|
| 1 | +--- |
| 2 | + |
| 3 | +# SPDX-FileCopyrightText: 2025 Intel Corporation |
| 4 | +# |
| 5 | +# SPDX-License-Identifier: Apache-2.0 |
| 6 | +--- |
| 7 | + |
| 8 | +apiVersion: v1 |
| 9 | +kind: ServiceAccount |
| 10 | +metadata: |
| 11 | + name: {{ include "iam.serviceAccountName" . }} |
| 12 | + namespace: {{ default .Release.Namespace .Values.global.namespace }} |
| 13 | +automountServiceAccountToken: true |
| 14 | +--- |
| 15 | +apiVersion: rbac.authorization.k8s.io/v1 |
| 16 | +kind: ClusterRole |
| 17 | +metadata: |
| 18 | + name: tenant-init-installer-role |
| 19 | + namespace: {{ default .Release.Namespace .Values.global.namespace }} |
| 20 | +rules: |
| 21 | +- apiGroups: ["apiextensions.k8s.io"] |
| 22 | + resources: ["customresourcedefinitions"] |
| 23 | + verbs: ["get","list"] |
| 24 | +# Access to organization and project CRDs |
| 25 | +- apiGroups: ["orgactivewatcher.edge-orchestrator.intel.com"] |
| 26 | + resources: ["orgactivewatchers"] |
| 27 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 28 | +- apiGroups: ["orgwatcher.edge-orchestrator.intel.com"] |
| 29 | + resources: ["orgwatchers"] |
| 30 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 31 | +- apiGroups: ["projectactivewatcher.edge-orchestrator.intel.com"] |
| 32 | + resources: ["projectactivewatchers"] |
| 33 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 34 | +- apiGroups: ["projectwatcher.edge-orchestrator.intel.com"] |
| 35 | + resources: ["projectwatchers"] |
| 36 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 37 | +# Access to runtime org and project resources |
| 38 | +- apiGroups: ["runtimeorg.edge-orchestrator.intel.com"] |
| 39 | + resources: ["runtimeorgs"] |
| 40 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 41 | +- apiGroups: ["runtimeproject.edge-orchestrator.intel.com"] |
| 42 | + resources: ["runtimeprojects"] |
| 43 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 44 | +# Access to org resources |
| 45 | +- apiGroups: ["org.edge-orchestrator.intel.com"] |
| 46 | + resources: ["orgs"] |
| 47 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 48 | +# Access to project resources |
| 49 | +- apiGroups: ["project.edge-orchestrator.intel.com"] |
| 50 | + resources: ["projects"] |
| 51 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 52 | +# Access to config resources |
| 53 | +- apiGroups: ["config.edge-orchestrator.intel.com"] |
| 54 | + resources: ["configs"] |
| 55 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 56 | +# Access to folder resources |
| 57 | +- apiGroups: ["folder.edge-orchestrator.intel.com"] |
| 58 | + resources: ["folders"] |
| 59 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 60 | +# Access to tenancy resources |
| 61 | +- apiGroups: ["tenancy.edge-orchestrator.intel.com"] |
| 62 | + resources: ["multitenancies"] |
| 63 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 64 | +# Access to runtime folder resources |
| 65 | +- apiGroups: ["runtimefolder.edge-orchestrator.intel.com"] |
| 66 | + resources: ["runtimefolders"] |
| 67 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 68 | +# Access to runtime resources |
| 69 | +- apiGroups: ["runtime.edge-orchestrator.intel.com"] |
| 70 | + resources: ["runtimes"] |
| 71 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 72 | +# Access to API mapping config resources |
| 73 | +- apiGroups: ["apimappingconfig.edge-orchestrator.intel.com"] |
| 74 | + resources: ["apimappingconfigs"] |
| 75 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 76 | +# Access to network resources |
| 77 | +- apiGroups: ["network.edge-orchestrator.intel.com"] |
| 78 | + resources: ["networks"] |
| 79 | + verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] |
| 80 | +# Access to pods |
| 81 | +- apiGroups: [""] |
| 82 | + resources: ["pods", "namespaces", "configmaps", "services"] |
| 83 | + verbs: ["get", "list", "watch", "create", "update"] |
| 84 | +# Access to secrets |
| 85 | +- apiGroups: [""] |
| 86 | + resources: ["secrets"] |
| 87 | + verbs: ["get", "list", "watch", "create", "update"] |
| 88 | +--- |
| 89 | +apiVersion: rbac.authorization.k8s.io/v1 |
| 90 | +kind: ClusterRoleBinding |
| 91 | +metadata: |
| 92 | + name: tenant-init-installer |
| 93 | + namespace: {{ default .Release.Namespace .Values.global.namespace }} |
| 94 | +subjects: |
| 95 | +- kind: ServiceAccount |
| 96 | + name: {{ include "iam.serviceAccountName" . }} |
| 97 | + namespace: {{ default .Release.Namespace .Values.global.namespace }} |
| 98 | +roleRef: |
| 99 | + kind: ClusterRole |
| 100 | + name: tenant-init-installer-role |
| 101 | + apiGroup: rbac.authorization.k8s.io |
| 102 | + |
0 commit comments