Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

charts/csm-authorization: Release v1.4.0 <Do not merge until RFD> #141

Closed
wants to merge 7 commits into from
4 changes: 2 additions & 2 deletions charts/csm-authorization/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
apiVersion: v2
name: csm-authorization
version: 1.3.0
appVersion: 1.3.0
version: 1.4.0
appVersion: 1.4.0
type: application
description: CSM for Authorization is part of the [Container Storage Modules](https://github.com/dell/csm) open source suite of Kubernetes storage enablers for Dell EMC storage products. CSM for Authorization provides storage and Kubernetes administrators the ability to apply RBAC for Dell CSI Drivers.
dependencies:
Expand Down
2 changes: 1 addition & 1 deletion charts/csm-authorization/policies/url.rego
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ allowlist = [
"POST /api/instances/Volume::[a-f0-9]+/action/removeVolume/"
]

default allow = false
default allow = true
allow {
regex.match(allowlist[_], sprintf("%s %s", [input.method, input.url]))
}
2 changes: 1 addition & 1 deletion charts/csm-authorization/templates/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ metadata:
name: powerscale-volumes-create
namespace: {{ .Release.Namespace }}
data:
{{- (.Files.Glob "policies/volumes-powerscale-create.rego").AsConfig | nindent 2 }}3
{{- (.Files.Glob "policies/volumes-powerscale-create.rego").AsConfig | nindent 2 }}
---
apiVersion: v1
kind: ConfigMap
Expand Down
2 changes: 1 addition & 1 deletion charts/csm-authorization/templates/proxy-server.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ roleRef:
apiGroup: rbac.authorization.k8s.io
subjects:
- kind: Group
name: system:serviceaccounts:karavi
name: system:serviceaccounts:{{ .Release.Namespace }}
apiGroup: rbac.authorization.k8s.io
---
apiVersion: apps/v1
Expand Down
24 changes: 12 additions & 12 deletions charts/csm-authorization/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,10 +11,10 @@ cert-manager:
authorization:
# images to use in installation
images:
proxyService: dellemc/csm-authorization-proxy:v1.3.0
tenantService: dellemc/csm-authorization-tenant:v1.3.0
roleService: dellemc/csm-authorization-role:v1.3.0
storageService: dellemc/csm-authorization-storage:v1.3.0
proxyService: dellemc/csm-authorization-proxy:v1.4.0
tenantService: dellemc/csm-authorization-tenant:v1.4.0
roleService: dellemc/csm-authorization-role:v1.4.0
storageService: dellemc/csm-authorization-storage:v1.4.0
opa: openpolicyagent/opa
opaKubeMgmt: openpolicyagent/kube-mgmt:0.11

Expand All @@ -35,7 +35,7 @@ authorization:

# proxy-server ingress configuration
proxyServerIngress:
ingressClassName: # nginx
ingressClassName: nginx

# additional host rules for the proxy-server ingress
hosts: []
Expand All @@ -46,15 +46,15 @@ authorization:

# tenant-service ingress configuration
tenantServiceIngress:
ingressClassName: # nginx
ingressClassName: nginx

# additional host rules for the tenant-service ingress
hosts: []

# additional annotations for the tenant-service ingress
# if applicable, an annotation supporting grpc for your ingress controller must be supplied
annotations: {}
# nginx.ingress.kubernetes.io/backend-protocol: "GRPC"
annotations:
nginx.ingress.kubernetes.io/backend-protocol: "GRPC"

# role-service ingress configuration
roleServiceIngress:
Expand All @@ -65,8 +65,8 @@ authorization:

# additional annotations for the role-service ingress
# an annotation supporting grpc for your ingress controller must be supplied, if applicable
annotations: {}
# nginx.ingress.kubernetes.io/backend-protocol: "GRPC"
annotations:
nginx.ingress.kubernetes.io/backend-protocol: "GRPC"

# storage-service ingress configuration
storageServiceIngress:
Expand All @@ -77,8 +77,8 @@ authorization:

# additional annotations for the storage-service ingress
# an annotation supporting grpc for your ingress controller must be supplied, if applicable
annotations: {}
# nginx.ingress.kubernetes.io/backend-protocol: "GRPC"
annotations:
nginx.ingress.kubernetes.io/backend-protocol: "GRPC"

redis:
images:
Expand Down