File tree Expand file tree Collapse file tree 8 files changed +18
-17
lines changed Expand file tree Collapse file tree 8 files changed +18
-17
lines changed Original file line number Diff line number Diff line change 1
1
apiVersion : rbac.authorization.k8s.io/v1
2
2
kind : ClusterRoleBinding
3
3
metadata :
4
- name : ack-namespaces-cache- sqs-controller
4
+ name : {{ include " ack-sqs-controller.app.fullname" . }}
5
5
roleRef :
6
6
kind : ClusterRole
7
7
apiGroup : rbac.authorization.k8s.io
8
- name : ack-namespaces-cache- sqs-controller
8
+ name : {{ include " ack-sqs-controller.app.fullname" . }}
9
9
subjects :
10
10
- kind : ServiceAccount
11
11
name : {{ include "ack-sqs-controller.service-account.name" . }}
@@ -14,12 +14,12 @@ subjects:
14
14
apiVersion : rbac.authorization.k8s.io/v1
15
15
kind : RoleBinding
16
16
metadata :
17
- name : ack-configmaps-cache- sqs-controller
17
+ name : {{ include " ack-sqs-controller.app.fullname" . }}
18
18
namespace : {{ .Release.Namespace }}
19
19
roleRef :
20
20
kind : Role
21
21
apiGroup : rbac.authorization.k8s.io
22
- name : ack-configmaps-cache- sqs-controller
22
+ name : {{ include " ack-sqs-controller.app.fullname" . }}
23
23
subjects :
24
24
- kind : ServiceAccount
25
25
name : {{ include "ack-sqs-controller.service-account.name" . }}
Original file line number Diff line number Diff line change 1
1
apiVersion : rbac.authorization.k8s.io/v1
2
2
kind : ClusterRole
3
3
metadata :
4
- name : ack-namespaces-cache- sqs-controller
4
+ name : {{ include " ack-sqs-controller.app.fullname" . }}-clusterrole
5
5
rules :
6
6
- apiGroups :
7
7
- " "
15
15
apiVersion : rbac.authorization.k8s.io/v1
16
16
kind : Role
17
17
metadata :
18
- name : ack-configmaps-cache- sqs-controller
18
+ name : {{ include " ack-sqs-controller.app.fullname" . }}-role
19
19
namespace : {{ .Release.Namespace }}
20
20
rules :
21
21
- apiGroups :
Original file line number Diff line number Diff line change 2
2
apiVersion : rbac.authorization.k8s.io/v1
3
3
kind : ClusterRoleBinding
4
4
metadata :
5
- name : {{ include "ack-sqs-controller.app.fullname" . }}
5
+ name : {{ include "ack-sqs-controller.app.fullname" . }}-rolebinding
6
6
roleRef :
7
7
kind : ClusterRole
8
8
apiGroup : rbac.authorization.k8s.io
9
- name : ack-sqs-controller
9
+ name : {{ include " ack-sqs-controller.app.fullname" . }}
10
10
subjects :
11
11
- kind : ServiceAccount
12
12
name : {{ include "ack-sqs-controller.service-account.name" . }}
@@ -22,12 +22,12 @@ subjects:
22
22
apiVersion : rbac.authorization.k8s.io/v1
23
23
kind : RoleBinding
24
24
metadata :
25
- name : {{ $fullname }}
25
+ name : {{ $fullname }}-{{ . }}
26
26
namespace : {{ . }}
27
27
roleRef :
28
28
kind : Role
29
29
apiGroup : rbac.authorization.k8s.io
30
- name : ack-sqs-controller
30
+ name : {{ $fullname }}-{{ . }}
31
31
subjects :
32
32
- kind : ServiceAccount
33
33
name : {{ $serviceAccountName }}
Original file line number Diff line number Diff line change 1
1
{{ $labels := .Values.role.labels }}
2
2
{{ $rbacRules := include "ack-sqs-controller.rbac-rules" . }}
3
+ {{ $fullname := include "ack-sqs-controller.app.fullname" . }}
3
4
{{ if eq .Values.installScope "cluster" }}
4
5
apiVersion : rbac.authorization.k8s.io/v1
5
6
kind : ClusterRole
6
7
metadata :
7
- name : ack-sqs-controller
8
+ name : {{ include " ack-sqs-controller.app.fullname" . }}
8
9
labels :
9
10
{{- range $key, $value := $labels }}
10
11
{{ $key }}: {{ $value | quote }}
@@ -18,7 +19,7 @@ metadata:
18
19
apiVersion : rbac.authorization.k8s.io/v1
19
20
kind : Role
20
21
metadata :
21
- name : ack-sqs-controller
22
+ name : {{ $fullname }}-{{ . }}
22
23
namespace : {{ . }}
23
24
labels :
24
25
{{- range $key, $value := $labels }}
Original file line number Diff line number Diff line change 2
2
apiVersion : rbac.authorization.k8s.io/v1
3
3
kind : RoleBinding
4
4
metadata :
5
- name : sqs-leader-election-rolebinding
5
+ name : {{ include "ack- sqs-controller.app.fullname" . }}
6
6
{{ if .Values.leaderElection.namespace }}
7
7
namespace : {{ .Values.leaderElection.namespace }}
8
8
{{ else }}
@@ -11,7 +11,7 @@ metadata:
11
11
roleRef :
12
12
apiGroup : rbac.authorization.k8s.io
13
13
kind : Role
14
- name : sqs-leader-election-role
14
+ name : {{ include "ack- sqs-controller.app.fullname" . }}
15
15
subjects :
16
16
- kind : ServiceAccount
17
17
name : {{ include "ack-sqs-controller.service-account.name" . }}
Original file line number Diff line number Diff line change 2
2
apiVersion : rbac.authorization.k8s.io/v1
3
3
kind : Role
4
4
metadata :
5
- name : sqs-leader -election-role
5
+ name : {{ include "ack- sqs-controller.app.fullname" . }} -election
6
6
{{ if .Values.leaderElection.namespace }}
7
7
namespace : {{ .Values.leaderElection.namespace }}
8
8
{{ else }}
Original file line number Diff line number Diff line change @@ -3,7 +3,7 @@ apiVersion: rbac.authorization.k8s.io/v1
3
3
kind : Role
4
4
metadata :
5
5
creationTimestamp : null
6
- name : ack-sqs-reader
6
+ name : {{ include " ack-sqs-controller.app.fullname" . }} -reader
7
7
namespace : {{ .Release.Namespace }}
8
8
rules :
9
9
- apiGroups :
Original file line number Diff line number Diff line change @@ -3,7 +3,7 @@ apiVersion: rbac.authorization.k8s.io/v1
3
3
kind : Role
4
4
metadata :
5
5
creationTimestamp : null
6
- name : ack-sqs-writer
6
+ name : {{ include " ack-sqs-controller.app.fullname" . }} -writer
7
7
namespace : {{ .Release.Namespace }}
8
8
rules :
9
9
- apiGroups :
You can’t perform that action at this time.
0 commit comments