File tree Expand file tree Collapse file tree 4 files changed +123
-37
lines changed
defaults/defaults/defaults
openshift/openshift/openshift Expand file tree Collapse file tree 4 files changed +123
-37
lines changed Original file line number Diff line number Diff line change @@ -76,19 +76,6 @@ local cluster = function(name, options)
76
76
'watch' ,
77
77
],
78
78
},
79
- {
80
- apiGroups: [
81
- 'networking.k8s.io' ,
82
- ],
83
- resources: [
84
- 'ingressclasses' ,
85
- ],
86
- verbs: [
87
- 'get' ,
88
- 'list' ,
89
- 'watch' ,
90
- ],
91
- },
92
79
{
93
80
apiGroups: [
94
81
'apps' ,
@@ -127,6 +114,28 @@ local cluster = function(name, options)
127
114
roleRef_: role,
128
115
};
129
116
117
+ local clusterRole = kube.ClusterRole('syn-vcluster-%s' % [ name ]) {
118
+ rules: [
119
+ {
120
+ apiGroups: [
121
+ 'networking.k8s.io' ,
122
+ ],
123
+ resources: [
124
+ 'ingressclasses' ,
125
+ ],
126
+ verbs: [
127
+ 'get' ,
128
+ 'list' ,
129
+ 'watch' ,
130
+ ],
131
+ },
132
+ ],
133
+ };
134
+ local clusterRoleBinding = kube.ClusterRoleBinding('syn-vcluster-%s' % [ name ]) {
135
+ subjects_: [ sa ],
136
+ roleRef_: clusterRole,
137
+ };
138
+
130
139
local service = kube.Service(name) {
131
140
metadata+: {
132
141
namespace: options.namespace,
@@ -408,6 +417,8 @@ local cluster = function(name, options)
408
417
sa,
409
418
role,
410
419
roleBinding,
420
+ clusterRole,
421
+ clusterRoleBinding,
411
422
service,
412
423
headlessService,
413
424
statefulSet,
Original file line number Diff line number Diff line change @@ -57,14 +57,6 @@ rules:
57
57
- get
58
58
- list
59
59
- watch
60
- - apiGroups :
61
- - networking.k8s.io
62
- resources :
63
- - ingressclasses
64
- verbs :
65
- - get
66
- - list
67
- - watch
68
60
- apiGroups :
69
61
- apps
70
62
resources :
@@ -93,6 +85,39 @@ subjects:
93
85
name : vc-defaults
94
86
namespace : syn-defaults
95
87
---
88
+ apiVersion : rbac.authorization.k8s.io/v1
89
+ kind : ClusterRole
90
+ metadata :
91
+ annotations : {}
92
+ labels :
93
+ name : syn-vcluster-defaults
94
+ name : syn-vcluster-defaults
95
+ rules :
96
+ - apiGroups :
97
+ - networking.k8s.io
98
+ resources :
99
+ - ingressclasses
100
+ verbs :
101
+ - get
102
+ - list
103
+ - watch
104
+ ---
105
+ apiVersion : rbac.authorization.k8s.io/v1
106
+ kind : ClusterRoleBinding
107
+ metadata :
108
+ annotations : {}
109
+ labels :
110
+ name : syn-vcluster-defaults
111
+ name : syn-vcluster-defaults
112
+ roleRef :
113
+ apiGroup : rbac.authorization.k8s.io
114
+ kind : ClusterRole
115
+ name : syn-vcluster-defaults
116
+ subjects :
117
+ - kind : ServiceAccount
118
+ name : vc-defaults
119
+ namespace : syn-defaults
120
+ ---
96
121
apiVersion : v1
97
122
kind : Service
98
123
metadata :
Original file line number Diff line number Diff line change @@ -57,14 +57,6 @@ rules:
57
57
- get
58
58
- list
59
59
- watch
60
- - apiGroups :
61
- - networking.k8s.io
62
- resources :
63
- - ingressclasses
64
- verbs :
65
- - get
66
- - list
67
- - watch
68
60
- apiGroups :
69
61
- apps
70
62
resources :
@@ -93,6 +85,39 @@ subjects:
93
85
name : vc-oidc
94
86
namespace : testns
95
87
---
88
+ apiVersion : rbac.authorization.k8s.io/v1
89
+ kind : ClusterRole
90
+ metadata :
91
+ annotations : {}
92
+ labels :
93
+ name : syn-vcluster-oidc
94
+ name : syn-vcluster-oidc
95
+ rules :
96
+ - apiGroups :
97
+ - networking.k8s.io
98
+ resources :
99
+ - ingressclasses
100
+ verbs :
101
+ - get
102
+ - list
103
+ - watch
104
+ ---
105
+ apiVersion : rbac.authorization.k8s.io/v1
106
+ kind : ClusterRoleBinding
107
+ metadata :
108
+ annotations : {}
109
+ labels :
110
+ name : syn-vcluster-oidc
111
+ name : syn-vcluster-oidc
112
+ roleRef :
113
+ apiGroup : rbac.authorization.k8s.io
114
+ kind : ClusterRole
115
+ name : syn-vcluster-oidc
116
+ subjects :
117
+ - kind : ServiceAccount
118
+ name : vc-oidc
119
+ namespace : testns
120
+ ---
96
121
apiVersion : v1
97
122
kind : Service
98
123
metadata :
Original file line number Diff line number Diff line change @@ -57,14 +57,6 @@ rules:
57
57
- get
58
58
- list
59
59
- watch
60
- - apiGroups :
61
- - networking.k8s.io
62
- resources :
63
- - ingressclasses
64
- verbs :
65
- - get
66
- - list
67
- - watch
68
60
- apiGroups :
69
61
- apps
70
62
resources :
@@ -99,6 +91,39 @@ subjects:
99
91
name : vc-openshift
100
92
namespace : syn-openshift
101
93
---
94
+ apiVersion : rbac.authorization.k8s.io/v1
95
+ kind : ClusterRole
96
+ metadata :
97
+ annotations : {}
98
+ labels :
99
+ name : syn-vcluster-openshift
100
+ name : syn-vcluster-openshift
101
+ rules :
102
+ - apiGroups :
103
+ - networking.k8s.io
104
+ resources :
105
+ - ingressclasses
106
+ verbs :
107
+ - get
108
+ - list
109
+ - watch
110
+ ---
111
+ apiVersion : rbac.authorization.k8s.io/v1
112
+ kind : ClusterRoleBinding
113
+ metadata :
114
+ annotations : {}
115
+ labels :
116
+ name : syn-vcluster-openshift
117
+ name : syn-vcluster-openshift
118
+ roleRef :
119
+ apiGroup : rbac.authorization.k8s.io
120
+ kind : ClusterRole
121
+ name : syn-vcluster-openshift
122
+ subjects :
123
+ - kind : ServiceAccount
124
+ name : vc-openshift
125
+ namespace : syn-openshift
126
+ ---
102
127
apiVersion : v1
103
128
kind : Service
104
129
metadata :
You can’t perform that action at this time.
0 commit comments