11local metrics = import 'github.com/openshift/telemeter/jsonnet/telemeter/metrics.jsonnet' ;
22
33local cmoRules = import './../rules.libsonnet' ;
4- local optIntoOptionalMonitoring = import './../utils/opt-into-optional-monitoring .libsonnet' ;
4+ local optIntoCapability = import './../utils/opt-into-capability .libsonnet' ;
55local kubePrometheus = import 'github.com/prometheus-operator/kube-prometheus/jsonnet/kube-prometheus/components/mixin/custom.libsonnet' ;
66
77local defaults = {
@@ -330,7 +330,7 @@ function(params) {
330330 // - get/list/watch permissions on alertingrules and alertrelabelconfigs to detect changes requiring reconciliation.
331331 // - all permissions on alertingrules/finalizers to set the `ownerReferences` field on generated prometheusrules.
332332 // - all permissions on alertingrules/status to set the status of alertingrules.
333- alertCustomizationRole: optIntoOptionalMonitoring.forObject ({
333+ alertCustomizationRole: optIntoCapability.optionalMonitoringForObject ({
334334 apiVersion: 'rbac.authorization.k8s.io/v1' ,
335335 kind: 'Role' ,
336336 metadata: {
@@ -423,7 +423,7 @@ function(params) {
423423
424424 // This role enables read/write access to the platform Alertmanager API
425425 // through kube-rbac-proxy.
426- monitoringAlertmanagerEditRole: optIntoOptionalMonitoring.forObject ({
426+ monitoringAlertmanagerEditRole: optIntoCapability.optionalMonitoringForObject ({
427427 apiVersion: 'rbac.authorization.k8s.io/v1' ,
428428 kind: 'Role' ,
429429 metadata: {
@@ -442,7 +442,7 @@ function(params) {
442442
443443 // This role enables read access to the platform Alertmanager API
444444 // through kube-rbac-proxy.
445- monitoringAlertmanagerViewRole: optIntoOptionalMonitoring.forObject ({
445+ monitoringAlertmanagerViewRole: optIntoCapability.optionalMonitoringForObject ({
446446 apiVersion: 'rbac.authorization.k8s.io/v1' ,
447447 kind: 'Role' ,
448448 metadata: {
@@ -465,7 +465,7 @@ function(params) {
465465 // Using "nonResourceURLs" doesn't work because authenticated users and
466466 // service accounts are allowed to get /api/* by default.
467467 // See https://issues.redhat.com/browse/OCPBUGS-17850.
468- userWorkloadAlertmanagerApiReader: optIntoOptionalMonitoring.forObject ({
468+ userWorkloadAlertmanagerApiReader: optIntoCapability.optionalMonitoringForObject ({
469469 apiVersion: 'rbac.authorization.k8s.io/v1' ,
470470 kind: 'Role' ,
471471 metadata: {
@@ -482,7 +482,7 @@ function(params) {
482482
483483 // This role provides read/write access to the user-workload Alertmanager API.
484484 // See the 'monitoring-alertmanager-api-reader' role for details.
485- userWorkloadAlertmanagerApiWriter: optIntoOptionalMonitoring.forObject ({
485+ userWorkloadAlertmanagerApiWriter: optIntoCapability.optionalMonitoringForObject ({
486486 apiVersion: 'rbac.authorization.k8s.io/v1' ,
487487 kind: 'Role' ,
488488 metadata: {
@@ -539,7 +539,7 @@ function(params) {
539539 },
540540
541541 // This role provides read/write access to the user-workload monitoring configuration.
542- userWorkloadConfigEditRole: optIntoOptionalMonitoring.forObject ({
542+ userWorkloadConfigEditRole: optIntoCapability.optionalMonitoringForObject ({
543543 apiVersion: 'rbac.authorization.k8s.io/v1' ,
544544 kind: 'Role' ,
545545 metadata: {
@@ -555,7 +555,7 @@ function(params) {
555555 }),
556556
557557 // This cluster role can be referenced in a RoleBinding object to provide read/write access to AlertmanagerConfiguration objects for a project.
558- alertingEditClusterRole: optIntoOptionalMonitoring.forObject ({
558+ alertingEditClusterRole: optIntoCapability.optionalMonitoringForObject ({
559559 apiVersion: 'rbac.authorization.k8s.io/v1' ,
560560 kind: 'ClusterRole' ,
561561 metadata: {
0 commit comments