Skip to content

Commit db9979f

Browse files
author
Per Goncalves da Silva
committed
Add demo resources
Signed-off-by: Per Goncalves da Silva <[email protected]>
1 parent efe6e21 commit db9979f

File tree

1 file changed

+127
-0
lines changed

1 file changed

+127
-0
lines changed
Lines changed: 127 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,127 @@
1+
---
2+
apiVersion: v1
3+
kind: Namespace
4+
metadata:
5+
name: argocd-system
6+
---
7+
apiVersion: rbac.authorization.k8s.io/v1
8+
kind: ClusterRole
9+
metadata:
10+
name: clusterextension-installer
11+
rules:
12+
- apiGroups: [ olm.operatorframework.io ]
13+
resources: [ clusterextensions/finalizers ]
14+
verbs: [ update ]
15+
- apiGroups: [ apiextensions.k8s.io ]
16+
resources: [ customresourcedefinitions ]
17+
verbs: [ create, list, watch, get, update, patch, delete ]
18+
- apiGroups: [ rbac.authorization.k8s.io ]
19+
resources: [ clusterroles, roles, clusterrolebindings, rolebindings ]
20+
verbs: [ create, list, watch, get, update, patch, delete ]
21+
- apiGroups: [""]
22+
resources: [configmaps, endpoints, events, pods, pod/logs, serviceaccounts, services, services/finalizers, namespaces, persistentvolumeclaims]
23+
verbs: ['*']
24+
- apiGroups: [apps]
25+
resources: [ '*' ]
26+
verbs: ['*']
27+
- apiGroups: [ batch ]
28+
resources: [ '*' ]
29+
verbs: [ '*' ]
30+
- apiGroups: [ networking.k8s.io ]
31+
resources: [ '*' ]
32+
verbs: [ '*' ]
33+
- apiGroups: [authentication.k8s.io]
34+
resources: [tokenreviews, subjectaccessreviews]
35+
verbs: [create]
36+
- apiGroups: [autoscaling]
37+
resources: [horizontalpodautoscalers]
38+
verbs: ['*']
39+
- apiGroups: [ apps.openshift.io ]
40+
resources: [ '*' ]
41+
verbs: [ '*' ]
42+
- apiGroups: [config.openshift.io]
43+
resources: [clusterversions]
44+
verbs: [get, list, watch]
45+
- apiGroups: [monitoring.coreos.com]
46+
resources: ['*']
47+
verbs: ['*']
48+
- apiGroups: [oauth.openshift.io]
49+
resources: [oauthclients]
50+
verbs: [create, delete, get, list, patch, update, watch]
51+
- apiGroups: [rbac.authorization.k8s.io]
52+
resources: ['*']
53+
verbs: ['*']
54+
- apiGroups: [route.openshift.io]
55+
resources: ['*']
56+
verbs: ['*']
57+
- apiGroups: [template.openshift.io]
58+
resources: ['*']
59+
verbs: ['*']
60+
---
61+
apiVersion: rbac.authorization.k8s.io/v1
62+
kind: ClusterRole
63+
metadata:
64+
name: clusterextension-privileged
65+
rules:
66+
- apiGroups: [""]
67+
resources: [secrets]
68+
verbs: ['*']
69+
---
70+
apiVersion: rbac.authorization.k8s.io/v1
71+
kind: ClusterRole
72+
metadata:
73+
name: clusterextension-installer-crds
74+
rules:
75+
- apiGroups: [argoproj.io]
76+
resources: ['*']
77+
verbs: ['*']
78+
---
79+
apiVersion: rbac.authorization.k8s.io/v1
80+
kind: ClusterRoleBinding
81+
metadata:
82+
name: clusterextension-installer-binding
83+
roleRef:
84+
apiGroup: rbac.authorization.k8s.io
85+
kind: ClusterRole
86+
name: clusterextension-installer
87+
subjects:
88+
- kind: User
89+
name: "olm:clusterextensions:argocd-operator"
90+
---
91+
apiVersion: rbac.authorization.k8s.io/v1
92+
kind: ClusterRoleBinding
93+
metadata:
94+
name: clusterextension-privileged-binding
95+
roleRef:
96+
apiGroup: rbac.authorization.k8s.io
97+
kind: ClusterRole
98+
name: clusterextension-privileged
99+
subjects:
100+
- kind: User
101+
name: "olm:clusterextensions:argocd-operator"
102+
---
103+
apiVersion: rbac.authorization.k8s.io/v1
104+
kind: ClusterRoleBinding
105+
metadata:
106+
name: clusterextension-installer-crds-binding
107+
roleRef:
108+
apiGroup: rbac.authorization.k8s.io
109+
kind: ClusterRole
110+
name: clusterextension-installer-crds
111+
subjects:
112+
- kind: User
113+
name: "olm:clusterextensions:argocd-operator"
114+
---
115+
apiVersion: olm.operatorframework.io/v1
116+
kind: ClusterExtension
117+
metadata:
118+
name: argocd-operator
119+
spec:
120+
namespace: argocd-system
121+
serviceAccount:
122+
name: "olm.synthetic-user"
123+
source:
124+
sourceType: Catalog
125+
catalog:
126+
packageName: argocd-operator
127+
version: 0.6.0

0 commit comments

Comments
 (0)