92
+ - iam.services.k8s.aws
93
+ resources:
94
+ - groups/status
95
+ verbs:
96
+ - get
97
+ - patch
98
+ - update
99
+ - apiGroups:
100
+ - iam.services.k8s.aws
101
+ resources:
102
+ - instanceprofiles
103
+ verbs:
104
+ - create
105
+ - delete
106
+ - get
107
+ - list
108
+ - patch
109
+ - update
110
+ - watch
111
+ - apiGroups:
112
+ - iam.services.k8s.aws
113
+ resources:
114
+ - instanceprofiles/status
115
+ verbs:
116
+ - get
117
+ - patch
118
+ - update
119
+ - apiGroups:
120
+ - iam.services.k8s.aws
121
+ resources:
122
+ - openidconnectproviders
123
+ verbs:
124
+ - create
125
+ - delete
126
+ - get
127
+ - list
128
+ - patch
129
+ - update
130
+ - watch
131
+ - apiGroups:
132
+ - iam.services.k8s.aws
133
+ resources:
134
+ - openidconnectproviders/status
135
+ verbs:
136
+ - get
137
+ - patch
138
+ - update
139
+ - apiGroups:
140
+ - iam.services.k8s.aws
141
+ resources:
142
+ - policies
143
+ verbs:
144
+ - create
145
+ - delete
146
+ - get
147
+ - list
148
+ - patch
149
+ - update
150
+ - watch
151
+ - apiGroups:
152
+ - iam.services.k8s.aws
153
+ resources:
154
+ - policies/status
155
+ verbs:
156
+ - get
157
+ - patch
158
+ - update
159
+ - apiGroups:
160
+ - iam.services.k8s.aws
161
+ resources:
162
+ - roles
163
+ verbs:
164
+ - create
165
+ - delete
166
+ - get
167
+ - list
168
+ - patch
169
+ - update
170
+ - watch
171
+ - apiGroups:
172
+ - iam.services.k8s.aws
173
+ resources:
174
+ - roles/status
175
+ verbs:
176
+ - get
177
+ - patch
178
+ - update
179
+ - apiGroups:
180
+ - iam.services.k8s.aws
181
+ resources:
182
+ - users
183
+ verbs:
184
+ - create
185
+ - delete
186
+ - get
187
+ - list
188
+ - patch
189
+ - update
190
+ - watch
191
+ - apiGroups:
192
+ - iam.services.k8s.aws
193
+ resources:
194
+ - users/status
195
+ verbs:
196
+ - get
197
+ - patch
198
+ - update
199
+ - apiGroups:
200
+ - services.k8s.aws
201
+ resources:
202
+ - adoptedresources
203
+ verbs:
204
+ - create
205
+ - delete
206
+ - get
207
+ - list
208
+ - patch
209
+ - update
210
+ - watch
211
+ - apiGroups:
212
+ - services.k8s.aws
213
+ resources:
214
+ - adoptedresources/status
215
+ verbs:
216
+ - get
217
+ - patch
218
+ - update
219
+ - apiGroups:
220
+ - services.k8s.aws
221
+ resources:
222
+ - fieldexports
223
+ verbs:
224
+ - create
225
+ - delete
226
+ - get
227
+ - list
228
+ - patch
229
+ - update
230
+ - watch
231
+ - apiGroups:
232
+ - services.k8s.aws
233
+ resources:
234
+ - fieldexports/status
235
+ verbs:
236
+ - get
237
+ - patch
238
+ - update
239
+ { {- end } }
Original file line number Diff line number Diff line change
1
+ apiVersion : rbac.authorization.k8s.io/v1
2
+ kind : ClusterRoleBinding
3
+ metadata :
4
+ name : ack-namespaces-cache-iam-controller
5
+ roleRef :
6
+ kind : ClusterRole
7
+ apiGroup : rbac.authorization.k8s.io
8
+ name : ack-namespaces-cache-iam-controller
9
+ subjects :
10
+ - kind : ServiceAccount
11
+ name : ack-iam-controller
12
+ namespace : {{ .Release.Namespace }}
13
+ ---
14
+ apiVersion : rbac.authorization.k8s.io/v1
15
+ kind : RoleBinding
16
+ metadata :
17
+ name : ack-configmaps-cache-iam-controller
18
+ namespace : {{ .Release.Namespace }}
19
+ roleRef :
20
+ kind : Role
21
+ apiGroup : rbac.authorization.k8s.io
22
+ name : ack-configmaps-cache-iam-controller
23
+ subjects :
24
+ - kind : ServiceAccount
25
+ name : ack-iam-controller
26
+ namespace : {{ .Release.Namespace }}
Original file line number Diff line number Diff line change
1
+ apiVersion : rbac.authorization.k8s.io/v1
2
+ kind : ClusterRole
3
+ metadata :
4
+ name : ack-namespaces-cache-iam-controller
5
+ rules :
6
+ - apiGroups :
7
+ - " "
8
+ resources :
9
+ - namespaces
10
+ verbs :
11
+ - get
12
+ - list
13
+ - watch
14
+ ---
15
+ apiVersion : rbac.authorization.k8s.io/v1
16
+ kind : Role
17
+ metadata :
18
+ name : ack-configmaps-cache-iam-controller
19
+ namespace : {{ .Release.Namespace }}
20
+ rules :
21
+ - apiGroups :
22
+ - " "
23
+ resources :
24
+ - configmaps
25
+ verbs :
26
+ - get
27
+ - list
28
+ - watch
Original file line number Diff line number Diff line change 1
- apiVersion : rbac.authorization.k8s.io/v1
2
1
{{ if eq .Values.installScope "cluster" }}
2
+ apiVersion : rbac.authorization.k8s.io/v1
3
3
kind : ClusterRoleBinding
4
4
metadata :
5
5
name : {{ include "app.fullname" . }}
6
6
roleRef :
7
7
kind : ClusterRole
8
- {{ else }}
8
+ apiGroup : rbac.authorization.k8s.io
9
+ name : ack-iam-controller
10
+ subjects :
11
+ - kind : ServiceAccount
12
+ name : {{ include "service-account.name" . }}
13
+ namespace : {{ .Release.Namespace }}
14
+ {{ else if .Values.watchNamespace }}
15
+ {{ $namespaces := split "," .Values.watchNamespace }}
16
+ {{ $fullname := include "app.fullname" . }}
17
+ {{ $releaseNamespace := .Release.Namespace }}
18
+ {{ $serviceAccountName := include "service-account.name" . }}
19
+ {{ range $namespaces }}
20
+ ---
21
+ apiVersion : rbac.authorization.k8s.io/v1
9
22
kind : RoleBinding
10
23
metadata :
11
- name : {{ include "app. fullname" . }}
12
- namespace : {{ .Release.Namespace }}
24
+ name : {{ $ fullname }}
25
+ namespace : {{ . }}
13
26
roleRef :
14
27
kind : Role
15
- {{ end }}
16
28
apiGroup : rbac.authorization.k8s.io
17
29
name : ack-iam-controller
18
30
subjects :
19
31
- kind : ServiceAccount
20
- name : {{ include "service-account.name" . }}
21
- namespace : {{ .Release.Namespace }}
32
+ name : {{ $serviceAccountName }}
33
+ namespace : {{ $releaseNamespace }}
34
+ {{ end }}
35
+ {{ end }}
You can’t perform that action at this time.
0 commit comments