config/default/controller_auth_proxy_patch.yaml (23 lines of code) (raw):
# This patch inject a sidecar container which is a HTTP proxy for the
# controller, it performs RBAC authorization against the Kubernetes API using SubjectAccessReviews.
apiVersion: apps/v1
kind: Deployment
metadata:
name: controller
namespace: system
spec:
template:
spec:
containers:
- name: kube-rbac-proxy
image: registry.k8s.io/kubebuilder/kube-rbac-proxy:v0.5.0
args:
- "--secure-listen-address=0.0.0.0:8443"
- "--upstream=http://127.0.0.1:8080/"
- "--logtostderr=true"
- "--v=10"
ports:
- containerPort: 8443
name: https
- name: controller
args:
- "--metrics-bind-address=127.0.0.1:8080"
- "--leader-elect"