@@ -35,3 +35,43 @@ subjects:
35
35
- kind : ServiceAccount
36
36
name : {{ include "harvester-node-disk-manager.name" . }}
37
37
namespace : {{ .Release.Namespace }}
38
+ ---
39
+ apiVersion : v1
40
+ kind : ServiceAccount
41
+ metadata :
42
+ name : harvester-node-disk-manager-webhook
43
+ namespace : {{ .Release.Namespace }}
44
+ ---
45
+ apiVersion : rbac.authorization.k8s.io/v1
46
+ kind : ClusterRole
47
+ metadata :
48
+ name : harvester-node-disk-manager-webhook
49
+ rules :
50
+ - apiGroups : [ "" ]
51
+ resources : [ "secrets", "configmaps" ]
52
+ verbs : [ "*" ]
53
+ - apiGroups : [ "harvesterhci.io" ]
54
+ resources : [ "blockdevices" ]
55
+ verbs : [ "*" ]
56
+ - apiGroups : [ "apiregistration.k8s.io" ]
57
+ resources : [ "apiservices" ]
58
+ verbs : [ "get", "watch", "list" ]
59
+ - apiGroups : [ "apiextensions.k8s.io" ]
60
+ resources : [ "customresourcedefinitions" ]
61
+ verbs : [ "get", "watch", "list" ]
62
+ - apiGroups : [ "admissionregistration.k8s.io" ]
63
+ resources : [ "validatingwebhookconfigurations", "mutatingwebhookconfigurations" ]
64
+ verbs : [ "*" ]
65
+ ---
66
+ apiVersion : rbac.authorization.k8s.io/v1
67
+ kind : ClusterRoleBinding
68
+ metadata :
69
+ name : harvester-node-disk-manager-webhook
70
+ roleRef :
71
+ apiGroup : rbac.authorization.k8s.io
72
+ kind : ClusterRole
73
+ name : harvester-node-disk-manager-webhook
74
+ subjects :
75
+ - kind : ServiceAccount
76
+ name : harvester-node-disk-manager-webhook
77
+ namespace : {{ .Release.Namespace }}
0 commit comments