diff --git a/bundle/manifests/mgc-dnsrecord-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml b/bundle/manifests/mgc-dnsrecord-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml new file mode 100644 index 00000000..a7f4e6a8 --- /dev/null +++ b/bundle/manifests/mgc-dnsrecord-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml @@ -0,0 +1,31 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + creationTimestamp: null + labels: + app.kubernetes.io/component: rbac + app.kubernetes.io/created-by: multicluster-gateway-controller + app.kubernetes.io/instance: dnsrecord-editor-role + app.kubernetes.io/managed-by: kustomize + app.kubernetes.io/name: clusterrole + app.kubernetes.io/part-of: multicluster-gateway-controller + name: mgc-dnsrecord-editor-role +rules: +- apiGroups: + - kuadrant.io + resources: + - dnsrecords + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - kuadrant.io + resources: + - dnsrecords/status + verbs: + - get diff --git a/bundle/manifests/mgc-dnsrecord-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml b/bundle/manifests/mgc-dnsrecord-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml new file mode 100644 index 00000000..d4ae6fc4 --- /dev/null +++ b/bundle/manifests/mgc-dnsrecord-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml @@ -0,0 +1,20 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + creationTimestamp: null + name: mgc-dnsrecord-viewer-role +rules: +- apiGroups: + - kuadrant.io + resources: + - dnsrecords + verbs: + - get + - list + - watch +- apiGroups: + - kuadrant.io + resources: + - dnsrecords/status + verbs: + - get diff --git a/bundle/manifests/multicluster-gateway-controller.clusterserviceversion.yaml b/bundle/manifests/multicluster-gateway-controller.clusterserviceversion.yaml index 44de3602..c863f53b 100644 --- a/bundle/manifests/multicluster-gateway-controller.clusterserviceversion.yaml +++ b/bundle/manifests/multicluster-gateway-controller.clusterserviceversion.yaml @@ -4,7 +4,7 @@ metadata: annotations: alm-examples: '[]' capabilities: Basic Install - createdAt: "2023-11-07T08:57:03Z" + createdAt: "2023-11-09T08:42:12Z" operators.operatorframework.io/builder: operator-sdk-v1.28.0 operators.operatorframework.io/project_layout: go.kubebuilder.io/v3 name: multicluster-gateway-controller.v0.0.0 @@ -506,7 +506,7 @@ spec: - get - patch - update - serviceAccountName: mgc-kuadrant-policy-controller + serviceAccountName: mgc-policy-controller deployments: - label: app.kubernetes.io/component: manager @@ -621,14 +621,8 @@ spec: serviceAccountName: mgc-add-on-manager terminationGracePeriodSeconds: 10 - label: - app.kubernetes.io/component: manager - app.kubernetes.io/created-by: policy-controller - app.kubernetes.io/instance: policy-controller - app.kubernetes.io/managed-by: kustomize - app.kubernetes.io/name: deployment - app.kubernetes.io/part-of: kuadrant control-plane: policy-controller - name: mgc-kuadrant-policy-controller + name: mgc-policy-controller spec: replicas: 1 selector: @@ -676,7 +670,7 @@ spec: - ALL securityContext: runAsNonRoot: true - serviceAccountName: mgc-kuadrant-policy-controller + serviceAccountName: mgc-policy-controller terminationGracePeriodSeconds: 10 permissions: - rules: @@ -744,7 +738,7 @@ spec: verbs: - create - patch - serviceAccountName: mgc-kuadrant-policy-controller + serviceAccountName: mgc-policy-controller strategy: deployment installModes: - supported: false diff --git a/config/policy-controller/default/kustomization.yaml b/config/policy-controller/default/kustomization.yaml index 6ccbcf06..dbd82259 100644 --- a/config/policy-controller/default/kustomization.yaml +++ b/config/policy-controller/default/kustomization.yaml @@ -1,11 +1,4 @@ -# Value of this field is prepended to the -# names of all resources, e.g. a deployment named -# "wordpress" becomes "alices-wordpress". -# Note that it should also match with the prefix (text before '-') of the namespace -# field above. -namePrefix: kuadrant- - resources: - ../manager diff --git a/config/policy-controller/manager/manager.yaml b/config/policy-controller/manager/manager.yaml index c56f2358..738c07bc 100644 --- a/config/policy-controller/manager/manager.yaml +++ b/config/policy-controller/manager/manager.yaml @@ -12,12 +12,6 @@ metadata: namespace: system labels: control-plane: policy-controller - app.kubernetes.io/name: deployment - app.kubernetes.io/instance: policy-controller - app.kubernetes.io/component: manager - app.kubernetes.io/created-by: policy-controller - app.kubernetes.io/part-of: kuadrant - app.kubernetes.io/managed-by: kustomize spec: selector: matchLabels: diff --git a/config/policy-controller/rbac/dnsrecord_viewer_role.yaml b/config/policy-controller/rbac/dnsrecord_viewer_role.yaml index 4071ab0e..3dbb4118 100644 --- a/config/policy-controller/rbac/dnsrecord_viewer_role.yaml +++ b/config/policy-controller/rbac/dnsrecord_viewer_role.yaml @@ -2,13 +2,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - labels: - app.kubernetes.io/name: clusterrole - app.kubernetes.io/instance: dnsrecord-viewer-role - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: multicluster-gateway-controller - app.kubernetes.io/part-of: multicluster-gateway-controller - app.kubernetes.io/managed-by: kustomize name: dnsrecord-viewer-role rules: - apiGroups: diff --git a/config/policy-controller/rbac/leader_election_role.yaml b/config/policy-controller/rbac/leader_election_role.yaml index 1e08c2a8..9ec234e8 100644 --- a/config/policy-controller/rbac/leader_election_role.yaml +++ b/config/policy-controller/rbac/leader_election_role.yaml @@ -2,13 +2,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: - labels: - app.kubernetes.io/name: role - app.kubernetes.io/instance: policy-controller-leader-election-role - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: policy-controller - app.kubernetes.io/part-of: kuadrant - app.kubernetes.io/managed-by: kustomize name: policy-controller-leader-election-role namespace: system rules: diff --git a/config/policy-controller/rbac/leader_election_role_binding.yaml b/config/policy-controller/rbac/leader_election_role_binding.yaml index fd6f1f18..8ee1aa99 100644 --- a/config/policy-controller/rbac/leader_election_role_binding.yaml +++ b/config/policy-controller/rbac/leader_election_role_binding.yaml @@ -2,12 +2,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: - app.kubernetes.io/name: rolebinding - app.kubernetes.io/instance: leader-election-rolebinding - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: multicluster-gateway-controller - app.kubernetes.io/part-of: multicluster-gateway-controller - app.kubernetes.io/managed-by: kustomize name: policy-controller-leader-election-rolebinding roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/config/policy-controller/rbac/managedzone_editor_role.yaml b/config/policy-controller/rbac/managedzone_editor_role.yaml index 011eed32..a48a436d 100644 --- a/config/policy-controller/rbac/managedzone_editor_role.yaml +++ b/config/policy-controller/rbac/managedzone_editor_role.yaml @@ -2,13 +2,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - labels: - app.kubernetes.io/name: clusterrole - app.kubernetes.io/instance: managedzone-editor-role - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: multicluster-gateway-controller - app.kubernetes.io/part-of: multicluster-gateway-controller - app.kubernetes.io/managed-by: kustomize name: managedzone-editor-role rules: - apiGroups: diff --git a/config/policy-controller/rbac/managedzone_viewer_role.yaml b/config/policy-controller/rbac/managedzone_viewer_role.yaml index 5cddd24a..6da4a06f 100644 --- a/config/policy-controller/rbac/managedzone_viewer_role.yaml +++ b/config/policy-controller/rbac/managedzone_viewer_role.yaml @@ -2,13 +2,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - labels: - app.kubernetes.io/name: clusterrole - app.kubernetes.io/instance: managedzone-viewer-role - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: multicluster-gateway-controller - app.kubernetes.io/part-of: multicluster-gateway-controller - app.kubernetes.io/managed-by: kustomize name: managedzone-viewer-role rules: - apiGroups: diff --git a/config/policy-controller/rbac/rolebinding.yaml b/config/policy-controller/rbac/rolebinding.yaml index 2202796e..97ca4495 100644 --- a/config/policy-controller/rbac/rolebinding.yaml +++ b/config/policy-controller/rbac/rolebinding.yaml @@ -1,13 +1,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: - labels: - app.kubernetes.io/name: clusterrolebinding - app.kubernetes.io/instance: manager-rolebinding - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: policy-controller - app.kubernetes.io/part-of: kuadrant - app.kubernetes.io/managed-by: kustomize name: policy-controller-rolebinding roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/config/policy-controller/rbac/service_account.yaml b/config/policy-controller/rbac/service_account.yaml index 9a18634f..477b2bd7 100644 --- a/config/policy-controller/rbac/service_account.yaml +++ b/config/policy-controller/rbac/service_account.yaml @@ -1,12 +1,5 @@ apiVersion: v1 kind: ServiceAccount metadata: - labels: - app.kubernetes.io/name: serviceaccount - app.kubernetes.io/instance: policy-controller - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: policy-controller - app.kubernetes.io/part-of: kuadrant - app.kubernetes.io/managed-by: kustomize name: policy-controller namespace: system diff --git a/config/policy-controller/rbac/tlspolicy_editor_role.yaml b/config/policy-controller/rbac/tlspolicy_editor_role.yaml index b01f3d1b..9127ef6b 100644 --- a/config/policy-controller/rbac/tlspolicy_editor_role.yaml +++ b/config/policy-controller/rbac/tlspolicy_editor_role.yaml @@ -2,13 +2,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - labels: - app.kubernetes.io/name: clusterrole - app.kubernetes.io/instance: tlspolicy-editor-role - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: tmp - app.kubernetes.io/part-of: tmp - app.kubernetes.io/managed-by: kustomize name: tlspolicy-editor-role rules: - apiGroups: diff --git a/config/policy-controller/rbac/tlspolicy_viewer_role.yaml b/config/policy-controller/rbac/tlspolicy_viewer_role.yaml index 51e6ddfa..c6fcb3b8 100644 --- a/config/policy-controller/rbac/tlspolicy_viewer_role.yaml +++ b/config/policy-controller/rbac/tlspolicy_viewer_role.yaml @@ -2,13 +2,6 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - labels: - app.kubernetes.io/name: clusterrole - app.kubernetes.io/instance: tlspolicy-viewer-role - app.kubernetes.io/component: rbac - app.kubernetes.io/created-by: tmp - app.kubernetes.io/part-of: tmp - app.kubernetes.io/managed-by: kustomize name: tlspolicy-viewer-role rules: - apiGroups: diff --git a/config/prometheus/policy-controller-monitor.yaml b/config/prometheus/policy-controller-monitor.yaml index 70a5314b..d8ff863c 100644 --- a/config/prometheus/policy-controller-monitor.yaml +++ b/config/prometheus/policy-controller-monitor.yaml @@ -4,12 +4,6 @@ kind: ServiceMonitor metadata: labels: control-plane: policy-controller - app.kubernetes.io/name: servicemonitor - app.kubernetes.io/instance: policy-controller-metrics-monitor - app.kubernetes.io/component: metrics - app.kubernetes.io/created-by: policy-controller - app.kubernetes.io/part-of: kuadrant - app.kubernetes.io/managed-by: kustomize name: policy-controller-metrics-monitor namespace: system spec: