# # Licensed to the Apache Software Foundation (ASF) under one # or more contributor license agreements. See the NOTICE file # distributed with this work for additional information # regarding copyright ownership. The ASF licenses this file # to you under the Apache License, Version 2.0 (the # "License"); you may not use this file except in compliance # with the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, # software distributed under the License is distributed on an # "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY # KIND, either express or implied. See the License for the # specific language governing permissions and limitations # under the License. # {{- if or .Values.components.functions .Values.extra.functionsAsPods }} apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: name: "{{ template "pulsar.fullname" . }}-{{ .Values.functions.component }}" rules: - apiGroups: [""] resources: - services - configmaps - pods verbs: - '*' - apiGroups: - apps resources: - statefulsets verbs: - '*' --- apiVersion: v1 kind: ServiceAccount metadata: name: "{{ template "pulsar.fullname" . }}-{{ .Values.functions.component }}" namespace: {{ template "pulsar.namespace" . }} --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: "{{ template "pulsar.fullname" . }}-{{ .Values.functions.component }}" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: "{{ template "pulsar.fullname" . }}-{{ .Values.functions.component }}" subjects: - kind: ServiceAccount name: "{{ template "pulsar.fullname" . }}-{{ .Values.functions.component }}" namespace: {{ template "pulsar.namespace" . }} {{- end }} {{- if and .Values.rbac.enabled .Values.rbac.psp }} --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: name: "{{ template "pulsar.fullname" . }}-{{ .Values.broker.component }}-psp" namespace: {{ template "pulsar.namespace" . }} rules: - apiGroups: - policy resourceNames: - "{{ template "pulsar.fullname" . }}-{{ .Values.broker.component }}" resources: - podsecuritypolicies verbs: - use --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: name: "{{ template "pulsar.fullname" . }}-{{ .Values.broker.component }}-psp" namespace: {{ template "pulsar.namespace" . }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: "{{ template "pulsar.fullname" . }}-{{ .Values.broker.component }}-psp" subjects: - kind: ServiceAccount name: "{{ template "pulsar.fullname" . }}-{{ .Values.broker.component }}-acct" namespace: {{ template "pulsar.namespace" . }} --- apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: "{{ template "pulsar.fullname" . }}-{{ .Values.broker.component }}" namespace: {{ template "pulsar.namespace" . }} spec: readOnlyRootFilesystem: false privileged: false allowPrivilegeEscalation: false runAsUser: rule: 'RunAsAny' supplementalGroups: ranges: - max: 65535 min: 1 rule: MustRunAs fsGroup: rule: 'MustRunAs' ranges: - min: 1 max: 65535 seLinux: rule: 'RunAsAny' volumes: - configMap - emptyDir - projected - secret - downwardAPI - persistentVolumeClaim {{- end}}