prow/oss/cluster/prow-controller-manager.yaml (218 lines of code) (raw):

apiVersion: apps/v1 kind: Deployment metadata: namespace: default name: prow-controller-manager labels: app: prow-controller-manager spec: replicas: 1 revisionHistoryLimit: 2 selector: matchLabels: app: prow-controller-manager template: metadata: labels: app: prow-controller-manager spec: serviceAccountName: prow-controller-manager containers: - name: prow-controller-manager image: us-central1-docker.pkg.dev/gob-prow/prow-images/prow-controller-manager:v20250423-91b28ca9b args: - --config-path=/etc/config/config.yaml - --dry-run=false - --enable-controller=plank - --job-config-path=/etc/job-config env: # Use KUBECONFIG envvar rather than --kubeconfig flag in order to append multiple configs. - name: KUBECONFIG value: "/etc/kubeconfig/config-20240403:/etc/build-openshift-eng/kubeconfig:/etc/build-cloud-kubernetes-node-management-team/kubeconfig:/etc/build-kpt-config-sync/kubeconfig:/etc/build-compute-image-import/kubeconfig:/etc/build-blueprints/kubeconfig:/etc/build-elcarro/kubeconfig:/etc/gke-gcloud-auth-plugin-based/kubeconfigs.yaml" ports: - name: metrics containerPort: 9090 volumeMounts: - mountPath: /etc/build-openshift-eng name: build-openshift-eng readOnly: true - mountPath: /etc/build-cloud-kubernetes-node-management-team name: build-cloud-kubernetes-node-management-team readOnly: true - mountPath: /etc/build-kpt-config-sync name: build-kpt-config-sync readOnly: true - mountPath: /etc/build-compute-image-import name: build-compute-image-import readOnly: true - mountPath: /etc/build-blueprints name: build-blueprints readOnly: true - mountPath: /etc/build-elcarro name: build-elcarro readOnly: true - name: config mountPath: /etc/config readOnly: true - name: job-config mountPath: /etc/job-config readOnly: true - mountPath: /etc/kubeconfig name: kubeconfig readOnly: true - mountPath: /etc/gke-gcloud-auth-plugin-based name: kubeconfigs readOnly: true volumes: - name: build-openshift-eng secret: defaultMode: 420 secretName: kubeconfig-build-openshift-eng - name: build-cloud-kubernetes-node-management-team secret: defaultMode: 420 secretName: kubeconfig-build-cloud-kubernetes-node-management-team - name: build-kpt-config-sync secret: defaultMode: 420 secretName: kubeconfig-build-kpt-config-sync - name: build-compute-image-import secret: defaultMode: 420 secretName: kubeconfig-build-compute-image-import - name: build-blueprints secret: defaultMode: 420 secretName: kubeconfig-build-blueprints - name: build-elcarro secret: defaultMode: 420 secretName: kubeconfig-build-elcarro - name: config configMap: name: config - name: job-config configMap: name: job-config - name: kubeconfig secret: defaultMode: 420 secretName: kubeconfig - name: kubeconfigs configMap: name: kubeconfigs --- apiVersion: v1 kind: ServiceAccount metadata: namespace: default name: "prow-controller-manager" annotations: "iam.gke.io/gcp-service-account": "oss-prow@oss-prow.iam.gserviceaccount.com" --- kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: namespace: default name: "prow-controller-manager" rules: - apiGroups: - coordination.k8s.io resources: - leases resourceNames: - prow-controller-manager-leader-lock verbs: - get - update - apiGroups: - coordination.k8s.io resources: - leases verbs: - create - apiGroups: - "" resources: - configmaps resourceNames: - prow-controller-manager-leader-lock verbs: - get - update - apiGroups: - "" resources: - configmaps - events verbs: - create - apiGroups: - prow.k8s.io resources: - prowjobs verbs: - get - update - list - watch - update - patch --- kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: namespace: test-pods name: "prow-controller-manager" rules: - apiGroups: - "" resources: - pods verbs: - create - delete - list - watch - get - patch --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: namespace: default name: "prow-controller-manager" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: "prow-controller-manager" subjects: - kind: ServiceAccount name: "prow-controller-manager" --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: namespace: test-pods name: "prow-controller-manager" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: "prow-controller-manager" subjects: - kind: ServiceAccount name: "prow-controller-manager" namespace: default --- apiVersion: v1 kind: Service metadata: labels: app: prow-controller-manager namespace: default name: prow-controller-manager spec: ports: - name: metrics port: 9090 selector: app: prow-controller-manager