Merge "Adding Role for RIC."
[ric-plt/ric-dep.git] / depRicKubernetesOperator / internal / controller / getRole.go
index e43a0ba..f7acdc5 100644 (file)
@@ -35,5 +35,439 @@ func GetRole() []*rbacv1.Role {
                        Kind:       "Role",\r
                },\r
        }\r
-       return []*rbacv1.Role{role1}\r
-}\r
+\r
+       role2 := &rbacv1.Role{\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Labels: map[string]string{\r
+                               "app.kubernetes.io/managed-by": "Helm",\r
+                               "app.kubernetes.io/name":       "kong",\r
+                               "app.kubernetes.io/version":    "1.4",\r
+                               "helm.sh/chart":                "kong-0.36.6",\r
+                               "app.kubernetes.io/instance":   "release-name",\r
+                       },\r
+                       Name: "release-name-kong",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                                       "pods",\r
+                                       "secrets",\r
+                                       "namespaces",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "update",\r
+                               },\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               ResourceNames: []string{\r
+\r
+                                       "kong-ingress-controller-leader-kong-kong",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "endpoints",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+       }\r
+\r
+       role3 := &rbacv1.Role{\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "ricxapp-tiller-base",\r
+                       Namespace: "ricxapp",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               ResourceNames: []string{\r
+\r
+                                       "ricxapp-tiller-secret",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "secrets",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods/portforward",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "namespaces",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods",\r
+                                       "configmaps",\r
+                                       "deployments",\r
+                                       "services",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "create",\r
+                                       "delete",\r
+                               },\r
+                       },\r
+               },\r
+       }\r
+\r
+       role4 := &rbacv1.Role{\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "ricxapp-tiller-operation",\r
+                       Namespace: "ricinfra",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "create",\r
+                                       "delete",\r
+                                       "update",\r
+                               },\r
+                       },\r
+               },\r
+       }\r
+\r
+       role5 := &rbacv1.Role{\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "ricxapp-tiller-deployer",\r
+                       Namespace: "ricxapp",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods",\r
+                                       "configmaps",\r
+                                       "services",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "create",\r
+                                       "delete",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "create",\r
+                                       "delete",\r
+                               },\r
+                               APIGroups: []string{\r
+\r
+                                       "extensions",\r
+                                       "apps",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "deployments",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+       }\r
+\r
+       role6 := &rbacv1.Role{\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "tiller-secret-creator-xzhjjg-secret-create",\r
+                       Namespace: "ricinfra",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "secrets",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                                       "get",\r
+                                       "patch",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+       }\r
+\r
+       role7 := &rbacv1.Role{\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                                       "pods",\r
+                                       "secrets",\r
+                                       "namespaces",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               ResourceNames: []string{\r
+\r
+                                       "kong-ingress-controller-leader-kong-kong",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "update",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               Resources: []string{\r
+\r
+                                       "endpoints",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name: "release-name-kong",\r
+                       Labels: map[string]string{\r
+                               "helm.sh/chart":                "kong-0.36.6",\r
+                               "app.kubernetes.io/instance":   "release-name",\r
+                               "app.kubernetes.io/managed-by": "Helm",\r
+                               "app.kubernetes.io/name":       "kong",\r
+                               "app.kubernetes.io/version":    "1.4",\r
+                       },\r
+               },\r
+       }\r
+\r
+       role8 := &rbacv1.Role{\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "svcacct-ricplt-o1mediator-ricxapp-podreader",\r
+                       Namespace: "ricxapp",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "watch",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+       }\r
+\r
+       role9 := &rbacv1.Role{\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods/exec",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       Kind:       "Role",\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+               },\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name: "assigner-role",\r
+               },\r
+       }\r
+\r
+       return []*rbacv1.Role{role1, role2, role3, role4, role5, role6, role7, role8, role9}\r
+}
\ No newline at end of file