You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

230 lines
6.2 KiB

  1. ---
  2. apiVersion: v1
  3. kind: ServiceAccount
  4. metadata:
  5. name: csi-azuredisk-controller-sa
  6. namespace: kube-system
  7. ---
  8. kind: ClusterRole
  9. apiVersion: rbac.authorization.k8s.io/v1
  10. metadata:
  11. name: azuredisk-external-provisioner-role
  12. rules:
  13. - apiGroups: [""]
  14. resources: ["persistentvolumes"]
  15. verbs: ["get", "list", "watch", "create", "delete"]
  16. - apiGroups: [""]
  17. resources: ["persistentvolumeclaims"]
  18. verbs: ["get", "list", "watch", "update"]
  19. - apiGroups: ["storage.k8s.io"]
  20. resources: ["storageclasses"]
  21. verbs: ["get", "list", "watch"]
  22. - apiGroups: [""]
  23. resources: ["events"]
  24. verbs: ["get", "list", "watch", "create", "update", "patch"]
  25. - apiGroups: ["storage.k8s.io"]
  26. resources: ["csinodes"]
  27. verbs: ["get", "list", "watch"]
  28. - apiGroups: [""]
  29. resources: ["nodes"]
  30. verbs: ["get", "list", "watch"]
  31. - apiGroups: ["coordination.k8s.io"]
  32. resources: ["leases"]
  33. verbs: ["get", "list", "watch", "create", "update", "patch"]
  34. - apiGroups: ["snapshot.storage.k8s.io"]
  35. resources: ["volumesnapshots"]
  36. verbs: ["get", "list"]
  37. - apiGroups: ["snapshot.storage.k8s.io"]
  38. resources: ["volumesnapshotcontents"]
  39. verbs: ["get", "list"]
  40. ---
  41. kind: ClusterRoleBinding
  42. apiVersion: rbac.authorization.k8s.io/v1
  43. metadata:
  44. name: azuredisk-csi-provisioner-binding
  45. subjects:
  46. - kind: ServiceAccount
  47. name: csi-azuredisk-controller-sa
  48. namespace: kube-system
  49. roleRef:
  50. kind: ClusterRole
  51. name: azuredisk-external-provisioner-role
  52. apiGroup: rbac.authorization.k8s.io
  53. ---
  54. kind: ClusterRole
  55. apiVersion: rbac.authorization.k8s.io/v1
  56. metadata:
  57. name: azuredisk-external-attacher-role
  58. rules:
  59. - apiGroups: [""]
  60. resources: ["persistentvolumes"]
  61. verbs: ["get", "list", "watch", "update"]
  62. - apiGroups: [""]
  63. resources: ["nodes"]
  64. verbs: ["get", "list", "watch"]
  65. - apiGroups: ["csi.storage.k8s.io"]
  66. resources: ["csinodeinfos"]
  67. verbs: ["get", "list", "watch"]
  68. - apiGroups: ["storage.k8s.io"]
  69. resources: ["volumeattachments"]
  70. verbs: ["get", "list", "watch", "update", "patch"]
  71. - apiGroups: ["storage.k8s.io"]
  72. resources: ["volumeattachments/status"]
  73. verbs: ["get", "list", "watch", "update", "patch"]
  74. - apiGroups: ["coordination.k8s.io"]
  75. resources: ["leases"]
  76. verbs: ["get", "list", "watch", "create", "update", "patch"]
  77. ---
  78. kind: ClusterRoleBinding
  79. apiVersion: rbac.authorization.k8s.io/v1
  80. metadata:
  81. name: azuredisk-csi-attacher-binding
  82. subjects:
  83. - kind: ServiceAccount
  84. name: csi-azuredisk-controller-sa
  85. namespace: kube-system
  86. roleRef:
  87. kind: ClusterRole
  88. name: azuredisk-external-attacher-role
  89. apiGroup: rbac.authorization.k8s.io
  90. ---
  91. kind: ClusterRole
  92. apiVersion: rbac.authorization.k8s.io/v1
  93. metadata:
  94. name: azuredisk-cluster-driver-registrar-role
  95. rules:
  96. - apiGroups: ["apiextensions.k8s.io"]
  97. resources: ["customresourcedefinitions"]
  98. verbs: ["create", "list", "watch", "delete"]
  99. - apiGroups: ["csi.storage.k8s.io"]
  100. resources: ["csidrivers"]
  101. verbs: ["create", "delete"]
  102. - apiGroups: ["coordination.k8s.io"]
  103. resources: ["leases"]
  104. verbs: ["get", "list", "watch", "create", "update", "patch"]
  105. ---
  106. kind: ClusterRoleBinding
  107. apiVersion: rbac.authorization.k8s.io/v1
  108. metadata:
  109. name: azuredisk-csi-driver-registrar-binding
  110. subjects:
  111. - kind: ServiceAccount
  112. name: csi-azuredisk-controller-sa
  113. namespace: kube-system
  114. roleRef:
  115. kind: ClusterRole
  116. name: azuredisk-cluster-driver-registrar-role
  117. apiGroup: rbac.authorization.k8s.io
  118. ---
  119. kind: ClusterRole
  120. apiVersion: rbac.authorization.k8s.io/v1
  121. metadata:
  122. name: azuredisk-external-snapshotter-role
  123. rules:
  124. - apiGroups: [""]
  125. resources: ["events"]
  126. verbs: ["list", "watch", "create", "update", "patch"]
  127. - apiGroups: [""]
  128. resources: ["secrets"]
  129. verbs: ["get", "list"]
  130. - apiGroups: ["snapshot.storage.k8s.io"]
  131. resources: ["volumesnapshotclasses"]
  132. verbs: ["get", "list", "watch"]
  133. - apiGroups: ["snapshot.storage.k8s.io"]
  134. resources: ["volumesnapshotcontents"]
  135. verbs: ["create", "get", "list", "watch", "update", "delete"]
  136. - apiGroups: ["snapshot.storage.k8s.io"]
  137. resources: ["volumesnapshotcontents/status"]
  138. verbs: ["update"]
  139. - apiGroups: ["apiextensions.k8s.io"]
  140. resources: ["customresourcedefinitions"]
  141. verbs: ["create", "list", "watch", "delete"]
  142. - apiGroups: ["coordination.k8s.io"]
  143. resources: ["leases"]
  144. verbs: ["get", "watch", "list", "delete", "update", "create"]
  145. ---
  146. kind: ClusterRoleBinding
  147. apiVersion: rbac.authorization.k8s.io/v1
  148. metadata:
  149. name: azuredisk-csi-snapshotter-binding
  150. subjects:
  151. - kind: ServiceAccount
  152. name: csi-azuredisk-controller-sa
  153. namespace: kube-system
  154. roleRef:
  155. kind: ClusterRole
  156. name: azuredisk-external-snapshotter-role
  157. apiGroup: rbac.authorization.k8s.io
  158. ---
  159. kind: ClusterRole
  160. apiVersion: rbac.authorization.k8s.io/v1
  161. metadata:
  162. name: azuredisk-external-resizer-role
  163. rules:
  164. - apiGroups: [""]
  165. resources: ["persistentvolumes"]
  166. verbs: ["get", "list", "watch", "update", "patch"]
  167. - apiGroups: [""]
  168. resources: ["persistentvolumeclaims"]
  169. verbs: ["get", "list", "watch"]
  170. - apiGroups: [""]
  171. resources: ["persistentvolumeclaims/status"]
  172. verbs: ["update", "patch"]
  173. - apiGroups: [""]
  174. resources: ["events"]
  175. verbs: ["list", "watch", "create", "update", "patch"]
  176. - apiGroups: ["coordination.k8s.io"]
  177. resources: ["leases"]
  178. verbs: ["get", "list", "watch", "create", "update", "patch"]
  179. - apiGroups: [""]
  180. resources: ["pods"]
  181. verbs: ["get", "list", "watch"]
  182. ---
  183. kind: ClusterRoleBinding
  184. apiVersion: rbac.authorization.k8s.io/v1
  185. metadata:
  186. name: azuredisk-csi-resizer-role
  187. subjects:
  188. - kind: ServiceAccount
  189. name: csi-azuredisk-controller-sa
  190. namespace: kube-system
  191. roleRef:
  192. kind: ClusterRole
  193. name: azuredisk-external-resizer-role
  194. apiGroup: rbac.authorization.k8s.io
  195. ---
  196. kind: ClusterRole
  197. apiVersion: rbac.authorization.k8s.io/v1
  198. metadata:
  199. name: csi-azuredisk-controller-secret-role
  200. rules:
  201. - apiGroups: [""]
  202. resources: ["secrets"]
  203. verbs: ["get", "list"]
  204. ---
  205. kind: ClusterRoleBinding
  206. apiVersion: rbac.authorization.k8s.io/v1
  207. metadata:
  208. name: csi-azuredisk-controller-secret-binding
  209. subjects:
  210. - kind: ServiceAccount
  211. name: csi-azuredisk-controller-sa
  212. namespace: kube-system
  213. roleRef:
  214. kind: ClusterRole
  215. name: csi-azuredisk-controller-secret-role
  216. apiGroup: rbac.authorization.k8s.io