* INFRA-2881 | Ashvin | Remove EFS flag from manifest and jsonnetfmt the directory * INFRA-2881 | Ashvin | Support multiple EFS volumes * INFRA-2881 | Ashvin | Add null field check and fix tests * INFRA-2881 | Ashvin | Add EFS jsonschema for validation * INFRA-2881 | Ashvin | Extract EFS required condition in a variable
28 lines
1.2 KiB
Jsonnet
28 lines
1.2 KiB
Jsonnet
local chart = import 'chart.jsonnet';
|
|
local common = import 'common.jsonnet';
|
|
local deployment_manifest = import 'deployment_manifest.jsonnet';
|
|
local namespace = deployment_manifest.flink.namespace;
|
|
local namespace_values = import 'namespace_values.jsonnet';
|
|
local util = import 'util.jsonnet';
|
|
local needsAWSAccess = if util.is_field_present(deployment_manifest.extraResources, 'aws_access')
|
|
&& util.is_field_present(deployment_manifest.extraResources.aws_access, 'policies')
|
|
&& std.length(deployment_manifest.extraResources.aws_access.policies) > 0 then true else false;
|
|
|
|
local roleName = chart.full_service_name(deployment_manifest.name) + '-' + deployment_manifest.environment;
|
|
|
|
|
|
{
|
|
apiVersion: 'v1',
|
|
kind: 'ServiceAccount',
|
|
metadata: ({
|
|
name: roleName,
|
|
namespace: namespace,
|
|
labels: common.labels,
|
|
[if !namespace_values.zalandoEnabled then 'annotations' else null]: {
|
|
'eks.amazonaws.com/role-arn': 'arn:aws:iam::' + namespace_values.awsAccountId + ':role/' + roleName,
|
|
'eks.amazonaws.com/sts-regional-endpoints': 'true',
|
|
'eks.amazonaws.com/token-expiration': '10800',
|
|
},
|
|
}),
|
|
}
|