# This YAML file contains all RBAC objects that are necessary to run external # CSI provisioner. # # In production, each CSI driver deployment has to be customized: # - to avoid conflicts, use non-default namespace and different names # for non-namespaced entities like the ClusterRole # - decide whether the deployment replicates the external CSI # provisioner, in which case leadership election must be enabled; # this influences the RBAC setup, see below apiVersion: v1 kind: ServiceAccount metadata: name: csi-provisioner labels: {{ include "csidriver.labels" . | indent 4 }} --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: external-provisioner-runner-systems labels: {{ include "csidriver.labels" . | indent 4 }} rules: - apiGroups: [""] resources: ["secrets"] verbs: ["get", "list"] - apiGroups: [""] resources: ["persistentvolumes"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["get", "list", "watch", "update"] - apiGroups: [""] resources: ["persistentvolumeclaims/status"] verbs: ["update", "patch"] - apiGroups: ["storage.k8s.io"] resources: ["storageclasses"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["events"] verbs: ["list", "watch", "create", "update", "patch"] - apiGroups: ["snapshot.storage.k8s.io"] resources: ["volumesnapshots"] verbs: ["get", "list"] - apiGroups: ["snapshot.storage.k8s.io"] resources: ["volumesnapshotclasses"] verbs: ["get", "list", "watch"] - apiGroups: ["snapshot.storage.k8s.io"] resources: ["volumesnapshotcontents"] verbs: ["create", "get", "list", "watch", "update", "delete"] - apiGroups: ["snapshot.storage.k8s.io"] resources: ["volumesnapshotcontents/status"] verbs: ["update"] - apiGroups: ["storage.k8s.io"] resources: ["csinodes"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["nodes"] verbs: ["get", "list", "watch"] - apiGroups: ["storage.k8s.io"] resources: ["volumeattachments"] verbs: ["get", "list", "watch", "update", "patch"] - apiGroups: ["storage.k8s.io"] resources: ["volumeattachments/status"] verbs: ["get", "list", "watch", "update", "patch"] - apiGroups: [""] resources: ["pods"] verbs: ["get", "list", "watch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: csi-provisioner-role-systems labels: {{ include "csidriver.labels" . | indent 4 }} subjects: - kind: ServiceAccount name: csi-provisioner namespace: {{ .Release.Namespace }} roleRef: kind: ClusterRole name: external-provisioner-runner-systems apiGroup: rbac.authorization.k8s.io --- # Provisioner must be able to work with endpoints in current namespace # if (and only if) leadership election is enabled kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: external-provisioner-cfg-systems labels: {{ include "csidriver.labels" . | indent 4 }} rules: # Only one of the following rules for endpoints or leases is required based on # what is set for `--leader-election-type`. Endpoints are deprecated in favor of Leases. - apiGroups: [""] resources: ["endpoints"] verbs: ["get", "watch", "list", "delete", "update", "create"] - apiGroups: ["coordination.k8s.io"] resources: ["leases"] verbs: ["get", "watch", "list", "delete", "update", "create"] {{ if .Values.pspAdmissionControllerEnabled }} - apiGroups: ["policy"] resources: ["podsecuritypolicies"] verbs: ["use"] resourceNames: - seagate-exos-x-csi {{ end }} --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: csi-provisioner-role-cfg-systems labels: {{ include "csidriver.labels" . | indent 4 }} subjects: - kind: ServiceAccount name: csi-provisioner roleRef: kind: Role name: external-provisioner-cfg-systems apiGroup: rbac.authorization.k8s.io {{ if .Values.pspAdmissionControllerEnabled }} --- apiVersion: v1 kind: ServiceAccount metadata: name: csi-node-registrar labels: {{ include "csidriver.labels" . | indent 4 }} --- kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: csi-node-registrar-cfg-systems labels: {{ include "csidriver.labels" . | indent 4 }} rules: - apiGroups: ["policy"] resources: ["podsecuritypolicies"] verbs: ["use"] resourceNames: - systems-role --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: csi-node-registrar-role-cfg-systems labels: {{ include "csidriver.labels" . | indent 4 }} subjects: - kind: ServiceAccount name: csi-node-registrar roleRef: kind: Role name: csi-node-registrar-cfg-systems apiGroup: rbac.authorization.k8s.io {{ end }}