Adding Role for RIC. 58/12158/2
authornaman.gupta <naman.gupta@samsung.com>
Fri, 1 Dec 2023 18:19:19 +0000 (23:49 +0530)
committerThoralf Czichy <thoralf.czichy@nokia.com>
Thu, 7 Dec 2023 09:36:53 +0000 (09:36 +0000)
Adding Role for RIC.

Change-Id: I5e137b3b8c42dbe3c3eda15a181a37a9b792e361
Signed-off-by: naman.gupta <naman.gupta@samsung.com>
depRicKubernetesOperator/internal/controller/getRole.go

index e43a0ba..f7acdc5 100644 (file)
@@ -35,5 +35,439 @@ func GetRole() []*rbacv1.Role {
                        Kind:       "Role",\r
                },\r
        }\r
-       return []*rbacv1.Role{role1}\r
-}\r
+\r
+       role2 := &rbacv1.Role{\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Labels: map[string]string{\r
+                               "app.kubernetes.io/managed-by": "Helm",\r
+                               "app.kubernetes.io/name":       "kong",\r
+                               "app.kubernetes.io/version":    "1.4",\r
+                               "helm.sh/chart":                "kong-0.36.6",\r
+                               "app.kubernetes.io/instance":   "release-name",\r
+                       },\r
+                       Name: "release-name-kong",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                                       "pods",\r
+                                       "secrets",\r
+                                       "namespaces",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "update",\r
+                               },\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               ResourceNames: []string{\r
+\r
+                                       "kong-ingress-controller-leader-kong-kong",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "endpoints",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+       }\r
+\r
+       role3 := &rbacv1.Role{\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "ricxapp-tiller-base",\r
+                       Namespace: "ricxapp",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               ResourceNames: []string{\r
+\r
+                                       "ricxapp-tiller-secret",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "secrets",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods/portforward",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "namespaces",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods",\r
+                                       "configmaps",\r
+                                       "deployments",\r
+                                       "services",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "create",\r
+                                       "delete",\r
+                               },\r
+                       },\r
+               },\r
+       }\r
+\r
+       role4 := &rbacv1.Role{\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "ricxapp-tiller-operation",\r
+                       Namespace: "ricinfra",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "create",\r
+                                       "delete",\r
+                                       "update",\r
+                               },\r
+                       },\r
+               },\r
+       }\r
+\r
+       role5 := &rbacv1.Role{\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "ricxapp-tiller-deployer",\r
+                       Namespace: "ricxapp",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods",\r
+                                       "configmaps",\r
+                                       "services",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "create",\r
+                                       "delete",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "create",\r
+                                       "delete",\r
+                               },\r
+                               APIGroups: []string{\r
+\r
+                                       "extensions",\r
+                                       "apps",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "deployments",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+       }\r
+\r
+       role6 := &rbacv1.Role{\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "tiller-secret-creator-xzhjjg-secret-create",\r
+                       Namespace: "ricinfra",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "secrets",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                                       "get",\r
+                                       "patch",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+       }\r
+\r
+       role7 := &rbacv1.Role{\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                                       "pods",\r
+                                       "secrets",\r
+                                       "namespaces",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               ResourceNames: []string{\r
+\r
+                                       "kong-ingress-controller-leader-kong-kong",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "update",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "configmaps",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               Resources: []string{\r
+\r
+                                       "endpoints",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                               },\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name: "release-name-kong",\r
+                       Labels: map[string]string{\r
+                               "helm.sh/chart":                "kong-0.36.6",\r
+                               "app.kubernetes.io/instance":   "release-name",\r
+                               "app.kubernetes.io/managed-by": "Helm",\r
+                               "app.kubernetes.io/name":       "kong",\r
+                               "app.kubernetes.io/version":    "1.4",\r
+                       },\r
+               },\r
+       }\r
+\r
+       role8 := &rbacv1.Role{\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name:      "svcacct-ricplt-o1mediator-ricxapp-podreader",\r
+                       Namespace: "ricxapp",\r
+               },\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                                       "watch",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+                       Kind:       "Role",\r
+               },\r
+       }\r
+\r
+       role9 := &rbacv1.Role{\r
+               Rules: []rbacv1.PolicyRule{\r
+\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "get",\r
+                                       "list",\r
+                               },\r
+                       },\r
+                       rbacv1.PolicyRule{\r
+                               APIGroups: []string{\r
+\r
+                                       "",\r
+                               },\r
+                               Resources: []string{\r
+\r
+                                       "pods/exec",\r
+                               },\r
+                               Verbs: []string{\r
+\r
+                                       "create",\r
+                               },\r
+                       },\r
+               },\r
+               TypeMeta: metav1.TypeMeta{\r
+                       Kind:       "Role",\r
+                       APIVersion: "rbac.authorization.k8s.io/v1",\r
+               },\r
+               ObjectMeta: metav1.ObjectMeta{\r
+                       Name: "assigner-role",\r
+               },\r
+       }\r
+\r
+       return []*rbacv1.Role{role1, role2, role3, role4, role5, role6, role7, role8, role9}\r
+}
\ No newline at end of file