Skip to content

Commit 2360bfe

Browse files
committed
split operator yaml to multiple to support terraform
1 parent e1b74c4 commit 2360bfe

File tree

4 files changed

+52
-55
lines changed

4 files changed

+52
-55
lines changed

kubernetes/auth-operator.yaml

Lines changed: 0 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -1,58 +1,3 @@
1-
apiVersion: v1
2-
kind: ServiceAccount
3-
metadata:
4-
namespace: kube-system
5-
name: auth-operator
6-
---
7-
apiVersion: rbac.authorization.k8s.io/v1
8-
kind: ClusterRole
9-
metadata:
10-
name: auth-operator-role-cluster
11-
rules:
12-
# Framework: knowing which other operators are running (i.e. peering).
13-
- apiGroups: [zalando.org]
14-
resources: [kopfpeerings, clusterkopfpeerings]
15-
verbs: [list, watch, patch, get]
16-
17-
# Framework: posting the events about the handlers progress/errors.
18-
- apiGroups: [events.k8s.io]
19-
resources: [events]
20-
verbs: [create]
21-
- apiGroups: [""]
22-
resources: [events]
23-
verbs: [create]
24-
25-
# Application: watching & handling for the custom resource we declare.
26-
- apiGroups: [iamauthenticator.k8s.aws]
27-
resources: [iamidentitymappings]
28-
verbs: [list, watch, patch, get]
29-
30-
- apiGroups: [apiextensions.k8s.io]
31-
resources: [customresourcedefinitions]
32-
verbs: [list, get, update, create, patch]
33-
34-
- apiGroups:
35-
- ""
36-
resources:
37-
- configmaps
38-
verbs:
39-
- get
40-
- patch
41-
- update
42-
---
43-
apiVersion: rbac.authorization.k8s.io/v1
44-
kind: ClusterRoleBinding
45-
metadata:
46-
name: auth-operator-rolebinding-cluster
47-
roleRef:
48-
apiGroup: rbac.authorization.k8s.io
49-
kind: ClusterRole
50-
name: auth-operator-role-cluster
51-
subjects:
52-
- kind: ServiceAccount
53-
name: auth-operator
54-
namespace: kube-system
55-
---
561
apiVersion: apps/v1
572
kind: Deployment
583
metadata:

kubernetes/clusterrole.yaml

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
apiVersion: rbac.authorization.k8s.io/v1
2+
kind: ClusterRole
3+
metadata:
4+
name: auth-operator-role-cluster
5+
rules:
6+
# Framework: knowing which other operators are running (i.e. peering).
7+
- apiGroups: [zalando.org]
8+
resources: [kopfpeerings, clusterkopfpeerings]
9+
verbs: [list, watch, patch, get]
10+
11+
# Framework: posting the events about the handlers progress/errors.
12+
- apiGroups: [events.k8s.io]
13+
resources: [events]
14+
verbs: [create]
15+
- apiGroups: [""]
16+
resources: [events]
17+
verbs: [create]
18+
19+
# Application: watching & handling for the custom resource we declare.
20+
- apiGroups: [iamauthenticator.k8s.aws]
21+
resources: [iamidentitymappings]
22+
verbs: [list, watch, patch, get]
23+
24+
- apiGroups: [apiextensions.k8s.io]
25+
resources: [customresourcedefinitions]
26+
verbs: [list, get, update, create, patch]
27+
28+
- apiGroups:
29+
- ""
30+
resources:
31+
- configmaps
32+
verbs:
33+
- get
34+
- patch
35+
- update

kubernetes/clusterrolebinding.yaml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
apiVersion: rbac.authorization.k8s.io/v1
2+
kind: ClusterRoleBinding
3+
metadata:
4+
name: auth-operator-rolebinding-cluster
5+
roleRef:
6+
apiGroup: rbac.authorization.k8s.io
7+
kind: ClusterRole
8+
name: auth-operator-role-cluster
9+
subjects:
10+
- kind: ServiceAccount
11+
name: auth-operator
12+
namespace: kube-system

kubernetes/sa.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
apiVersion: v1
2+
kind: ServiceAccount
3+
metadata:
4+
namespace: kube-system
5+
name: auth-operator

0 commit comments

Comments
 (0)