This is an automated email from the ASF dual-hosted git repository.

kichan pushed a commit to branch master
in repository 
https://gitbox.apache.org/repos/asf/trafficserver-ingress-controller.git


The following commit(s) were added to refs/heads/master by this push:
     new 15122c2  Create apps-rbac.yaml (#190)
15122c2 is described below

commit 15122c22d1122865dd99f8a71424e161cb6b0bb8
Author: Kit Chan <[email protected]>
AuthorDate: Fri Jan 26 08:20:40 2024 -0800

    Create apps-rbac.yaml (#190)
---
 tests/data/setup/apps/apps-rbac.yaml | 104 +++++++++++++++++++++++++++++++++++
 1 file changed, 104 insertions(+)

diff --git a/tests/data/setup/apps/apps-rbac.yaml 
b/tests/data/setup/apps/apps-rbac.yaml
new file mode 100644
index 0000000..282f691
--- /dev/null
+++ b/tests/data/setup/apps/apps-rbac.yaml
@@ -0,0 +1,104 @@
+#  Licensed to the Apache Software Foundation (ASF) under one
+#  or more contributor license agreements.  See the NOTICE file
+#  distributed with this work for additional information
+#  regarding copyright ownership.  The ASF licenses this file
+#  to you under the Apache License, Version 2.0 (the
+#  "License"); you may not use this file except in compliance
+#  with the License.  You may obtain a copy of the License at
+#
+#      http://www.apache.org/licenses/LICENSE-2.0
+#
+#  Unless required by applicable law or agreed to in writing, software
+#  distributed under the License is distributed on an "AS IS" BASIS,
+#  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+#  See the License for the specific language governing permissions and
+#  limitations under the License.
+
+
+apiVersion: v1
+kind: Namespace
+metadata:
+  name: trafficserver-test-2
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+  name: trafficserver-test-2
+rules:
+- apiGroups:
+  - '*'
+  resources:
+  - ingresses
+  - secrets
+  - services
+  - pods
+  - namespaces
+  - replicationcontrollers
+  - endpoints
+  - configmaps
+  verbs:
+  - get
+  - list
+  - watch
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+  name: trafficserver-test-2
+subjects:
+- kind: ServiceAccount
+  name: default
+  namespace: trafficserver-test-2
+roleRef:
+  apiGroup: rbac.authorization.k8s.io
+  kind: ClusterRole
+  name: trafficserver-test-2
+
+---
+
+apiVersion: v1
+kind: Namespace
+metadata:
+  name: trafficserver-test-3
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+  name: trafficserver-test-3
+rules:
+- apiGroups:
+  - '*'
+  resources:
+  - ingresses
+  - secrets
+  - services
+  - pods
+  - namespaces
+  - replicationcontrollers
+  - endpoints
+  - configmaps
+  verbs:
+  - get
+  - list
+  - watch
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+  name: trafficserver-test-3
+subjects:
+- kind: ServiceAccount
+  name: default
+  namespace: trafficserver-test-3
+roleRef:
+  apiGroup: rbac.authorization.k8s.io
+  kind: ClusterRole
+  name: trafficserver-test-3

Reply via email to