mirror of
https://github.com/kubernetes-sigs/node-feature-discovery.git
synced 2025-03-31 04:04:51 +00:00
Signed-off-by: Mac Chaffee <me@macchaffee.com> This commit creates a separate ServiceAccount for the nfd-worker like the other components. Even though the nfd-worker doesn't need any special RBAC permissions, this feature is useful for nvidia/gpu-operator (a downstream project) which supports PodSecurityPolicies. But since nfd-worker doesn't have its own ServiceAccount, they've bolted on this feature into their fork, which is giving them issues. PodSecurityPolicies are used to grant special permission to nfd-worker to create hostPath volumes.
34 lines
1.1 KiB
YAML
34 lines
1.1 KiB
YAML
{{- if .Values.master.rbac.create }}
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: {{ include "node-feature-discovery.fullname" . }}
|
|
labels:
|
|
{{- include "node-feature-discovery.labels" . | nindent 4 }}
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: {{ include "node-feature-discovery.fullname" . }}
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: {{ include "node-feature-discovery.master.serviceAccountName" . }}
|
|
namespace: {{ $.Release.Namespace }}
|
|
{{- end }}
|
|
|
|
---
|
|
{{- if .Values.topologyUpdater.rbac.create }}
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: {{ include "node-feature-discovery.fullname" . }}-topology-updater
|
|
labels:
|
|
{{- include "node-feature-discovery.labels" . | nindent 4 }}
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: {{ include "node-feature-discovery.fullname" . }}-topology-updater
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: {{ include "node-feature-discovery.topologyUpdater.serviceAccountName" . }}
|
|
namespace: {{ $.Release.Namespace }}
|
|
{{- end }}
|