This is an automated email from the ASF dual-hosted git repository.
kichan pushed a commit to branch master
in repository
https://gitbox.apache.org/repos/asf/trafficserver-ingress-controller.git
The following commit(s) were added to refs/heads/master by this push:
new 15122c2 Create apps-rbac.yaml (#190)
15122c2 is described below
commit 15122c22d1122865dd99f8a71424e161cb6b0bb8
Author: Kit Chan <[email protected]>
AuthorDate: Fri Jan 26 08:20:40 2024 -0800
Create apps-rbac.yaml (#190)
---
tests/data/setup/apps/apps-rbac.yaml | 104 +++++++++++++++++++++++++++++++++++
1 file changed, 104 insertions(+)
diff --git a/tests/data/setup/apps/apps-rbac.yaml
b/tests/data/setup/apps/apps-rbac.yaml
new file mode 100644
index 0000000..282f691
--- /dev/null
+++ b/tests/data/setup/apps/apps-rbac.yaml
@@ -0,0 +1,104 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+
+apiVersion: v1
+kind: Namespace
+metadata:
+ name: trafficserver-test-2
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: trafficserver-test-2
+rules:
+- apiGroups:
+ - '*'
+ resources:
+ - ingresses
+ - secrets
+ - services
+ - pods
+ - namespaces
+ - replicationcontrollers
+ - endpoints
+ - configmaps
+ verbs:
+ - get
+ - list
+ - watch
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: trafficserver-test-2
+subjects:
+- kind: ServiceAccount
+ name: default
+ namespace: trafficserver-test-2
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: trafficserver-test-2
+
+---
+
+apiVersion: v1
+kind: Namespace
+metadata:
+ name: trafficserver-test-3
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: trafficserver-test-3
+rules:
+- apiGroups:
+ - '*'
+ resources:
+ - ingresses
+ - secrets
+ - services
+ - pods
+ - namespaces
+ - replicationcontrollers
+ - endpoints
+ - configmaps
+ verbs:
+ - get
+ - list
+ - watch
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: trafficserver-test-3
+subjects:
+- kind: ServiceAccount
+ name: default
+ namespace: trafficserver-test-3
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: trafficserver-test-3