getting started with kubebuilder
This commit is contained in:
34
config/rbac/kustomization.yaml
Normal file
34
config/rbac/kustomization.yaml
Normal file
@ -0,0 +1,34 @@
|
||||
resources:
|
||||
# All RBAC will be applied under this service account in
|
||||
# the deployment namespace. You may comment out this resource
|
||||
# if your manager will use a service account that exists at
|
||||
# runtime. Be sure to update RoleBinding and ClusterRoleBinding
|
||||
# subjects if changing service account names.
|
||||
- service_account.yaml
|
||||
- role.yaml
|
||||
- role_binding.yaml
|
||||
- leader_election_role.yaml
|
||||
- leader_election_role_binding.yaml
|
||||
# The following RBAC configurations are used to protect
|
||||
# the metrics endpoint with authn/authz. These configurations
|
||||
# ensure that only authorized users and service accounts
|
||||
# can access the metrics endpoint. Comment the following
|
||||
# permissions if you want to disable this protection.
|
||||
# More info: https://book.kubebuilder.io/reference/metrics.html
|
||||
- metrics_auth_role.yaml
|
||||
- metrics_auth_role_binding.yaml
|
||||
- metrics_reader_role.yaml
|
||||
# For each CRD, "Admin", "Editor" and "Viewer" roles are scaffolded by
|
||||
# default, aiding admins in cluster management. Those roles are
|
||||
# not used by the {{ .ProjectName }} itself. You can comment the following lines
|
||||
# if you do not want those helpers be installed with your Project.
|
||||
- registrycredential_admin_role.yaml
|
||||
- registrycredential_editor_role.yaml
|
||||
- registrycredential_viewer_role.yaml
|
||||
- bitwardentemplate_admin_role.yaml
|
||||
- bitwardentemplate_editor_role.yaml
|
||||
- bitwardentemplate_viewer_role.yaml
|
||||
- bitwardensecret_admin_role.yaml
|
||||
- bitwardensecret_editor_role.yaml
|
||||
- bitwardensecret_viewer_role.yaml
|
||||
|
Reference in New Issue
Block a user