From 4940debe14937dd808827506ef411a40dce5ed69 Mon Sep 17 00:00:00 2001 From: Patrick Ohly Date: Sun, 21 Oct 2018 14:40:58 +0200 Subject: [PATCH] deploy: split out RBAC, fix leadership election permissions The RBAC definitions were not updated when introducing leadership election, which depends on the permission to modify endpoints in the current namespace. Having the RBAC definition in a separate file makes them usable as-is elsewhere without manual editing, for example in kubernetes/e2e. --- deploy/kubernetes/rbac.yaml | 89 ++++++++++++++++++++++++++++++ deploy/kubernetes/statefulset.yaml | 50 +---------------- 2 files changed, 92 insertions(+), 47 deletions(-) create mode 100644 deploy/kubernetes/rbac.yaml diff --git a/deploy/kubernetes/rbac.yaml b/deploy/kubernetes/rbac.yaml new file mode 100644 index 0000000000..5d46d34bdc --- /dev/null +++ b/deploy/kubernetes/rbac.yaml @@ -0,0 +1,89 @@ +# This YAML file contains all RBAC objects that are necessary to run external +# CSI provisioner. +# +# In production, each CSI driver deployment has to be customized: +# - to avoid conflicts, use non-default namespace and different names +# for non-namespaced entities like the ClusterRole +# - decide whether the deployment replicates the external CSI +# provisioner, in which case leadership election must be enabled; +# this influences the RBAC setup, see below + +apiVersion: v1 +kind: ServiceAccount +metadata: + name: csi-provisioner + # replace with non-default namespace name + namespace: default + +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: external-provisioner-runner +rules: + - apiGroups: [""] + resources: ["secrets"] + verbs: ["get", "list"] + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + - apiGroups: ["snapshot.storage.k8s.io"] + resources: ["volumesnapshots"] + verbs: ["get", "list"] + - apiGroups: ["snapshot.storage.k8s.io"] + resources: ["volumesnapshotcontents"] + verbs: ["get", "list"] + +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-provisioner-role +subjects: + - kind: ServiceAccount + name: csi-provisioner + # replace with non-default namespace name + namespace: default +roleRef: + kind: ClusterRole + name: external-provisioner-runner + apiGroup: rbac.authorization.k8s.io + +--- +# Provisioner must be able to work with endpoints in current namespace +# if (and only if) leadership election is enabled +kind: Role +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + # replace with non-default namespace name + namespace: default + name: external-provisioner-cfg +rules: +- apiGroups: [""] + resources: ["endpoints"] + verbs: ["get", "watch", "list", "delete", "update", "create"] + +--- +kind: RoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: csi-provisioner-role-cfg + # replace with non-default namespace name + namespace: default +subjects: + - kind: ServiceAccount + name: csi-provisioner + # replace with non-default namespace name + namespace: default +roleRef: + kind: Role + name: external-provisioner-cfg diff --git a/deploy/kubernetes/statefulset.yaml b/deploy/kubernetes/statefulset.yaml index 993ed1e60d..6d41ae1a4d 100644 --- a/deploy/kubernetes/statefulset.yaml +++ b/deploy/kubernetes/statefulset.yaml @@ -1,49 +1,6 @@ -# This YAML file contains all API objects that are necessary to run external -# CSI provisioner. -# -# In production, this needs to be in separate files, e.g. service account and -# role and role binding needs to be created once, while stateful set may -# require some tuning. -# -# In addition, mock CSI driver is hardcoded as the CSI driver. - -apiVersion: v1 -kind: ServiceAccount -metadata: - name: csi-provisioner - ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: external-provisioner-runner -rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - name: csi-provisioner-role -subjects: - - kind: ServiceAccount - name: csi-provisioner - namespace: default -roleRef: - kind: ClusterRole - name: external-provisioner-runner - apiGroup: rbac.authorization.k8s.io +# This YAML file demonstrates how to deploy the external +# provisioner for use with the mock CSI driver. It +# depends on the RBAC definitions from rbac.yaml. --- kind: Service @@ -98,4 +55,3 @@ spec: volumes: - name: socket-dir emptyDir: -