4 metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
\r
7 func GetRole() []*rbacv1.Role {
\r
9 role1 := &rbacv1.Role{
\r
10 ObjectMeta: metav1.ObjectMeta{
\r
11 Name: "svcacct-ricplt-alarmmanager-ricxapp-podreader",
\r
12 Namespace: "ricxapp",
\r
14 Rules: []rbacv1.PolicyRule{
\r
17 APIGroups: []string{
\r
21 Resources: []string{
\r
33 TypeMeta: metav1.TypeMeta{
\r
34 APIVersion: "rbac.authorization.k8s.io/v1",
\r
39 role2 := &rbacv1.Role{
\r
40 ObjectMeta: metav1.ObjectMeta{
\r
41 Labels: map[string]string{
\r
42 "app.kubernetes.io/managed-by": "Helm",
\r
43 "app.kubernetes.io/name": "kong",
\r
44 "app.kubernetes.io/version": "1.4",
\r
45 "helm.sh/chart": "kong-0.36.6",
\r
46 "app.kubernetes.io/instance": "release-name",
\r
48 Name: "release-name-kong",
\r
50 Rules: []rbacv1.PolicyRule{
\r
53 Resources: []string{
\r
64 APIGroups: []string{
\r
75 APIGroups: []string{
\r
79 ResourceNames: []string{
\r
81 "kong-ingress-controller-leader-kong-kong",
\r
83 Resources: []string{
\r
89 APIGroups: []string{
\r
93 Resources: []string{
\r
103 APIGroups: []string{
\r
107 Resources: []string{
\r
117 TypeMeta: metav1.TypeMeta{
\r
118 APIVersion: "rbac.authorization.k8s.io/v1",
\r
123 role3 := &rbacv1.Role{
\r
124 TypeMeta: metav1.TypeMeta{
\r
125 APIVersion: "rbac.authorization.k8s.io/v1",
\r
128 ObjectMeta: metav1.ObjectMeta{
\r
129 Name: "ricxapp-tiller-base",
\r
130 Namespace: "ricxapp",
\r
132 Rules: []rbacv1.PolicyRule{
\r
135 APIGroups: []string{
\r
139 ResourceNames: []string{
\r
141 "ricxapp-tiller-secret",
\r
143 Resources: []string{
\r
153 APIGroups: []string{
\r
157 Resources: []string{
\r
159 "pods/portforward",
\r
167 APIGroups: []string{
\r
171 Resources: []string{
\r
181 APIGroups: []string{
\r
185 Resources: []string{
\r
203 role4 := &rbacv1.Role{
\r
204 TypeMeta: metav1.TypeMeta{
\r
205 APIVersion: "rbac.authorization.k8s.io/v1",
\r
208 ObjectMeta: metav1.ObjectMeta{
\r
209 Name: "ricxapp-tiller-operation",
\r
210 Namespace: "ricinfra",
\r
212 Rules: []rbacv1.PolicyRule{
\r
215 APIGroups: []string{
\r
219 Resources: []string{
\r
235 role5 := &rbacv1.Role{
\r
236 ObjectMeta: metav1.ObjectMeta{
\r
237 Name: "ricxapp-tiller-deployer",
\r
238 Namespace: "ricxapp",
\r
240 Rules: []rbacv1.PolicyRule{
\r
243 APIGroups: []string{
\r
247 Resources: []string{
\r
269 APIGroups: []string{
\r
274 Resources: []string{
\r
280 TypeMeta: metav1.TypeMeta{
\r
281 APIVersion: "rbac.authorization.k8s.io/v1",
\r
286 role6 := &rbacv1.Role{
\r
287 ObjectMeta: metav1.ObjectMeta{
\r
288 Name: "tiller-secret-creator-xzhjjg-secret-create",
\r
289 Namespace: "ricinfra",
\r
291 Rules: []rbacv1.PolicyRule{
\r
294 APIGroups: []string{
\r
298 Resources: []string{
\r
310 TypeMeta: metav1.TypeMeta{
\r
311 APIVersion: "rbac.authorization.k8s.io/v1",
\r
316 role7 := &rbacv1.Role{
\r
317 Rules: []rbacv1.PolicyRule{
\r
320 APIGroups: []string{
\r
324 Resources: []string{
\r
337 APIGroups: []string{
\r
341 ResourceNames: []string{
\r
343 "kong-ingress-controller-leader-kong-kong",
\r
345 Resources: []string{
\r
356 APIGroups: []string{
\r
360 Resources: []string{
\r
370 Resources: []string{
\r
378 APIGroups: []string{
\r
384 TypeMeta: metav1.TypeMeta{
\r
385 APIVersion: "rbac.authorization.k8s.io/v1",
\r
388 ObjectMeta: metav1.ObjectMeta{
\r
389 Name: "release-name-kong",
\r
390 Labels: map[string]string{
\r
391 "helm.sh/chart": "kong-0.36.6",
\r
392 "app.kubernetes.io/instance": "release-name",
\r
393 "app.kubernetes.io/managed-by": "Helm",
\r
394 "app.kubernetes.io/name": "kong",
\r
395 "app.kubernetes.io/version": "1.4",
\r
400 role8 := &rbacv1.Role{
\r
401 ObjectMeta: metav1.ObjectMeta{
\r
402 Name: "svcacct-ricplt-o1mediator-ricxapp-podreader",
\r
403 Namespace: "ricxapp",
\r
405 Rules: []rbacv1.PolicyRule{
\r
408 APIGroups: []string{
\r
412 Resources: []string{
\r
424 TypeMeta: metav1.TypeMeta{
\r
425 APIVersion: "rbac.authorization.k8s.io/v1",
\r
430 role9 := &rbacv1.Role{
\r
431 Rules: []rbacv1.PolicyRule{
\r
434 APIGroups: []string{
\r
438 Resources: []string{
\r
449 APIGroups: []string{
\r
453 Resources: []string{
\r
463 TypeMeta: metav1.TypeMeta{
\r
465 APIVersion: "rbac.authorization.k8s.io/v1",
\r
467 ObjectMeta: metav1.ObjectMeta{
\r
468 Name: "assigner-role",
\r
472 return []*rbacv1.Role{role1, role2, role3, role4, role5, role6, role7, role8, role9}
\r