Skip to content

Commit

Permalink
try to just mirror by host not labels - not working yet (see TODO)
Browse files Browse the repository at this point in the history
  • Loading branch information
ryandawsonuk authored and seldondev committed Nov 15, 2019
1 parent 30a6ab6 commit 3520904
Show file tree
Hide file tree
Showing 27 changed files with 921 additions and 2,364 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -2,19 +2,12 @@
apiVersion: certmanager.k8s.io/v1alpha1
kind: Certificate
metadata:
labels:
app: seldon
app.kubernetes.io/instance: '{{ .Release.Name }}'
app.kubernetes.io/name: '{{ include "seldon.name" . }}'
app.kubernetes.io/version: '{{ .Chart.Version }}'
labels: {app: seldon, app.kubernetes.io/instance: '{{ .Release.Name }}', app.kubernetes.io/name: '{{ include "seldon.name" . }}', app.kubernetes.io/version: '{{ .Chart.Version }}'}
name: seldon-serving-cert
namespace: '{{ .Release.Namespace }}'
spec:
commonName: '{{- printf "seldon-webhook-service.%s.svc" .Release.Namespace -}}'
dnsNames:
- '{{- printf "seldon-webhook-service.%s.svc.cluster.local" .Release.Namespace -}}'
issuerRef:
kind: Issuer
name: seldon-selfsigned-issuer
dnsNames: ['{{- printf "seldon-webhook-service.%s.svc.cluster.local" .Release.Namespace -}}']
issuerRef: {kind: Issuer, name: seldon-selfsigned-issuer}
secretName: seldon-webhook-server-cert
{{- end }}
Original file line number Diff line number Diff line change
Expand Up @@ -3,151 +3,49 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
app: seldon
app.kubernetes.io/instance: '{{ .Release.Name }}'
app.kubernetes.io/name: '{{ include "seldon.name" . }}'
app.kubernetes.io/version: '{{ .Chart.Version }}'
labels: {app: seldon, app.kubernetes.io/instance: '{{ .Release.Name }}', app.kubernetes.io/name: '{{ include "seldon.name" . }}', app.kubernetes.io/version: '{{ .Chart.Version }}'}
name: seldon-manager-role
rules:
- apiGroups:
- ''
resources:
- services
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- apps
resources:
- deployments
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- apps
resources:
- deployments/status
verbs:
- get
- patch
- update
- apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers/status
verbs:
- get
- patch
- update
- apiGroups:
- machinelearning.seldon.io
resources:
- seldondeployments
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- machinelearning.seldon.io
resources:
- seldondeployments/finalizers
verbs:
- get
- patch
- update
- apiGroups:
- machinelearning.seldon.io
resources:
- seldondeployments/status
verbs:
- get
- patch
- update
- apiGroups:
- networking.istio.io
resources:
- destinationrules
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- networking.istio.io
resources:
- destinationrules/status
verbs:
- get
- patch
- update
- apiGroups:
- networking.istio.io
resources:
- virtualservices
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- networking.istio.io
resources:
- virtualservices/status
verbs:
- get
- patch
- update
- apiGroups:
- v1
resources:
- services
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- v1
resources:
- services/status
verbs:
- get
- patch
- update
- apiGroups: ['']
resources: [services]
verbs: [create, delete, get, list, patch, update, watch]
- apiGroups: [apps]
resources: [deployments]
verbs: [create, delete, get, list, patch, update, watch]
- apiGroups: [apps]
resources: [deployments/status]
verbs: [get, patch, update]
- apiGroups: [autoscaling]
resources: [horizontalpodautoscalers]
verbs: [create, delete, get, list, patch, update, watch]
- apiGroups: [autoscaling]
resources: [horizontalpodautoscalers/status]
verbs: [get, patch, update]
- apiGroups: [machinelearning.seldon.io]
resources: [seldondeployments]
verbs: [create, delete, get, list, patch, update, watch]
- apiGroups: [machinelearning.seldon.io]
resources: [seldondeployments/finalizers]
verbs: [get, patch, update]
- apiGroups: [machinelearning.seldon.io]
resources: [seldondeployments/status]
verbs: [get, patch, update]
- apiGroups: [networking.istio.io]
resources: [destinationrules]
verbs: [create, delete, get, list, patch, update, watch]
- apiGroups: [networking.istio.io]
resources: [destinationrules/status]
verbs: [get, patch, update]
- apiGroups: [networking.istio.io]
resources: [virtualservices]
verbs: [create, delete, get, list, patch, update, watch]
- apiGroups: [networking.istio.io]
resources: [virtualservices/status]
verbs: [get, patch, update]
- apiGroups: [v1]
resources: [services]
verbs: [create, delete, get, list, patch, update, watch]
- apiGroups: [v1]
resources: [services/status]
verbs: [get, patch, update]
{{- end }}
Original file line number Diff line number Diff line change
Expand Up @@ -4,28 +4,14 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
app: seldon
app.kubernetes.io/instance: '{{ .Release.Name }}'
app.kubernetes.io/name: '{{ include "seldon.name" . }}'
app.kubernetes.io/version: '{{ .Chart.Version }}'
labels: {app: seldon, app.kubernetes.io/instance: '{{ .Release.Name }}', app.kubernetes.io/name: '{{ include "seldon.name" . }}', app.kubernetes.io/version: '{{ .Chart.Version }}'}
name: seldon-manager-sas-role
rules:
- apiGroups:
- ''
resources:
- secrets
verbs:
- get
- list
- watch
- apiGroups:
- ''
resources:
- serviceaccounts
verbs:
- get
- list
- watch
- apiGroups: ['']
resources: [secrets]
verbs: [get, list, watch]
- apiGroups: ['']
resources: [serviceaccounts]
verbs: [get, list, watch]
{{- end }}
{{- end }}
Original file line number Diff line number Diff line change
@@ -1,22 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app: seldon
app.kubernetes.io/instance: '{{ .Release.Name }}'
app.kubernetes.io/name: '{{ include "seldon.name" . }}'
app.kubernetes.io/version: '{{ .Chart.Version }}'
labels: {app: seldon, app.kubernetes.io/instance: '{{ .Release.Name }}', app.kubernetes.io/name: '{{ include "seldon.name" . }}', app.kubernetes.io/version: '{{ .Chart.Version }}'}
name: seldon-proxy-role
rules:
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create
- apiGroups: [authentication.k8s.io]
resources: [tokenreviews]
verbs: [create]
- apiGroups: [authorization.k8s.io]
resources: [subjectaccessreviews]
verbs: [create]
Original file line number Diff line number Diff line change
@@ -1,13 +1,9 @@
{{- if .Values.usageMetrics.enabled }}
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: seldon-spartakus-volunteer
metadata: {name: seldon-spartakus-volunteer}
rules:
- apiGroups:
- ''
resources:
- nodes
verbs:
- list
- apiGroups: ['']
resources: [nodes]
verbs: [list]
{{- end }}
Original file line number Diff line number Diff line change
Expand Up @@ -2,18 +2,9 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
app: seldon
app.kubernetes.io/instance: '{{ .Release.Name }}'
app.kubernetes.io/name: '{{ include "seldon.name" . }}'
app.kubernetes.io/version: '{{ .Chart.Version }}'
labels: {app: seldon, app.kubernetes.io/instance: '{{ .Release.Name }}', app.kubernetes.io/name: '{{ include "seldon.name" . }}', app.kubernetes.io/version: '{{ .Chart.Version }}'}
name: seldon-manager-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: seldon-manager-role
roleRef: {apiGroup: rbac.authorization.k8s.io, kind: ClusterRole, name: seldon-manager-role}
subjects:
- kind: ServiceAccount
name: '{{ .Values.serviceAccount.name }}'
namespace: '{{ .Release.Namespace }}'
- {kind: ServiceAccount, name: '{{ .Values.serviceAccount.name }}', namespace: '{{ .Release.Namespace }}'}
{{- end }}
Original file line number Diff line number Diff line change
Expand Up @@ -3,19 +3,10 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
app: seldon
app.kubernetes.io/instance: '{{ .Release.Name }}'
app.kubernetes.io/name: '{{ include "seldon.name" . }}'
app.kubernetes.io/version: '{{ .Chart.Version }}'
labels: {app: seldon, app.kubernetes.io/instance: '{{ .Release.Name }}', app.kubernetes.io/name: '{{ include "seldon.name" . }}', app.kubernetes.io/version: '{{ .Chart.Version }}'}
name: seldon-manager-sas-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: seldon-manager-sas-role
roleRef: {apiGroup: rbac.authorization.k8s.io, kind: ClusterRole, name: seldon-manager-sas-role}
subjects:
- kind: ServiceAccount
name: seldon-manager
namespace: '{{ .Release.Namespace }}'
- {kind: ServiceAccount, name: seldon-manager, namespace: '{{ .Release.Namespace }}'}
{{- end }}
{{- end }}
Original file line number Diff line number Diff line change
@@ -1,17 +1,8 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
app: seldon
app.kubernetes.io/instance: '{{ .Release.Name }}'
app.kubernetes.io/name: '{{ include "seldon.name" . }}'
app.kubernetes.io/version: '{{ .Chart.Version }}'
labels: {app: seldon, app.kubernetes.io/instance: '{{ .Release.Name }}', app.kubernetes.io/name: '{{ include "seldon.name" . }}', app.kubernetes.io/version: '{{ .Chart.Version }}'}
name: seldon-proxy-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: seldon-proxy-role
roleRef: {apiGroup: rbac.authorization.k8s.io, kind: ClusterRole, name: seldon-proxy-role}
subjects:
- kind: ServiceAccount
name: default
namespace: '{{ .Release.Namespace }}'
- {kind: ServiceAccount, name: default, namespace: '{{ .Release.Namespace }}'}
Original file line number Diff line number Diff line change
@@ -1,14 +1,8 @@
{{- if .Values.usageMetrics.enabled }}
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: seldon-spartakus-volunteer
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: seldon-spartakus-volunteer
metadata: {name: seldon-spartakus-volunteer}
roleRef: {apiGroup: rbac.authorization.k8s.io, kind: ClusterRole, name: seldon-spartakus-volunteer}
subjects:
- kind: ServiceAccount
name: seldon-spartakus-volunteer
namespace: kube-system
- {kind: ServiceAccount, name: seldon-spartakus-volunteer, namespace: kube-system}
{{- end }}
Loading

0 comments on commit 3520904

Please sign in to comment.