1
1
---
2
2
# Source: mongodb-enterprise-operator/templates/operator-roles.yaml
3
+ ---
3
4
apiVersion : v1
4
5
kind : ServiceAccount
5
6
metadata :
6
7
name : enterprise-operator
7
8
namespace : mongodb
9
+
10
+
8
11
---
9
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
10
- kind : ClusterRole
11
- apiVersion : rbac.authorization.k8s.io/v1
12
- metadata :
13
- name : enterprise-operator-mongodb-certs
14
- rules :
15
- - apiGroups :
16
- - certificates.k8s.io
17
- resources :
18
- - certificatesigningrequests
19
- verbs :
20
- - get
21
- - create
22
- - list
23
- - watch
24
- ---
25
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
26
- kind : ClusterRoleBinding
27
- apiVersion : rbac.authorization.k8s.io/v1
28
- metadata :
29
- name : enterprise-operator-mongodb-webhook-binding
30
- namespace : mongodb
31
- roleRef :
32
- apiGroup : rbac.authorization.k8s.io
33
- kind : ClusterRole
34
- name : mongodb-enterprise-operator-mongodb-webhook
35
- subjects :
36
- - kind : ServiceAccount
37
- name : enterprise-operator
38
- namespace : mongodb
39
- ---
40
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
41
- kind : ClusterRoleBinding
42
- apiVersion : rbac.authorization.k8s.io/v1
43
- metadata :
44
- name : enterprise-operator-mongodb-certs-binding
45
- namespace : mongodb
46
- roleRef :
47
- apiGroup : rbac.authorization.k8s.io
48
- kind : ClusterRole
49
- name : enterprise-operator-mongodb-certs
50
- subjects :
51
- - kind : ServiceAccount
52
- name : enterprise-operator
53
- namespace : mongodb
54
- ---
55
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
56
12
kind : Role
57
13
apiVersion : rbac.authorization.k8s.io/v1
58
14
metadata :
@@ -102,7 +58,21 @@ rules:
102
58
# definitions. The validating webhooks are optional so this can be removed if
103
59
# necessary.
104
60
---
105
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
61
+ kind : ClusterRoleBinding
62
+ apiVersion : rbac.authorization.k8s.io/v1
63
+ metadata :
64
+ name : enterprise-operator-mongodb-webhook-binding
65
+ namespace : mongodb
66
+ roleRef :
67
+ apiGroup : rbac.authorization.k8s.io
68
+ kind : ClusterRole
69
+ name : mongodb-enterprise-operator-mongodb-webhook
70
+ subjects :
71
+ - kind : ServiceAccount
72
+ name : enterprise-operator
73
+ namespace : mongodb
74
+
75
+ ---
106
76
kind : RoleBinding
107
77
apiVersion : rbac.authorization.k8s.io/v1
108
78
metadata :
@@ -119,22 +89,55 @@ subjects:
119
89
120
90
# This ClusterRole is needed if the user wants to use the Kubernetes CA
121
91
# infrastructure to generate certificates.
92
+ ---
93
+ kind : ClusterRole
94
+ apiVersion : rbac.authorization.k8s.io/v1
95
+ metadata :
96
+ name : enterprise-operator-mongodb-certs
97
+ rules :
98
+ - apiGroups :
99
+ - certificates.k8s.io
100
+ resources :
101
+ - certificatesigningrequests
102
+ verbs :
103
+ - get
104
+ - create
105
+ - list
106
+ - watch
107
+
108
+ ---
109
+ kind : ClusterRoleBinding
110
+ apiVersion : rbac.authorization.k8s.io/v1
111
+ metadata :
112
+ name : enterprise-operator-mongodb-certs-binding
113
+ namespace : mongodb
114
+ roleRef :
115
+ apiGroup : rbac.authorization.k8s.io
116
+ kind : ClusterRole
117
+ name : enterprise-operator-mongodb-certs
118
+ subjects :
119
+ - kind : ServiceAccount
120
+ name : enterprise-operator
121
+ namespace : mongodb
122
+
123
+
122
124
---
123
125
# Source: mongodb-enterprise-operator/templates/database-roles.yaml
126
+ ---
124
127
apiVersion : v1
125
128
kind : ServiceAccount
126
129
metadata :
127
130
name : mongodb-enterprise-appdb
128
131
namespace : mongodb
132
+
129
133
---
130
- # Source: mongodb-enterprise-operator/templates/database-roles.yaml
131
134
apiVersion : v1
132
135
kind : ServiceAccount
133
136
metadata :
134
137
name : mongodb-enterprise-database-pods
135
138
namespace : mongodb
139
+
136
140
---
137
- # Source: mongodb-enterprise-operator/templates/database-roles.yaml
138
141
kind : Role
139
142
apiVersion : rbac.authorization.k8s.io/v1
140
143
metadata :
@@ -147,8 +150,8 @@ rules:
147
150
- configmaps
148
151
verbs :
149
152
- get
153
+
150
154
---
151
- # Source: mongodb-enterprise-operator/templates/database-roles.yaml
152
155
kind : RoleBinding
153
156
apiVersion : rbac.authorization.k8s.io/v1
154
157
metadata :
@@ -162,8 +165,10 @@ subjects:
162
165
- kind : ServiceAccount
163
166
name : mongodb-enterprise-appdb
164
167
namespace : mongodb
168
+
165
169
---
166
170
# Source: mongodb-enterprise-operator/templates/operator.yaml
171
+ ---
167
172
apiVersion : apps/v1
168
173
kind : Deployment
169
174
metadata :
@@ -209,7 +214,7 @@ spec:
209
214
- name : IMAGE_PULL_POLICY
210
215
value : Always
211
216
- name : OPS_MANAGER_IMAGE_REPOSITORY
212
- value : registry.connect.redhat.com/mongodb
217
+ value : registry.connect.redhat.com/mongodb/mongodb-enterprise-ops-manager
213
218
- name : INIT_OPS_MANAGER_IMAGE_REPOSITORY
214
219
value : registry.connect.redhat.com/mongodb/mongodb-enterprise-init-ops-manager
215
220
- name : INIT_OPS_MANAGER_VERSION
@@ -221,4 +226,4 @@ spec:
221
226
- name : OPS_MANAGER_IMAGE_PULL_POLICY
222
227
value : Always
223
228
- name : APPDB_IMAGE_REPOSITORY
224
- value : registry.connect.redhat.com/mongodb
229
+ value : registry.connect.redhat.com/mongodb/mongodb-enterprise-appdb
0 commit comments