blob: 2c854efbdf0f0ffab1fb7e8504ba2a5ebe7fbccf [file] [log] [blame]
#
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: submarine-operator
rules:
- apiGroups:
- submarine.apache.org
resources:
- submarines
- submarines/status
- submarines/finalizers
verbs:
- "*"
- apiGroups:
- traefik.containo.us
resources:
- ingressroutes
- ingressroutetcps
- ingressrouteudps
- middlewares
- tlsoptions
- tlsstores
- traefikservices
verbs:
- "*"
- apiGroups:
- kubeflow.org
resources:
- notebooks
- pytorchjobs
- tfjobs
verbs:
- "*"
- apiGroups:
- ""
resources:
- pods
- secrets
- configmaps
- services
- namespaces
- jobs
- serviceaccounts
- persistentvolumeclaims
- pods/portforward
- events
verbs:
- "*"
- apiGroups:
- "apps"
resources:
- deployments
- statefulsets
- replicasets
verbs:
- "*"
- apiGroups:
- "extensions"
resources:
- ingresses
verbs:
- "*"
- apiGroups:
- "rbac.authorization.k8s.io"
resources:
- roles
- rolebindings
verbs:
- "*"
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
- customresourcedefinitions/status
verbs:
- "*"
{{- if .Values.podSecurityPolicy.create }}
{{- if (eq "openshift" .Values.clusterType) }}
- apiGroups:
- security.openshift.io
resources:
- securitycontextconstraints
verbs:
- use
resourceNames:
- anyuid
{{- else }}
- apiGroups:
- policy
resources:
- podsecuritypolicies
verbs:
- use
resourceNames:
- submarine-anyuid
{{- end }}
{{- end }}
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: submarine-operator
namespace: {{ .Release.Namespace }}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: submarine-operator
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: submarine-operator
subjects:
- kind: ServiceAccount
name: submarine-operator
namespace: {{ .Release.Namespace }}