@@ -147,33 +147,6 @@ roleRef:
147147 apiGroup : rbac.authorization.k8s.io
148148
149149---
150- apiVersion : policy/v1beta1
151- kind : PodSecurityPolicy
152- metadata :
153- name : csi-gce-pd-node-psp
154- spec :
155- seLinux :
156- rule : RunAsAny
157- supplementalGroups :
158- rule : RunAsAny
159- runAsUser :
160- rule : RunAsAny
161- fsGroup :
162- rule : RunAsAny
163- privileged : true
164- volumes :
165- - ' *'
166- hostNetwork : true
167- allowedHostPaths :
168- - pathPrefix : " /var/lib/kubelet/plugins_registry/"
169- - pathPrefix : " /var/lib/kubelet"
170- - pathPrefix : " /var/lib/kubelet/plugins/pd.csi.storage.gke.io/"
171- - pathPrefix : " /dev"
172- - pathPrefix : " /etc/udev"
173- - pathPrefix : " /lib/udev"
174- - pathPrefix : " /run/udev"
175- - pathPrefix : " /sys"
176- ---
177150
178151kind : ClusterRole
179152apiVersion : rbac.authorization.k8s.io/v1
@@ -187,6 +160,18 @@ rules:
187160 - csi-gce-pd-node-psp
188161---
189162
163+ kind : ClusterRole
164+ apiVersion : rbac.authorization.k8s.io/v1
165+ metadata :
166+ name : csi-gce-pd-node-deploy-win
167+ rules :
168+ - apiGroups : ['policy']
169+ resources : ['podsecuritypolicies']
170+ verbs : ['use']
171+ resourceNames :
172+ - csi-gce-pd-node-psp-win
173+ ---
174+
190175apiVersion : rbac.authorization.k8s.io/v1
191176kind : ClusterRoleBinding
192177metadata :
@@ -196,9 +181,35 @@ roleRef:
196181 kind : ClusterRole
197182 name : csi-gce-pd-node-deploy
198183subjects :
184+ - kind : ServiceAccount
185+ name : csi-gce-pd-node-sa
186+ ---
187+
188+ apiVersion : rbac.authorization.k8s.io/v1
189+ kind : ClusterRoleBinding
190+ metadata :
191+ name : csi-gce-pd-node-win
192+ roleRef :
193+ apiGroup : rbac.authorization.k8s.io
194+ kind : ClusterRole
195+ name : csi-gce-pd-node-deploy-win
196+ subjects :
199197- kind : ServiceAccount
200198 name : csi-gce-pd-node-sa
201199
200+ ---
201+ apiVersion : rbac.authorization.k8s.io/v1
202+ kind : ClusterRoleBinding
203+ metadata :
204+ name : csi-gce-pd-controller
205+ roleRef :
206+ apiGroup : rbac.authorization.k8s.io
207+ kind : ClusterRole
208+ name : csi-gce-pd-node-deploy
209+ subjects :
210+ - kind : ServiceAccount
211+ name : csi-gce-pd-controller-sa
212+
202213---
203214apiVersion : rbac.authorization.k8s.io/v1
204215kind : ClusterRole
@@ -231,7 +242,6 @@ roleRef:
231242 kind : ClusterRole
232243 name : csi-gce-pd-snapshotter-role
233244 apiGroup : rbac.authorization.k8s.io
234-
235245---
236246
237247kind : Role
@@ -262,3 +272,4 @@ roleRef:
262272 kind : Role
263273 name : csi-gce-pd-leaderelection-role
264274 apiGroup : rbac.authorization.k8s.io
275+
0 commit comments