Skip to content
This repository has been archived by the owner on Nov 7, 2019. It is now read-only.

Commit

Permalink
Adding Additional Roles and Removing Namespaces
Browse files Browse the repository at this point in the history
**Why:**

* Allows deployment using the manifest file

Signed-off-by: Christopher Hein <me@christopherhein.com>
  • Loading branch information
christopherhein committed Aug 25, 2018
1 parent ea7cae9 commit 1b816a2
Showing 1 changed file with 13 additions and 3 deletions.
16 changes: 13 additions & 3 deletions configs/aws-operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,6 @@ items:
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: aws-operator
namespace: aws-operator
rules:
- apiGroups:
- v1
Expand All @@ -26,6 +25,17 @@ items:
- create
- delete
- update
- apiGroups:
- extensions
resources:
- thirdpartyresources
verbs:
- get
- list
- watch
- create
- delete
- update
- apiGroups:
- apiextensions.k8s.io
resources:
Expand Down Expand Up @@ -53,15 +63,14 @@ items:
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: aws-operator
namespace: aws-operator
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: aws-operator
subjects:
- kind: ServiceAccount
name: aws-operator
namespace: default
namespace: aws-operator

- kind: Deployment
apiVersion: apps/v1beta1
Expand All @@ -86,6 +95,7 @@ items:
- name: AWS_SECRET_ACCESS_KEY
value:
args:
- server
- --cluster-name=<cluster-name>
- --region=<region>
- --bucket=<bucket-name>
Expand Down

0 comments on commit 1b816a2

Please sign in to comment.