Skip to content

Commit

Permalink
patch to staging cluster-provisioner pod read
Browse files Browse the repository at this point in the history
Signed-off-by: Adam Scerra <[email protected]>
  • Loading branch information
ascerra committed Nov 18, 2024
1 parent e42ca6f commit 66f1ce8
Show file tree
Hide file tree
Showing 3 changed files with 24 additions and 0 deletions.
2 changes: 2 additions & 0 deletions components/cluster-as-a-service/staging/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ resources:
- ../base
- ../../openshift-gitops
- external-secrets.yaml
- namespace-manager-pod-reader-role.yaml
- namespace-manager-pod-reader-binding.yaml
patches:
- path: add-hypershift-params.yaml
target:
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: namespace-manager-pod-reader-binding
namespace: clusters # Binding is scoped to the 'clusters' namespace
subjects:
- kind: ServiceAccount
name: namespace-manager
namespace: ${SPACE_NAME}-eaas # TODO: need to find a non var solution here
roleRef:
kind: Role
name: namespace-manager-pod-reader # Refers to the Role in the 'clusters' namespace
apiGroup: rbac.authorization.k8s.io
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: namespace-manager-pod-reader
namespace: clusters # Restricts the permissions to the 'clusters' namespace
rules:
- apiGroups: [""]
resources: ["pods/log"]
verbs: ["get"]

0 comments on commit 66f1ce8

Please sign in to comment.