--- # Source: polaris/templates/0-namespace.yaml apiVersion: v1 kind: Namespace metadata: name: polaris --- # Source: polaris/templates/webhook.secret.yaml # The name of this secret is static as it is populated by the webhook pod. apiVersion: v1 kind: Secret metadata: name: polaris-webhook namespace: polaris labels: app: polaris type: Opaque stringData: cert.pem: '' --- # Source: polaris/templates/rbac.yaml apiVersion: v1 kind: ServiceAccount metadata: name: polaris namespace: polaris labels: app: polaris --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: polaris-view labels: app: polaris roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: view subjects: - kind: ServiceAccount name: polaris namespace: polaris --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: name: polaris labels: app: polaris rules: # required by controller-runtime code doing a cluster wide lookup # when it seems namespace would suffice - apiGroups: - '' resources: - 'nodes' verbs: - 'get' - 'list' --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: polaris labels: app: polaris roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: polaris subjects: - kind: ServiceAccount name: polaris namespace: polaris --- # Source: polaris/templates/webhook.rbac.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: name: polaris-webhook labels: app: polaris rules: # required by controller-runtime code doing a cluster wide lookup # when it seems namespace would suffice - apiGroups: - '' resources: - 'secrets' - 'services' verbs: - 'get' - 'list' - 'watch' - apiGroups: - 'admissionregistration.k8s.io' resources: - 'validatingwebhookconfigurations' verbs: - '*' --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: polaris-webhook labels: app: polaris roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: polaris-webhook subjects: - kind: ServiceAccount name: polaris namespace: polaris --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: name: polaris-webhook namespace: polaris labels: app: polaris rules: # required for current controller-runtime bootstrap method - apiGroups: - '' resources: - 'secrets' - 'services' verbs: - '*' --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: name: polaris-webhook namespace: polaris labels: app: polaris roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: polaris-webhook subjects: - kind: ServiceAccount name: polaris namespace: polaris --- # Source: polaris/templates/webhook.service.yaml apiVersion: v1 kind: Service metadata: name: polaris-webhook namespace: polaris labels: app: polaris spec: ports: - name: webhook port: 443 protocol: TCP targetPort: 9876 selector: app: polaris component: webhook type: ClusterIP --- # Source: polaris/templates/webhook.deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: polaris-webhook namespace: polaris labels: app: polaris component: webhook spec: replicas: 1 selector: matchLabels: app: polaris component: webhook template: metadata: labels: app: polaris component: webhook spec: containers: - name: webhook command: - polaris - webhook image: 'quay.io/fairwinds/polaris:1' imagePullPolicy: 'Always' ports: - containerPort: 9876 # These are fairly useless readiness/liveness probes for now # Follow this issue for potential improvements: # https://github.com/kubernetes-sigs/controller-runtime/issues/356 livenessProbe: exec: command: - sh - -c - ps -ef | grep polaris initialDelaySeconds: 5 periodSeconds: 5 readinessProbe: exec: command: - sh - -c - ps -ef | grep polaris initialDelaySeconds: 5 periodSeconds: 5 resources: limits: cpu: 100m memory: 128Mi requests: cpu: 100m memory: 128Mi securityContext: allowPrivilegeEscalation: false privileged: false readOnlyRootFilesystem: true runAsNonRoot: true capabilities: drop: - ALL volumeMounts: - name: secret mountPath: /opt/cert/ readOnly: true - name: cr-logs mountPath: /tmp/ readOnly: false serviceAccountName: polaris nodeSelector: tolerations: volumes: - name: secret secret: secretName: polaris-webhook - name: cr-logs emptyDir: {} --- # Source: polaris/templates/audit.job.yaml --- # Source: polaris/templates/audit.rbac.yaml --- # Source: polaris/templates/configmap.yaml --- # Source: polaris/templates/dashboard.deployment.yaml --- # Source: polaris/templates/dashboard.service.yaml --- # Source: polaris/templates/ingress.yaml