199 lines
6.4 KiB
YAML
199 lines
6.4 KiB
YAML
|
---
|
||
|
###
|
||
|
### Destination Controller Service
|
||
|
###
|
||
|
kind: ClusterRole
|
||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||
|
metadata:
|
||
|
name: linkerd-{{.Values.namespace}}-destination
|
||
|
labels:
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
rules:
|
||
|
- apiGroups: ["apps"]
|
||
|
resources: ["replicasets"]
|
||
|
verbs: ["list", "get", "watch"]
|
||
|
- apiGroups: ["batch"]
|
||
|
resources: ["jobs"]
|
||
|
verbs: ["list", "get", "watch"]
|
||
|
- apiGroups: [""]
|
||
|
resources: ["pods", "endpoints", "services", "nodes", "namespaces"]
|
||
|
verbs: ["list", "get", "watch"]
|
||
|
- apiGroups: ["linkerd.io"]
|
||
|
resources: ["serviceprofiles"]
|
||
|
verbs: ["list", "get", "watch"]
|
||
|
- apiGroups: ["split.smi-spec.io"]
|
||
|
resources: ["trafficsplits"]
|
||
|
verbs: ["list", "get", "watch"]
|
||
|
{{- if .Values.enableEndpointSlices }}
|
||
|
- apiGroups: ["discovery.k8s.io"]
|
||
|
resources: ["endpointslices"]
|
||
|
verbs: ["list", "get", "watch"]
|
||
|
{{- end }}
|
||
|
---
|
||
|
kind: ClusterRoleBinding
|
||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||
|
metadata:
|
||
|
name: linkerd-{{.Values.namespace}}-destination
|
||
|
labels:
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
roleRef:
|
||
|
apiGroup: rbac.authorization.k8s.io
|
||
|
kind: ClusterRole
|
||
|
name: linkerd-{{.Values.namespace}}-destination
|
||
|
subjects:
|
||
|
- kind: ServiceAccount
|
||
|
name: linkerd-destination
|
||
|
namespace: {{.Values.namespace}}
|
||
|
---
|
||
|
kind: ServiceAccount
|
||
|
apiVersion: v1
|
||
|
metadata:
|
||
|
name: linkerd-destination
|
||
|
namespace: {{.Values.namespace}}
|
||
|
labels:
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
{{- include "partials.image-pull-secrets" .Values.imagePullSecrets }}
|
||
|
---
|
||
|
{{- $host := printf "linkerd-sp-validator.%s.svc" .Values.namespace }}
|
||
|
{{- $ca := genSelfSignedCert $host (list) (list $host) 365 }}
|
||
|
{{- if (not .Values.profileValidator.externalSecret) }}
|
||
|
kind: Secret
|
||
|
apiVersion: v1
|
||
|
metadata:
|
||
|
name: linkerd-sp-validator-k8s-tls
|
||
|
namespace: {{ .Values.namespace }}
|
||
|
labels:
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
annotations:
|
||
|
{{ include "partials.annotations.created-by" . }}
|
||
|
type: kubernetes.io/tls
|
||
|
data:
|
||
|
tls.crt: {{ ternary (b64enc (trim $ca.Cert)) (b64enc (trim .Values.profileValidator.crtPEM)) (empty .Values.profileValidator.crtPEM) }}
|
||
|
tls.key: {{ ternary (b64enc (trim $ca.Key)) (b64enc (trim .Values.profileValidator.keyPEM)) (empty .Values.profileValidator.keyPEM) }}
|
||
|
---
|
||
|
{{- end }}
|
||
|
apiVersion: admissionregistration.k8s.io/v1
|
||
|
kind: ValidatingWebhookConfiguration
|
||
|
metadata:
|
||
|
name: linkerd-sp-validator-webhook-config
|
||
|
labels:
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
webhooks:
|
||
|
- name: linkerd-sp-validator.linkerd.io
|
||
|
namespaceSelector:
|
||
|
{{- toYaml .Values.profileValidator.namespaceSelector | trim | nindent 4 }}
|
||
|
clientConfig:
|
||
|
service:
|
||
|
name: linkerd-sp-validator
|
||
|
namespace: {{ .Values.namespace }}
|
||
|
path: "/"
|
||
|
{{- if and (.Values.profileValidator.externalSecret) (empty .Values.profileValidator.caBundle) }}
|
||
|
{{- fail "If profileValidator.externalSecret is true then you need to provide profileValidator.caBundle" }}
|
||
|
{{- end }}
|
||
|
caBundle: {{ ternary (b64enc (trim $ca.Cert)) (b64enc (trim .Values.profileValidator.caBundle)) (empty .Values.profileValidator.caBundle) }}
|
||
|
failurePolicy: {{.Values.webhookFailurePolicy}}
|
||
|
admissionReviewVersions: ["v1", "v1beta1"]
|
||
|
rules:
|
||
|
- operations: ["CREATE", "UPDATE"]
|
||
|
apiGroups: ["linkerd.io"]
|
||
|
apiVersions: ["v1alpha1", "v1alpha2"]
|
||
|
resources: ["serviceprofiles"]
|
||
|
sideEffects: None
|
||
|
---
|
||
|
{{- $host := printf "linkerd-policy-validator.%s.svc" .Values.namespace }}
|
||
|
{{- $ca := genSelfSignedCert $host (list) (list $host) 365 }}
|
||
|
{{- if (not .Values.policyValidator.externalSecret) }}
|
||
|
kind: Secret
|
||
|
apiVersion: v1
|
||
|
metadata:
|
||
|
name: linkerd-policy-validator-k8s-tls
|
||
|
namespace: {{ .Values.namespace }}
|
||
|
labels:
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
annotations:
|
||
|
{{ include "partials.annotations.created-by" . }}
|
||
|
type: kubernetes.io/tls
|
||
|
data:
|
||
|
tls.crt: {{ ternary (b64enc (trim $ca.Cert)) (b64enc (trim .Values.policyValidator.crtPEM)) (empty .Values.policyValidator.crtPEM) }}
|
||
|
tls.key: {{ ternary (b64enc (trim $ca.Key)) (b64enc (trim .Values.policyValidator.keyPEM)) (empty .Values.policyValidator.keyPEM) }}
|
||
|
---
|
||
|
{{- end }}
|
||
|
apiVersion: admissionregistration.k8s.io/v1
|
||
|
kind: ValidatingWebhookConfiguration
|
||
|
metadata:
|
||
|
name: linkerd-policy-validator-webhook-config
|
||
|
labels:
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
webhooks:
|
||
|
- name: linkerd-policy-validator.linkerd.io
|
||
|
namespaceSelector:
|
||
|
{{- toYaml .Values.policyValidator.namespaceSelector | trim | nindent 4 }}
|
||
|
clientConfig:
|
||
|
service:
|
||
|
name: linkerd-policy-validator
|
||
|
namespace: {{ .Values.namespace }}
|
||
|
path: "/"
|
||
|
{{- if and (.Values.policyValidator.externalSecret) (empty .Values.policyValidator.caBundle) }}
|
||
|
{{- fail "If policyValidator.externalSecret is true then you need to provide policyValidator.caBundle" }}
|
||
|
{{- end }}
|
||
|
caBundle: {{ ternary (b64enc (trim $ca.Cert)) (b64enc (trim .Values.policyValidator.caBundle)) (empty .Values.policyValidator.caBundle) }}
|
||
|
failurePolicy: {{.Values.webhookFailurePolicy}}
|
||
|
admissionReviewVersions: ["v1", "v1beta1"]
|
||
|
rules:
|
||
|
- operations: ["CREATE", "UPDATE"]
|
||
|
apiGroups: ["policy.linkerd.io"]
|
||
|
apiVersions: ["v1alpha1", "v1beta1"]
|
||
|
resources: ["servers"]
|
||
|
sideEffects: None
|
||
|
---
|
||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||
|
kind: ClusterRole
|
||
|
metadata:
|
||
|
name: linkerd-policy
|
||
|
labels:
|
||
|
app.kubernetes.io/part-of: Linkerd
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
rules:
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- pods
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
- apiGroups:
|
||
|
- policy.linkerd.io
|
||
|
resources:
|
||
|
- servers
|
||
|
- serverauthorizations
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
---
|
||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||
|
kind: ClusterRoleBinding
|
||
|
metadata:
|
||
|
name: linkerd-destination-policy
|
||
|
labels:
|
||
|
app.kubernetes.io/part-of: Linkerd
|
||
|
linkerd.io/control-plane-component: destination
|
||
|
linkerd.io/control-plane-ns: {{.Values.namespace}}
|
||
|
roleRef:
|
||
|
apiGroup: rbac.authorization.k8s.io
|
||
|
kind: ClusterRole
|
||
|
name: linkerd-policy
|
||
|
subjects:
|
||
|
- kind: ServiceAccount
|
||
|
name: linkerd-destination
|
||
|
namespace: {{.Values.namespace}}
|