Kind: "Role",\r
},\r
}\r
- return []*rbacv1.Role{role1}\r
-}\r
+\r
+ role2 := &rbacv1.Role{\r
+ ObjectMeta: metav1.ObjectMeta{\r
+ Labels: map[string]string{\r
+ "app.kubernetes.io/managed-by": "Helm",\r
+ "app.kubernetes.io/name": "kong",\r
+ "app.kubernetes.io/version": "1.4",\r
+ "helm.sh/chart": "kong-0.36.6",\r
+ "app.kubernetes.io/instance": "release-name",\r
+ },\r
+ Name: "release-name-kong",\r
+ },\r
+ Rules: []rbacv1.PolicyRule{\r
+\r
+ rbacv1.PolicyRule{\r
+ Resources: []string{\r
+\r
+ "configmaps",\r
+ "pods",\r
+ "secrets",\r
+ "namespaces",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ },\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ "update",\r
+ },\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ ResourceNames: []string{\r
+\r
+ "kong-ingress-controller-leader-kong-kong",\r
+ },\r
+ Resources: []string{\r
+\r
+ "configmaps",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "configmaps",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "create",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "endpoints",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ },\r
+ },\r
+ },\r
+ TypeMeta: metav1.TypeMeta{\r
+ APIVersion: "rbac.authorization.k8s.io/v1",\r
+ Kind: "Role",\r
+ },\r
+ }\r
+\r
+ role3 := &rbacv1.Role{\r
+ TypeMeta: metav1.TypeMeta{\r
+ APIVersion: "rbac.authorization.k8s.io/v1",\r
+ Kind: "Role",\r
+ },\r
+ ObjectMeta: metav1.ObjectMeta{\r
+ Name: "ricxapp-tiller-base",\r
+ Namespace: "ricxapp",\r
+ },\r
+ Rules: []rbacv1.PolicyRule{\r
+\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ ResourceNames: []string{\r
+\r
+ "ricxapp-tiller-secret",\r
+ },\r
+ Resources: []string{\r
+\r
+ "secrets",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "pods/portforward",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "create",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "namespaces",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "pods",\r
+ "configmaps",\r
+ "deployments",\r
+ "services",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ "list",\r
+ "create",\r
+ "delete",\r
+ },\r
+ },\r
+ },\r
+ }\r
+\r
+ role4 := &rbacv1.Role{\r
+ TypeMeta: metav1.TypeMeta{\r
+ APIVersion: "rbac.authorization.k8s.io/v1",\r
+ Kind: "Role",\r
+ },\r
+ ObjectMeta: metav1.ObjectMeta{\r
+ Name: "ricxapp-tiller-operation",\r
+ Namespace: "ricinfra",\r
+ },\r
+ Rules: []rbacv1.PolicyRule{\r
+\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "configmaps",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ "list",\r
+ "create",\r
+ "delete",\r
+ "update",\r
+ },\r
+ },\r
+ },\r
+ }\r
+\r
+ role5 := &rbacv1.Role{\r
+ ObjectMeta: metav1.ObjectMeta{\r
+ Name: "ricxapp-tiller-deployer",\r
+ Namespace: "ricxapp",\r
+ },\r
+ Rules: []rbacv1.PolicyRule{\r
+\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "pods",\r
+ "configmaps",\r
+ "services",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ "list",\r
+ "create",\r
+ "delete",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ "list",\r
+ "create",\r
+ "delete",\r
+ },\r
+ APIGroups: []string{\r
+\r
+ "extensions",\r
+ "apps",\r
+ },\r
+ Resources: []string{\r
+\r
+ "deployments",\r
+ },\r
+ },\r
+ },\r
+ TypeMeta: metav1.TypeMeta{\r
+ APIVersion: "rbac.authorization.k8s.io/v1",\r
+ Kind: "Role",\r
+ },\r
+ }\r
+\r
+ role6 := &rbacv1.Role{\r
+ ObjectMeta: metav1.ObjectMeta{\r
+ Name: "tiller-secret-creator-xzhjjg-secret-create",\r
+ Namespace: "ricinfra",\r
+ },\r
+ Rules: []rbacv1.PolicyRule{\r
+\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "secrets",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "create",\r
+ "get",\r
+ "patch",\r
+ },\r
+ },\r
+ },\r
+ TypeMeta: metav1.TypeMeta{\r
+ APIVersion: "rbac.authorization.k8s.io/v1",\r
+ Kind: "Role",\r
+ },\r
+ }\r
+\r
+ role7 := &rbacv1.Role{\r
+ Rules: []rbacv1.PolicyRule{\r
+\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "configmaps",\r
+ "pods",\r
+ "secrets",\r
+ "namespaces",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ ResourceNames: []string{\r
+\r
+ "kong-ingress-controller-leader-kong-kong",\r
+ },\r
+ Resources: []string{\r
+\r
+ "configmaps",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ "update",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "configmaps",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "create",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ Resources: []string{\r
+\r
+ "endpoints",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ },\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ },\r
+ },\r
+ TypeMeta: metav1.TypeMeta{\r
+ APIVersion: "rbac.authorization.k8s.io/v1",\r
+ Kind: "Role",\r
+ },\r
+ ObjectMeta: metav1.ObjectMeta{\r
+ Name: "release-name-kong",\r
+ Labels: map[string]string{\r
+ "helm.sh/chart": "kong-0.36.6",\r
+ "app.kubernetes.io/instance": "release-name",\r
+ "app.kubernetes.io/managed-by": "Helm",\r
+ "app.kubernetes.io/name": "kong",\r
+ "app.kubernetes.io/version": "1.4",\r
+ },\r
+ },\r
+ }\r
+\r
+ role8 := &rbacv1.Role{\r
+ ObjectMeta: metav1.ObjectMeta{\r
+ Name: "svcacct-ricplt-o1mediator-ricxapp-podreader",\r
+ Namespace: "ricxapp",\r
+ },\r
+ Rules: []rbacv1.PolicyRule{\r
+\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "pods",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ "list",\r
+ "watch",\r
+ },\r
+ },\r
+ },\r
+ TypeMeta: metav1.TypeMeta{\r
+ APIVersion: "rbac.authorization.k8s.io/v1",\r
+ Kind: "Role",\r
+ },\r
+ }\r
+\r
+ role9 := &rbacv1.Role{\r
+ Rules: []rbacv1.PolicyRule{\r
+\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "pods",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "get",\r
+ "list",\r
+ },\r
+ },\r
+ rbacv1.PolicyRule{\r
+ APIGroups: []string{\r
+\r
+ "",\r
+ },\r
+ Resources: []string{\r
+\r
+ "pods/exec",\r
+ },\r
+ Verbs: []string{\r
+\r
+ "create",\r
+ },\r
+ },\r
+ },\r
+ TypeMeta: metav1.TypeMeta{\r
+ Kind: "Role",\r
+ APIVersion: "rbac.authorization.k8s.io/v1",\r
+ },\r
+ ObjectMeta: metav1.ObjectMeta{\r
+ Name: "assigner-role",\r
+ },\r
+ }\r
+\r
+ return []*rbacv1.Role{role1, role2, role3, role4, role5, role6, role7, role8, role9}\r
+}
\ No newline at end of file