--- ### ### Destination Controller Service ### kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-{{.Values.namespace}}-destination labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} rules: - apiGroups: ["apps"] resources: ["replicasets"] verbs: ["list", "get", "watch"] - apiGroups: ["batch"] resources: ["jobs"] verbs: ["list", "get", "watch"] - apiGroups: [""] resources: ["pods", "endpoints", "services", "nodes", "namespaces"] verbs: ["list", "get", "watch"] - apiGroups: ["linkerd.io"] resources: ["serviceprofiles"] verbs: ["list", "get", "watch"] - apiGroups: ["split.smi-spec.io"] resources: ["trafficsplits"] verbs: ["list", "get", "watch"] {{- if .Values.enableEndpointSlices }} - apiGroups: ["discovery.k8s.io"] resources: ["endpointslices"] verbs: ["list", "get", "watch"] {{- end }} --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: linkerd-{{.Values.namespace}}-destination labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: linkerd-{{.Values.namespace}}-destination subjects: - kind: ServiceAccount name: linkerd-destination namespace: {{.Values.namespace}} --- kind: ServiceAccount apiVersion: v1 metadata: name: linkerd-destination namespace: {{.Values.namespace}} labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} {{- include "partials.image-pull-secrets" .Values.imagePullSecrets }} --- {{- $host := printf "linkerd-sp-validator.%s.svc" .Values.namespace }} {{- $ca := genSelfSignedCert $host (list) (list $host) 365 }} {{- if (not .Values.profileValidator.externalSecret) }} kind: Secret apiVersion: v1 metadata: name: linkerd-sp-validator-k8s-tls namespace: {{ .Values.namespace }} labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} annotations: {{ include "partials.annotations.created-by" . }} type: kubernetes.io/tls data: tls.crt: {{ ternary (b64enc (trim $ca.Cert)) (b64enc (trim .Values.profileValidator.crtPEM)) (empty .Values.profileValidator.crtPEM) }} tls.key: {{ ternary (b64enc (trim $ca.Key)) (b64enc (trim .Values.profileValidator.keyPEM)) (empty .Values.profileValidator.keyPEM) }} --- {{- end }} apiVersion: admissionregistration.k8s.io/v1 kind: ValidatingWebhookConfiguration metadata: name: linkerd-sp-validator-webhook-config labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} webhooks: - name: linkerd-sp-validator.linkerd.io namespaceSelector: {{- toYaml .Values.profileValidator.namespaceSelector | trim | nindent 4 }} clientConfig: service: name: linkerd-sp-validator namespace: {{ .Values.namespace }} path: "/" {{- if and (.Values.profileValidator.externalSecret) (empty .Values.profileValidator.caBundle) }} {{- fail "If profileValidator.externalSecret is true then you need to provide profileValidator.caBundle" }} {{- end }} caBundle: {{ ternary (b64enc (trim $ca.Cert)) (b64enc (trim .Values.profileValidator.caBundle)) (empty .Values.profileValidator.caBundle) }} failurePolicy: {{.Values.webhookFailurePolicy}} admissionReviewVersions: ["v1", "v1beta1"] rules: - operations: ["CREATE", "UPDATE"] apiGroups: ["linkerd.io"] apiVersions: ["v1alpha1", "v1alpha2"] resources: ["serviceprofiles"] sideEffects: None --- {{- $host := printf "linkerd-policy-validator.%s.svc" .Values.namespace }} {{- $ca := genSelfSignedCert $host (list) (list $host) 365 }} {{- if (not .Values.policyValidator.externalSecret) }} kind: Secret apiVersion: v1 metadata: name: linkerd-policy-validator-k8s-tls namespace: {{ .Values.namespace }} labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} annotations: {{ include "partials.annotations.created-by" . }} type: kubernetes.io/tls data: tls.crt: {{ ternary (b64enc (trim $ca.Cert)) (b64enc (trim .Values.policyValidator.crtPEM)) (empty .Values.policyValidator.crtPEM) }} tls.key: {{ ternary (b64enc (trim $ca.Key)) (b64enc (trim .Values.policyValidator.keyPEM)) (empty .Values.policyValidator.keyPEM) }} --- {{- end }} apiVersion: admissionregistration.k8s.io/v1 kind: ValidatingWebhookConfiguration metadata: name: linkerd-policy-validator-webhook-config labels: linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} webhooks: - name: linkerd-policy-validator.linkerd.io namespaceSelector: {{- toYaml .Values.policyValidator.namespaceSelector | trim | nindent 4 }} clientConfig: service: name: linkerd-policy-validator namespace: {{ .Values.namespace }} path: "/" {{- if and (.Values.policyValidator.externalSecret) (empty .Values.policyValidator.caBundle) }} {{- fail "If policyValidator.externalSecret is true then you need to provide policyValidator.caBundle" }} {{- end }} caBundle: {{ ternary (b64enc (trim $ca.Cert)) (b64enc (trim .Values.policyValidator.caBundle)) (empty .Values.policyValidator.caBundle) }} failurePolicy: {{.Values.webhookFailurePolicy}} admissionReviewVersions: ["v1", "v1beta1"] rules: - operations: ["CREATE", "UPDATE"] apiGroups: ["policy.linkerd.io"] apiVersions: ["v1alpha1", "v1beta1"] resources: ["servers"] sideEffects: None --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: linkerd-policy labels: app.kubernetes.io/part-of: Linkerd linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} rules: - apiGroups: - "" resources: - pods verbs: - get - list - watch - apiGroups: - policy.linkerd.io resources: - servers - serverauthorizations verbs: - get - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: linkerd-destination-policy labels: app.kubernetes.io/part-of: Linkerd linkerd.io/control-plane-component: destination linkerd.io/control-plane-ns: {{.Values.namespace}} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: linkerd-policy subjects: - kind: ServiceAccount name: linkerd-destination namespace: {{.Values.namespace}}