-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathdeploy.yaml
425 lines (425 loc) · 11.1 KB
/
deploy.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.8.0
creationTimestamp: null
name: imagekeys.security.nirmata.io
spec:
group: security.nirmata.io
names:
kind: ImageKey
listKind: ImageKeyList
plural: imagekeys
singular: imagekey
scope: Namespaced
versions:
- name: v1
schema:
openAPIV3Schema:
description: ImageKey is the Schema for the imagekeys API
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: ImageKeySpec defines the desired state of ImageKey
properties:
venafiPKCS11Config:
description: VenafiPKCS11Config contains the Venafi PKCS11 client configuration used to retrieve public keys.
properties:
additionalCertSecretName:
description: The resource name for a Secret in the current namespace that contains the additional trusted certificate to be configured in Venafi Trust Protection Platform (TPP) before obtaining the grant.
type: string
authURL:
description: The authentication URL for the Venafi Trust Protection Platform (TPP).
type: string
configMap:
description: A ConfigMap in which to store the label and retrieved public key. The label is used as the map key.
type: string
fetchType:
description: Whether to fetch the publickey or certificate corresponding to other Venafi Trust Protection Platform (TPP) parameters provided. Either key (default) or certificate.
type: string
hostAlias:
description: A host alias to access the Venafi Trust Protection Platform (TPP) system.
type: string
hsmURL:
description: The HSM URL for the Venafi Trust Protection Platform (TPP).
type: string
imagepullsecret:
description: Imagepullsecret to be used by venafi pod if any
type: string
interval:
description: The time interval in minutes to check for new or updated keys.
type: integer
keyfetchClientRegistry:
description: KeyfetchClientRegistry housing keyfetch client
type: string
label:
description: The label to use for fetching public keys from the Venafi Trust Protection Platform (TPP) environment.
type: string
passwordSecretName:
description: The resource name for a Secret in the current namespace that contains the password to access the Venafi Trust Protection Platform (TPP).
type: string
username:
description: The username to access the Venafi Trust Protection Platform (TPP).
type: string
required:
- authURL
- configMap
- hsmURL
- label
- passwordSecretName
- username
type: object
type: object
status:
description: ImageKeyStatus defines the observed state of ImageKey
properties:
venafiPKCS11Config:
description: VenafiPKCS11Config contains the Venafi PKCS11 client status
properties:
cronJob:
description: The name of the CronJob that
type: string
required:
- cronJob
type: object
type: object
type: object
served: true
storage: true
subresources:
status: {}
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: imagekey-controller
namespace: nirmata
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: imagekey-controller-leader-election-role
namespace: nirmata
rules:
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
creationTimestamp: null
name: imagekey-controller-manager-role
namespace: nirmata
rules:
- apiGroups:
- ""
resources:
- secrets
verbs:
- get
- list
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
name: imagekey-controller-manager-role
rules:
- apiGroups:
- batch
resources:
- cronjobs
- jobs
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- batch
resources:
- cronjobs/status
- jobs/status
verbs:
- get
- apiGroups:
- security.nirmata.io
resources:
- imagekeys
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- security.nirmata.io
resources:
- imagekeys/finalizers
verbs:
- update
- apiGroups:
- security.nirmata.io
resources:
- imagekeys/status
verbs:
- get
- patch
- update
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: imagekey-controller-metrics-reader
rules:
- nonResourceURLs:
- /metrics
verbs:
- get
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: imagekey-controller-proxy-role
rules:
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: imagekey-controller-leader-election-rolebinding
namespace: nirmata
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: imagekey-controller-leader-election-role
subjects:
- kind: ServiceAccount
name: imagekey-controller
namespace: nirmata
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imagekey-controller-manager-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: imagekey-controller-manager-role
subjects:
- kind: ServiceAccount
name: imagekey-controller
namespace: nirmata
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: imagekey-controller-proxy-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: imagekey-controller-proxy-role
subjects:
- kind: ServiceAccount
name: imagekey-controller
namespace: nirmata
---
apiVersion: v1
data:
controller_manager_config.yaml: |
apiVersion: controller-runtime.sigs.k8s.io/v1alpha1
kind: ControllerManagerConfig
health:
healthProbeBindAddress: :8081
metrics:
bindAddress: 127.0.0.1:8080
webhook:
port: 9443
leaderElection:
leaderElect: true
resourceName: abf84c06.nirmata.io
kind: ConfigMap
metadata:
name: imagekey-controller-manager-config
namespace: nirmata
---
apiVersion: v1
kind: Service
metadata:
labels:
control-plane: controller-manager
name: imagekey-controller-metrics-service
namespace: nirmata
spec:
ports:
- name: https
port: 8443
protocol: TCP
targetPort: https
selector:
control-plane: controller-manager
---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
control-plane: controller-manager
name: imagekey-controller
namespace: nirmata
spec:
replicas: 1
selector:
matchLabels:
app: imagekey-controller
app.kubernetes.io/instance: nirmata
app.kubernetes.io/name: nirmata
control-plane: controller-manager
nirmata.io/container.type: system
template:
metadata:
annotations:
kubectl.kubernetes.io/default-container: manager
labels:
app: imagekey-controller
app.kubernetes.io/instance: nirmata
app.kubernetes.io/name: nirmata
control-plane: controller-manager
nirmata.io/container.type: system
spec:
containers:
- args:
- --secure-listen-address=0.0.0.0:8443
- --upstream=http://127.0.0.1:8080/
- --logtostderr=true
- --v=0
image: gcr.io/kubebuilder/kube-rbac-proxy:v0.8.0
livenessProbe:
failureThreshold: 3
initialDelaySeconds: 15
periodSeconds: 600
successThreshold: 1
tcpSocket:
port: 8443
timeoutSeconds: 5
name: kube-rbac-proxy
ports:
- containerPort: 8443
name: https
protocol: TCP
readinessProbe:
failureThreshold: 3
initialDelaySeconds: 5
periodSeconds: 600
successThreshold: 1
tcpSocket:
port: 8443
timeoutSeconds: 5
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 5m
memory: 64Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
- args:
- --health-probe-bind-address=:8081
- --metrics-bind-address=127.0.0.1:8080
command:
- /manager
image: ghcr.io/nirmata/nirmata-imagekey-controller:0.2.1
imagePullPolicy: Always
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 15
periodSeconds: 20
name: manager
readinessProbe:
httpGet:
path: /readyz
port: 8081
initialDelaySeconds: 5
periodSeconds: 10
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 10m
memory: 64Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
securityContext:
runAsNonRoot: true
serviceAccountName: imagekey-controller
terminationGracePeriodSeconds: 10