File tree 3 files changed +10
-26
lines changed
3 files changed +10
-26
lines changed Original file line number Diff line number Diff line change @@ -1934,5 +1934,13 @@ func createNotReadyEventValidationMap() map[string]bool {
1934
1934
match [normalCreateSuccess + " *v1.Secret cdi-uploadserver-client-cert" ] = false
1935
1935
match [normalCreateSuccess + " *v1.Service cdi-prometheus-metrics" ] = false
1936
1936
match [normalCreateEnsured + " SecurityContextConstraint exists" ] = false
1937
+
1938
+ // Forklift
1939
+ match [normalCreateSuccess + " *v1.ClusterRole forklift.cdi.kubevirt.io:admin" ] = false
1940
+ match [normalCreateSuccess + " *v1.ClusterRole forklift.cdi.kubevirt.io:edit" ] = false
1941
+ match [normalCreateSuccess + " *v1.ClusterRole forklift.cdi.kubevirt.io:view" ] = false
1942
+ match [normalCreateSuccess + " *v1.ClusterRole forklift.cdi.kubevirt.io:config-reader" ] = false
1943
+ match [normalCreateSuccess + " *v1.ClusterRoleBinding forklift.cdi.kubevirt.io:config-reader" ] = false
1944
+
1937
1945
return match
1938
1946
}
Original file line number Diff line number Diff line change @@ -165,9 +165,11 @@ func getControllerClusterPolicyRules() []rbacv1.PolicyRule {
165
165
"get" ,
166
166
},
167
167
},
168
+ // "*" permissions are usually bad, but it makes sense for CDI to have them as it controls everything related
168
169
{
169
170
APIGroups : []string {
170
171
"cdi.kubevirt.io" ,
172
+ "forklift.cdi.kubevirt.io" ,
171
173
},
172
174
Resources : []string {
173
175
"*" ,
@@ -266,18 +268,6 @@ func getControllerClusterPolicyRules() []rbacv1.PolicyRule {
266
268
"update" ,
267
269
},
268
270
},
269
- {
270
- APIGroups : []string {
271
- "forklift.cdi.kubevirt.io" ,
272
- },
273
- Resources : []string {
274
- "ovirtvolumepopulators" ,
275
- "openstackvolumepopulators" ,
276
- },
277
- Verbs : []string {
278
- "*" ,
279
- },
280
- },
281
271
}
282
272
}
283
273
Original file line number Diff line number Diff line change @@ -168,20 +168,6 @@ func createConfigReaderClusterRole(name string) *rbacv1.ClusterRole {
168
168
"watch" ,
169
169
},
170
170
},
171
- {
172
- APIGroups : []string {
173
- "forklift.cdi.kubevirt.io" ,
174
- },
175
- Resources : []string {
176
- "ovirtvolumepopulators" ,
177
- "openstackvolumepopulators" ,
178
- },
179
- Verbs : []string {
180
- "get" ,
181
- "list" ,
182
- "watch" ,
183
- },
184
- },
185
171
}
186
172
187
173
return utils .ResourceBuilder .CreateClusterRole (name , rules )
You can’t perform that action at this time.
0 commit comments