Skip to content

Commit cb5784c

Browse files
Merge pull request #787 from bergerhoffer/fixing-indentation
Fixing indentation for spec field
2 parents 19e7914 + faeb160 commit cb5784c

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

Documentation/design/operatorgroups.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ If there exists more than one `OperatorGroup` in a single namespace, any CSV cre
2121

2222
### InstallModes and Supported OperatorGroups
2323

24-
An `InstallMode` consists of an `InstallModeType` field and a boolean `Supported` field. A CSV's spec can contain a set of `InstallModes` of four distinct `InstallModeTypes`:
24+
An `InstallMode` consists of an `InstallModeType` field and a boolean `Supported` field. A CSV's spec can contain a set of `InstallModes` of four distinct `InstallModeTypes`:
2525
* `OwnNamespace`: If supported, the operator can be a member of an `OperatorGroup` that selects its own namespace
2626
* `SingleNamespace`: If supported, the operator can be a member of an `OperatorGroup` that selects one namespace
2727
* `MultiNamespace`: If supported, the operator can be a member of an `OperatorGroup` that selects more than one namespace
@@ -56,11 +56,11 @@ kind: OperatorGroup
5656
metadata:
5757
name: my-group
5858
namespace: my-namespace
59-
spec:
60-
targetNamespaces:
61-
- my-namespace
62-
- my-other-namespace
63-
- my-other-other-namespace
59+
spec:
60+
targetNamespaces:
61+
- my-namespace
62+
- my-other-namespace
63+
- my-other-other-namespace
6464
```
6565

6666
> Note: If both `spec.targetNamespaces` and `spec.selector` are defined, `spec.selector` is ignored.
@@ -142,7 +142,7 @@ When a CSV becomes an active member of an `OperatorGroup` and is not in a failed
142142
* A `<kind.group-version-admin>` ClusterRole is generated with the `*` verb on `<group>` `<kind>` with aggregation labels `rbac.authorization.k8s.io/aggregate-to-admin: true` and `olm.opgroup.permissions/aggregate-to-admin: <operatorgroup-name>`
143143
* A `<kind.group-version-edit>` ClusterRole is generated with the `create, update, patch, release` verbs on `<group>` `<kind>` with aggregation labels `rbac.authorization.k8s.io/aggregate-to-edit: true` and `olm.opgroup.permissions/aggregate-to-edit: <operatorgroup-name>`
144144
* A `<kind.group-version-view>` ClusterRole is generated with the `get, list, watch` verbs on `<group>` `<kind>` with aggregation labels `rbac.authorization.k8s.io/aggregate-to-view: true` and `olm.opgroup.permissions/aggregate-to-view: <operatorgroup-name>`
145-
145+
146146
* If |target namespaces| == 1 and contains `*`:
147147
* A ClusterRole and corresponding ClusterRoleBinding are generated for each permission defined in the CSV's permissions field. All resources generated are given the `olm.owner: <csv-name>` and `olm.owner.namespace: <csv-namespace>` labels
148148
* Else for each target namespace:
@@ -215,4 +215,3 @@ Each time an `OperatorGroup` syncs:
215215
* If `olm.providedAPIs` contains any extraneous provided APIs:
216216
* `olm.providedAPIs` is pruned of any extraneous provided APIs (not provided on cluster)
217217
* All CSVs that provide the same APIs across all namespaces (including those removed) are requeued. This notifies conflicting CSVs in intersecting groups that their conflict has possibly been resolved, either through resizing or through deletion of the conflicting CSV.
218-

0 commit comments

Comments
 (0)