Skip to content

Commit

Permalink
Implement reviews
Browse files Browse the repository at this point in the history
  • Loading branch information
damsien committed Nov 7, 2024
1 parent c8c730d commit f2e3455
Show file tree
Hide file tree
Showing 72 changed files with 18 additions and 563 deletions.
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
# This rule is not used by the project project itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Provides full permissions (create, update, delete) over all custom resource objects
# for the specified API resources across the cluster. In addition to resource management,
# it grants users the ability to modify roles and bindings within the cluster,
# Provides full permissions (create, update, delete) over all custom resource objects
# for the specified API resources across the cluster. In addition to resource management,
# it grants users the ability to modify roles and bindings within the cluster,
# allowing them to delegate specific permissions to other users or groups as needed.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -12,22 +12,12 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default admin ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-admin: "true"
name: cronjob-admin-role
rules:
- apiGroups:
- batch.tutorial.kubebuilder.io
- rbac.authorization.k8s.io
resources:
- cronjobs
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
#
# Allows users to modify all custom resources for project on the cluster.
# This role enables users to create, update, and delete resources,
# making it suitable for team members who need to manage resources
# making it suitable for team members who need to manage resources
# but should not control RBAC or manage permissions for others.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -12,11 +12,6 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default edit ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: cronjob-editor-role
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
# This rule is not used by the project project itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants read-only access to CronJob resources.
# This role is intended for users who need visibility into the resources
# Grants read-only access to CronJob resources.
# This role is intended for users who need visibility into the resources
# without any permissions to modify them. It’s ideal for monitoring purposes and limited-access viewing.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -11,11 +11,6 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default view ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-view: "true"
name: cronjob-viewer-role
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3873,13 +3873,8 @@ metadata:
rules:
- apiGroups:
- batch.tutorial.kubebuilder.io
- rbac.authorization.k8s.io
resources:
- cronjobs
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
# This rule is not used by the project project itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Provides full permissions (create, update, delete) over all custom resource objects
# for the specified API resources across the cluster. In addition to resource management,
# it grants users the ability to modify roles and bindings within the cluster,
# Provides full permissions (create, update, delete) over all custom resource objects
# for the specified API resources across the cluster. In addition to resource management,
# it grants users the ability to modify roles and bindings within the cluster,
# allowing them to delegate specific permissions to other users or groups as needed.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -12,22 +12,12 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default admin ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-admin: "true"
name: memcached-admin-role
rules:
- apiGroups:
- cache.example.com
- rbac.authorization.k8s.io
resources:
- memcacheds
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
#
# Allows users to modify all custom resources for project on the cluster.
# This role enables users to create, update, and delete resources,
# making it suitable for team members who need to manage resources
# making it suitable for team members who need to manage resources
# but should not control RBAC or manage permissions for others.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -12,11 +12,6 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default edit ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: memcached-editor-role
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
# This rule is not used by the project project itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants read-only access to Memcached resources.
# This role is intended for users who need visibility into the resources
# Grants read-only access to Memcached resources.
# This role is intended for users who need visibility into the resources
# without any permissions to modify them. It’s ideal for monitoring purposes and limited-access viewing.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -11,11 +11,6 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default view ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-view: "true"
name: memcached-viewer-role
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -242,13 +242,8 @@ metadata:
rules:
- apiGroups:
- cache.example.com
- rbac.authorization.k8s.io
resources:
- memcacheds
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
# This rule is not used by the project project itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Provides full permissions (create, update, delete) over all custom resource objects
# for the specified API resources across the cluster. In addition to resource management,
# it grants users the ability to modify roles and bindings within the cluster,
# Provides full permissions (create, update, delete) over all custom resource objects
# for the specified API resources across the cluster. In addition to resource management,
# it grants users the ability to modify roles and bindings within the cluster,
# allowing them to delegate specific permissions to other users or groups as needed.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -12,22 +12,12 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default admin ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-admin: "true"
name: cronjob-admin-role
rules:
- apiGroups:
- batch.tutorial.kubebuilder.io
- rbac.authorization.k8s.io
resources:
- cronjobs
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
#
# Allows users to modify all custom resources for project on the cluster.
# This role enables users to create, update, and delete resources,
# making it suitable for team members who need to manage resources
# making it suitable for team members who need to manage resources
# but should not control RBAC or manage permissions for others.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -12,11 +12,6 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default edit ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: cronjob-editor-role
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
# This rule is not used by the project project itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants read-only access to CronJob resources.
# This role is intended for users who need visibility into the resources
# Grants read-only access to CronJob resources.
# This role is intended for users who need visibility into the resources
# without any permissions to modify them. It’s ideal for monitoring purposes and limited-access viewing.

apiVersion: rbac.authorization.k8s.io/v1
Expand All @@ -11,11 +11,6 @@ metadata:
labels:
app.kubernetes.io/name: project
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default view ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-view: "true"
name: cronjob-viewer-role
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7684,13 +7684,8 @@ metadata:
rules:
- apiGroups:
- batch.tutorial.kubebuilder.io
- rbac.authorization.k8s.io
resources:
- cronjobs
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -79,22 +79,12 @@ metadata:
labels:
app.kubernetes.io/name: {{ .ProjectName }}
app.kubernetes.io/managed-by: kustomize
# Uncomment the following line if you want to aggregate these permissions to the default admin ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-admin: "true"
name: {{ .RoleName }}
rules:
- apiGroups:
- {{ .Resource.QualifiedGroup }}
- rbac.authorization.k8s.io
resources:
- {{ .Resource.Plural }}
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -79,11 +79,6 @@ metadata:
labels:
app.kubernetes.io/name: {{ .ProjectName }}
app.kubernetes.io/managed-by: kustomize
# Uncomment the following line if you want to aggregate these permissions to the default edit ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: {{ .RoleName }}
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,11 +78,6 @@ metadata:
labels:
app.kubernetes.io/name: {{ .ProjectName }}
app.kubernetes.io/managed-by: kustomize
# Uncomment the following line if you want to aggregate these permissions to the default view ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-view: "true"
name: {{ .RoleName }}
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,22 +12,12 @@ metadata:
labels:
app.kubernetes.io/name: project-v4-multigroup
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default admin ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-admin: "true"
name: crew-captain-admin-role
rules:
- apiGroups:
- crew.testproject.org
- rbac.authorization.k8s.io
resources:
- captains
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,11 +12,6 @@ metadata:
labels:
app.kubernetes.io/name: project-v4-multigroup
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default edit ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: crew-captain-editor-role
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,11 +11,6 @@ metadata:
labels:
app.kubernetes.io/name: project-v4-multigroup
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default view ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-view: "true"
name: crew-captain-viewer-role
rules:
- apiGroups:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,22 +12,12 @@ metadata:
labels:
app.kubernetes.io/name: project-v4-multigroup
app.kubernetes.io/managed-by: kustomize

# Uncomment the following line if you want to aggregate these permissions to the default admin ClusterRole.
# For more information, please see:
# https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
# rbac.authorization.k8s.io/aggregate-to-admin: "true"
name: example.com-busybox-admin-role
rules:
- apiGroups:
- example.com.testproject.org
- rbac.authorization.k8s.io
resources:
- busyboxes
- clusterroles
- clusterrolebindings
- roles
- rolebindings
verbs:
- '*'
- apiGroups:
Expand Down
Loading

0 comments on commit f2e3455

Please sign in to comment.