Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions config/rbac/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,6 @@ resources:
- role_binding.yaml
- leader_election_role.yaml
- leader_election_role_binding.yaml
- task_submitter_role.yaml
- task_submitter_role_binding.yaml
- rbac_proxy_role.yaml
11 changes: 11 additions & 0 deletions config/rbac/rbac_proxy_role.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: rbac-proxy
rules:
- apiGroups: ["authentication.k8s.io"]
resources: ["tokenreviews"]
verbs: ["create"]
- apiGroups: ["authorization.k8s.io"]
resources: ["subjectaccessreviews"]
verbs: ["create"]
8 changes: 8 additions & 0 deletions config/rbac/task_submitter_role.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: validator-task-submitter
rules:
- apiGroups: ["sei.io"]
resources: ["seinodetasks"]
verbs: ["create", "get"]
8 changes: 1 addition & 7 deletions config/rbac/task_submitter_role_binding.yaml
Original file line number Diff line number Diff line change
@@ -1,9 +1,3 @@
# Binds the controller SA to sei-validator-task-submitter so the
# controller can submit sidecar tasks via kube-rbac-proxy in TLS mode.
# Cluster-wide grant — assumes the controller is the single trust
# authority for all SeiNodes in the cluster. Multi-tenant deployments
# (operators-other-than-platform creating SeiNodes) require a
# different scoping model; see #224 follow-ups.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
Expand All @@ -14,7 +8,7 @@ metadata:
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: sei-validator-task-submitter
name: validator-task-submitter
subjects:
- kind: ServiceAccount
name: controller-manager
Expand Down
25 changes: 0 additions & 25 deletions manifests/rbac/rbac-proxy-clusterrole.yaml

This file was deleted.

21 changes: 0 additions & 21 deletions manifests/rbac/task-submitter-clusterrole.yaml

This file was deleted.

8 changes: 2 additions & 6 deletions manifests/samples/clusterrolebinding-rbac-proxy.yaml
Original file line number Diff line number Diff line change
@@ -1,16 +1,12 @@
# Example binding for the kube-rbac-proxy ClusterRole. Substitute the
# ServiceAccount name and namespace for the deployment running SeiNode
# pods (this is the same SA the seictl sidecar container uses — see
# platform.Config.ServiceAccount).
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: sei-rbac-proxy
name: sei-k8s-rbac-proxy
subjects:
- kind: ServiceAccount
name: <seinode-service-account>
namespace: <seinode-namespace>
roleRef:
kind: ClusterRole
name: sei-rbac-proxy
name: sei-k8s-rbac-proxy
apiGroup: rbac.authorization.k8s.io
7 changes: 1 addition & 6 deletions manifests/samples/clusterrolebinding-task-submitter.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,3 @@
# Example binding for the sei-validator-task-submitter ClusterRole —
# grants a human-operator group access to submit sidecar tasks. The
# controller SA itself is bound automatically via the kustomize chart
# (config/rbac/task_submitter_role_binding.yaml); only third-party
# identities need their own bindings.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
Expand All @@ -13,5 +8,5 @@ subjects:
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: sei-validator-task-submitter
name: sei-k8s-validator-task-submitter
apiGroup: rbac.authorization.k8s.io
Loading