kubezero/charts/kubeadm/templates/resources/51-aws-iam-authenticator-de...

156 lines
3.1 KiB
YAML
Raw Normal View History

2021-12-01 12:33:11 +00:00
{{- if .Values.api.awsIamAuth.enabled }}
2021-01-04 14:56:41 +00:00
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
2021-01-04 14:56:41 +00:00
metadata:
name: aws-iam-authenticator
rules:
- apiGroups:
- iamauthenticator.k8s.aws
resources:
- iamidentitymappings
verbs:
- get
- list
- watch
- apiGroups:
- iamauthenticator.k8s.aws
resources:
- iamidentitymappings/status
verbs:
- patch
- update
- apiGroups:
- ""
resources:
- events
verbs:
- create
- update
- patch
- apiGroups:
- ""
resources:
- configmaps
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- configmaps
resourceNames:
- aws-auth
verbs:
- get
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: aws-iam-authenticator
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
2021-01-04 14:56:41 +00:00
metadata:
name: aws-iam-authenticator
namespace: kube-system
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: aws-iam-authenticator
subjects:
- kind: ServiceAccount
name: aws-iam-authenticator
namespace: kube-system
---
apiVersion: v1
kind: ConfigMap
metadata:
namespace: kube-system
name: aws-iam-authenticator
labels:
k8s-app: aws-iam-authenticator
data:
config.yaml: |
clusterID: {{ .Values.global.clusterName }}
2021-01-04 14:56:41 +00:00
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
namespace: kube-system
name: aws-iam-authenticator
labels:
k8s-app: aws-iam-authenticator
annotations:
seccomp.security.alpha.kubernetes.io/pod: runtime/default
spec:
selector:
matchLabels:
k8s-app: aws-iam-authenticator
updateStrategy:
type: RollingUpdate
template:
metadata:
labels:
k8s-app: aws-iam-authenticator
spec:
priorityClassName: system-cluster-critical
2021-01-04 14:56:41 +00:00
# use service account with access to
serviceAccountName: aws-iam-authenticator
# run on the host network (don't depend on CNI)
hostNetwork: true
2021-12-01 12:33:11 +00:00
# run on each controller
2021-01-04 14:56:41 +00:00
nodeSelector:
2021-12-01 12:33:11 +00:00
node-role.kubernetes.io/control-plane: ""
2021-01-04 14:56:41 +00:00
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
2022-10-27 12:27:42 +00:00
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
2021-01-04 14:56:41 +00:00
containers:
- name: aws-iam-authenticator
image: public.ecr.aws/zero-downtime/aws-iam-authenticator:v0.5.11
2021-01-04 14:56:41 +00:00
args:
- server
- --backend-mode=CRD,MountedFile
- --config=/etc/aws-iam-authenticator/config.yaml
- --state-dir=/var/aws-iam-authenticator
- --kubeconfig-pregenerated=true
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
resources:
requests:
memory: 32Mi
2021-01-04 14:56:41 +00:00
cpu: 10m
limits:
memory: 64Mi
#cpu: 100m
2021-01-04 14:56:41 +00:00
volumeMounts:
- name: config
mountPath: /etc/aws-iam-authenticator/
- name: state
mountPath: /var/aws-iam-authenticator/
volumes:
- name: config
configMap:
name: aws-iam-authenticator
- name: state
2021-11-27 13:02:23 +00:00
secret:
secretName: aws-iam-certs
{{- end }}