Skip to content

Commit 3959edd

Browse files
Merge pull request #20852 from luksa/service_catalog_namespaced_rbac
Add namespaced servicebrokers, serviceclasses and serviceplans to adm…
2 parents a57e2cc + 7d0e205 commit 3959edd

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

pkg/oc/clusteradd/components/service-catalog/service_catalog.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ func getServiceCatalogClusterRoles() []rbacv1.ClusterRole {
120120
Labels: map[string]string{"rbac.authorization.k8s.io/aggregate-to-admin": "true"},
121121
},
122122
Rules: []rbacv1.PolicyRule{
123-
rbacv1helpers.NewRule("create", "update", "delete", "get", "list", "watch", "patch").Groups("servicecatalog.k8s.io").Resources("serviceinstances", "servicebindings").RuleOrDie(),
123+
rbacv1helpers.NewRule("create", "update", "delete", "get", "list", "watch", "patch").Groups("servicecatalog.k8s.io").Resources("serviceinstances", "servicebindings", "servicebrokers", "serviceclasses", "serviceplans").RuleOrDie(),
124124
rbacv1helpers.NewRule("create", "update", "delete", "get", "list", "watch").Groups("settings.k8s.io").Resources("podpresets").RuleOrDie(),
125125
},
126126
},
@@ -130,7 +130,7 @@ func getServiceCatalogClusterRoles() []rbacv1.ClusterRole {
130130
Labels: map[string]string{"rbac.authorization.k8s.io/aggregate-to-edit": "true"},
131131
},
132132
Rules: []rbacv1.PolicyRule{
133-
rbacv1helpers.NewRule("create", "update", "delete", "get", "list", "watch", "patch").Groups("servicecatalog.k8s.io").Resources("serviceinstances", "servicebindings").RuleOrDie(),
133+
rbacv1helpers.NewRule("create", "update", "delete", "get", "list", "watch", "patch").Groups("servicecatalog.k8s.io").Resources("serviceinstances", "servicebindings", "servicebrokers", "serviceclasses", "serviceplans").RuleOrDie(),
134134
rbacv1helpers.NewRule("create", "update", "delete", "get", "list", "watch").Groups("settings.k8s.io").Resources("podpresets").RuleOrDie(),
135135
},
136136
},
@@ -140,7 +140,7 @@ func getServiceCatalogClusterRoles() []rbacv1.ClusterRole {
140140
Labels: map[string]string{"rbac.authorization.k8s.io/aggregate-to-view": "true"},
141141
},
142142
Rules: []rbacv1.PolicyRule{
143-
rbacv1helpers.NewRule("get", "list", "watch").Groups("servicecatalog.k8s.io").Resources("serviceinstances", "servicebindings").RuleOrDie(),
143+
rbacv1helpers.NewRule("get", "list", "watch").Groups("servicecatalog.k8s.io").Resources("serviceinstances", "servicebindings", "servicebrokers", "serviceclasses", "serviceplans").RuleOrDie(),
144144
},
145145
},
146146
{

0 commit comments

Comments
 (0)