aboutsummaryrefslogtreecommitdiffstats
path: root/certServiceK8sExternalProvider/deploy/roles.yaml
diff options
context:
space:
mode:
authorJan Malkiewicz <jan.malkiewicz@nokia.com>2020-10-15 09:04:18 +0200
committerJan Malkiewicz <jan.malkiewicz@nokia.com>2020-10-15 16:01:53 +0200
commitf5fb53b031c2f1c4bc4872de59b9774a559d786f (patch)
tree2345c86aeaedfef576b513c3b325ce303c1261c7 /certServiceK8sExternalProvider/deploy/roles.yaml
parent720466562b0ea1e67ff36f44e0d95645837316d4 (diff)
[OOM-K8S-CERT-EXTERNAL-PROVIDER] Mock implementaion enhanced (part II)
Rename CertServiceIssuer -> CMPv2Issuer Checking for Issuer.Kind (has to be CMPv2Issuer) Introduced exit codes Refactoring file names and packages Moved tests to main package (according to GOlang convention) Issue-ID: OOM-2559 Signed-off-by: Jan Malkiewicz <jan.malkiewicz@nokia.com> Change-Id: I710d9f6c9bd22318e5152e5215b78d5a9e7b4540
Diffstat (limited to 'certServiceK8sExternalProvider/deploy/roles.yaml')
-rw-r--r--certServiceK8sExternalProvider/deploy/roles.yaml22
1 files changed, 11 insertions, 11 deletions
diff --git a/certServiceK8sExternalProvider/deploy/roles.yaml b/certServiceK8sExternalProvider/deploy/roles.yaml
index 8b47c886..61691f4f 100644
--- a/certServiceK8sExternalProvider/deploy/roles.yaml
+++ b/certServiceK8sExternalProvider/deploy/roles.yaml
@@ -25,7 +25,7 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
- name: certservice-issuer-leader-election-role
+ name: cmpv2-issuer-leader-election-role
namespace: onap
rules:
- apiGroups:
@@ -58,7 +58,7 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
- name: certservice-issuer-manager-role
+ name: cmpv2-issuer-manager-role
rules:
- apiGroups:
- ""
@@ -95,7 +95,7 @@ rules:
- apiGroups:
- certmanager.onap.org
resources:
- - certserviceissuers
+ - cmpv2issuers
verbs:
- create
- delete
@@ -107,7 +107,7 @@ rules:
- apiGroups:
- certmanager.onap.org
resources:
- - certserviceissuers/status
+ - cmpv2issuers/status
verbs:
- get
- patch
@@ -116,7 +116,7 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
- name: certservice-issuer-proxy-role
+ name: cmpv2-issuer-proxy-role
rules:
- apiGroups:
- authentication.k8s.io
@@ -134,12 +134,12 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
- name: certservice-issuer-leader-election-rolebinding
+ name: cmpv2-issuer-leader-election-rolebinding
namespace: onap
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
- name: certservice-issuer-leader-election-role
+ name: cmpv2-issuer-leader-election-role
subjects:
- kind: ServiceAccount
name: default
@@ -148,11 +148,11 @@ subjects:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
- name: certservice-issuer-manager-rolebinding
+ name: cmpv2-issuer-manager-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
- name: certservice-issuer-manager-role
+ name: cmpv2-issuer-manager-role
subjects:
- kind: ServiceAccount
name: default
@@ -161,11 +161,11 @@ subjects:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
- name: certservice-issuer-proxy-rolebinding
+ name: cmpv2-issuer-proxy-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
- name: certservice-issuer-proxy-role
+ name: cmpv2-issuer-proxy-role
subjects:
- kind: ServiceAccount
name: default