charts/member-net-controller-manager/templates/rbac.yaml (129 lines of code) (raw):
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
name: {{ include "member-net-controller-manager.fullname" . }}-role
rules:
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- create
- get
- list
- update
- apiGroups:
- ""
resources:
- events
verbs:
- create
- get
- list
- update
- watch
- patch
- apiGroups:
- ""
resources:
- services
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- secrets
verbs:
- get
- list
- apiGroups:
- discovery.k8s.io
resources:
- endpointslices
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- networking.fleet.azure.com
resources:
- multiclusterservices
verbs:
- get
- list
- watch
- apiGroups:
- networking.fleet.azure.com
resources:
- serviceexports
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- networking.fleet.azure.com
resources:
- serviceexports/finalizers
verbs:
- update
- apiGroups:
- networking.fleet.azure.com
resources:
- serviceexports/status
verbs:
- get
- patch
- update
- apiGroups:
- networking.fleet.azure.com
resources:
- serviceimports
verbs:
- get
- list
- patch
- update
- watch
- apiGroups:
- networking.fleet.azure.com
resources:
- serviceimports/finalizers
verbs:
- get
- update
- apiGroups:
- networking.fleet.azure.com
resources:
- serviceimports/status
verbs:
- get
- patch
- update
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: {{ include "member-net-controller-manager.fullname" . }}-role-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: {{ include "member-net-controller-manager.fullname" . }}-role
subjects:
- kind: ServiceAccount
name: {{ include "member-net-controller-manager.fullname" . }}-sa
namespace: {{ .Values.fleetSystemNamespace }}