diff --git a/sealed-secrets/controller.yaml b/sealed-secrets/controller.yaml index 0f302cd..cc02289 100644 --- a/sealed-secrets/controller.yaml +++ b/sealed-secrets/controller.yaml @@ -1,73 +1,67 @@ --- -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - annotations: {} - labels: - name: sealed-secrets-service-proxier - name: sealed-secrets-service-proxier - namespace: sealed-secrets -rules: -- apiGroups: - - "" - resourceNames: - - 'http:sealed-secrets-controller:' - - sealed-secrets-controller - resources: - - services/proxy - verbs: - - create - - get ---- -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - annotations: {} - labels: - name: sealed-secrets-key-admin - name: sealed-secrets-key-admin - namespace: sealed-secrets -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - list ---- -apiVersion: v1 -kind: Service +apiVersion: apps/v1 +kind: Deployment metadata: annotations: {} labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: sealed-secrets + namespace: kube-system spec: - ports: - - port: 8080 - targetPort: 8080 + minReadySeconds: 30 + replicas: 1 + revisionHistoryLimit: 10 selector: - name: sealed-secrets-controller - type: ClusterIP ---- -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - annotations: {} - labels: - name: sealed-secrets-service-proxier - name: sealed-secrets-service-proxier - namespace: sealed-secrets -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: sealed-secrets-service-proxier -subjects: -- apiGroup: rbac.authorization.k8s.io - kind: Group - name: system:authenticated + matchLabels: + name: sealed-secrets-controller + strategy: + rollingUpdate: + maxSurge: 25% + maxUnavailable: 25% + type: RollingUpdate + template: + metadata: + annotations: {} + labels: + name: sealed-secrets-controller + spec: + containers: + - args: [] + command: + - controller + env: [] + image: quay.io/bitnami/sealed-secrets-controller:v0.17.1 + imagePullPolicy: Always + livenessProbe: + httpGet: + path: /healthz + port: http + name: sealed-secrets-controller + ports: + - containerPort: 8080 + name: http + readinessProbe: + httpGet: + path: /healthz + port: http + securityContext: + readOnlyRootFilesystem: true + runAsNonRoot: true + runAsUser: 1001 + stdin: false + tty: false + volumeMounts: + - mountPath: /tmp + name: tmp + imagePullSecrets: [] + initContainers: [] + securityContext: + fsGroup: 65534 + serviceAccountName: sealed-secrets-controller + terminationGracePeriodSeconds: 30 + volumes: + - emptyDir: {} + name: tmp --- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition @@ -97,14 +91,67 @@ spec: subresources: status: {} --- -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: v1 +kind: Service +metadata: + annotations: {} + labels: + name: sealed-secrets-controller + name: sealed-secrets-controller + namespace: kube-system +spec: + ports: + - port: 8080 + targetPort: 8080 + selector: + name: sealed-secrets-controller + type: ClusterIP +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + annotations: {} + labels: + name: sealed-secrets-service-proxier + name: sealed-secrets-service-proxier + namespace: kube-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: sealed-secrets-service-proxier +subjects: +- apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:authenticated +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + annotations: {} + labels: + name: sealed-secrets-service-proxier + name: sealed-secrets-service-proxier + namespace: kube-system +rules: +- apiGroups: + - "" + resourceNames: + - 'http:sealed-secrets-controller:' + - sealed-secrets-controller + resources: + - services/proxy + verbs: + - create + - get +--- +apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: {} labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: sealed-secrets + namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role @@ -112,25 +159,35 @@ roleRef: subjects: - kind: ServiceAccount name: sealed-secrets-controller - namespace: sealed-secrets + namespace: kube-system --- -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + annotations: {} + labels: + name: sealed-secrets-key-admin + name: sealed-secrets-key-admin + namespace: kube-system +rules: +- apiGroups: + - "" + resources: + - secrets + verbs: + - create + - list +--- +apiVersion: v1 +kind: ServiceAccount metadata: annotations: {} labels: name: sealed-secrets-controller name: sealed-secrets-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: secrets-unsealer -subjects: -- kind: ServiceAccount - name: sealed-secrets-controller - namespace: sealed-secrets + namespace: kube-system --- -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: {} @@ -169,76 +226,18 @@ rules: - create - patch --- -apiVersion: v1 -kind: ServiceAccount +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding metadata: annotations: {} labels: name: sealed-secrets-controller name: sealed-secrets-controller - namespace: sealed-secrets ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: {} - labels: - name: sealed-secrets-controller +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: secrets-unsealer +subjects: +- kind: ServiceAccount name: sealed-secrets-controller - namespace: sealed-secrets -spec: - minReadySeconds: 30 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - name: sealed-secrets-controller - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: {} - labels: - name: sealed-secrets-controller - spec: - containers: - - args: - - --update-status - command: - - controller - env: [] - image: quay.io/bitnami/sealed-secrets-controller:v0.17.1 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /healthz - port: http - name: sealed-secrets-controller - ports: - - containerPort: 8080 - name: http - readinessProbe: - httpGet: - path: /healthz - port: http - securityContext: - readOnlyRootFilesystem: true - runAsNonRoot: true - runAsUser: 1001 - stdin: false - tty: false - volumeMounts: - - mountPath: /tmp - name: tmp - imagePullSecrets: [] - initContainers: [] - securityContext: - fsGroup: 65534 - serviceAccountName: sealed-secrets-controller - terminationGracePeriodSeconds: 30 - volumes: - - emptyDir: {} - name: tmp + namespace: kube-system