Make service-cidrs-controller role feature-gated
This commit is contained in:
		@@ -369,16 +369,18 @@ func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding)
 | 
				
			|||||||
			eventsRule(),
 | 
								eventsRule(),
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
	addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{
 | 
						if utilfeature.DefaultFeatureGate.Enabled(features.MultiCIDRServiceAllocator) {
 | 
				
			||||||
		ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-cidrs-controller"},
 | 
							addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{
 | 
				
			||||||
		Rules: []rbacv1.PolicyRule{
 | 
								ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-cidrs-controller"},
 | 
				
			||||||
			rbacv1helpers.NewRule("get", "list", "watch", "patch", "update").Groups(networkingGroup).Resources("servicecidrs").RuleOrDie(),
 | 
								Rules: []rbacv1.PolicyRule{
 | 
				
			||||||
			rbacv1helpers.NewRule("patch", "update").Groups(networkingGroup).Resources("servicecidrs/finalizers").RuleOrDie(),
 | 
									rbacv1helpers.NewRule("get", "list", "watch", "patch", "update").Groups(networkingGroup).Resources("servicecidrs").RuleOrDie(),
 | 
				
			||||||
			rbacv1helpers.NewRule("patch", "update").Groups(networkingGroup).Resources("servicecidrs/status").RuleOrDie(),
 | 
									rbacv1helpers.NewRule("patch", "update").Groups(networkingGroup).Resources("servicecidrs/finalizers").RuleOrDie(),
 | 
				
			||||||
			rbacv1helpers.NewRule("get", "list", "watch").Groups(networkingGroup).Resources("ipaddresses").RuleOrDie(),
 | 
									rbacv1helpers.NewRule("patch", "update").Groups(networkingGroup).Resources("servicecidrs/status").RuleOrDie(),
 | 
				
			||||||
			eventsRule(),
 | 
									rbacv1helpers.NewRule("get", "list", "watch").Groups(networkingGroup).Resources("ipaddresses").RuleOrDie(),
 | 
				
			||||||
		},
 | 
									eventsRule(),
 | 
				
			||||||
	})
 | 
								},
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	addControllerRole(&controllerRoles, &controllerRoleBindings, func() rbacv1.ClusterRole {
 | 
						addControllerRole(&controllerRoles, &controllerRoleBindings, func() rbacv1.ClusterRole {
 | 
				
			||||||
		role := rbacv1.ClusterRole{
 | 
							role := rbacv1.ClusterRole{
 | 
				
			||||||
			ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "statefulset-controller"},
 | 
								ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "statefulset-controller"},
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -476,23 +476,6 @@ items:
 | 
				
			|||||||
  - kind: ServiceAccount
 | 
					  - kind: ServiceAccount
 | 
				
			||||||
    name: service-account-controller
 | 
					    name: service-account-controller
 | 
				
			||||||
    namespace: kube-system
 | 
					    namespace: kube-system
 | 
				
			||||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
					 | 
				
			||||||
  kind: ClusterRoleBinding
 | 
					 | 
				
			||||||
  metadata:
 | 
					 | 
				
			||||||
    annotations:
 | 
					 | 
				
			||||||
      rbac.authorization.kubernetes.io/autoupdate: "true"
 | 
					 | 
				
			||||||
    creationTimestamp: null
 | 
					 | 
				
			||||||
    labels:
 | 
					 | 
				
			||||||
      kubernetes.io/bootstrapping: rbac-defaults
 | 
					 | 
				
			||||||
    name: system:controller:service-cidrs-controller
 | 
					 | 
				
			||||||
  roleRef:
 | 
					 | 
				
			||||||
    apiGroup: rbac.authorization.k8s.io
 | 
					 | 
				
			||||||
    kind: ClusterRole
 | 
					 | 
				
			||||||
    name: system:controller:service-cidrs-controller
 | 
					 | 
				
			||||||
  subjects:
 | 
					 | 
				
			||||||
  - kind: ServiceAccount
 | 
					 | 
				
			||||||
    name: service-cidrs-controller
 | 
					 | 
				
			||||||
    namespace: kube-system
 | 
					 | 
				
			||||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
					- apiVersion: rbac.authorization.k8s.io/v1
 | 
				
			||||||
  kind: ClusterRoleBinding
 | 
					  kind: ClusterRoleBinding
 | 
				
			||||||
  metadata:
 | 
					  metadata:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1373,57 +1373,6 @@ items:
 | 
				
			|||||||
    - create
 | 
					    - create
 | 
				
			||||||
    - patch
 | 
					    - patch
 | 
				
			||||||
    - update
 | 
					    - update
 | 
				
			||||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
					 | 
				
			||||||
  kind: ClusterRole
 | 
					 | 
				
			||||||
  metadata:
 | 
					 | 
				
			||||||
    annotations:
 | 
					 | 
				
			||||||
      rbac.authorization.kubernetes.io/autoupdate: "true"
 | 
					 | 
				
			||||||
    creationTimestamp: null
 | 
					 | 
				
			||||||
    labels:
 | 
					 | 
				
			||||||
      kubernetes.io/bootstrapping: rbac-defaults
 | 
					 | 
				
			||||||
    name: system:controller:service-cidrs-controller
 | 
					 | 
				
			||||||
  rules:
 | 
					 | 
				
			||||||
  - apiGroups:
 | 
					 | 
				
			||||||
    - networking.k8s.io
 | 
					 | 
				
			||||||
    resources:
 | 
					 | 
				
			||||||
    - servicecidrs
 | 
					 | 
				
			||||||
    verbs:
 | 
					 | 
				
			||||||
    - get
 | 
					 | 
				
			||||||
    - list
 | 
					 | 
				
			||||||
    - patch
 | 
					 | 
				
			||||||
    - update
 | 
					 | 
				
			||||||
    - watch
 | 
					 | 
				
			||||||
  - apiGroups:
 | 
					 | 
				
			||||||
    - networking.k8s.io
 | 
					 | 
				
			||||||
    resources:
 | 
					 | 
				
			||||||
    - servicecidrs/finalizers
 | 
					 | 
				
			||||||
    verbs:
 | 
					 | 
				
			||||||
    - patch
 | 
					 | 
				
			||||||
    - update
 | 
					 | 
				
			||||||
  - apiGroups:
 | 
					 | 
				
			||||||
    - networking.k8s.io
 | 
					 | 
				
			||||||
    resources:
 | 
					 | 
				
			||||||
    - servicecidrs/status
 | 
					 | 
				
			||||||
    verbs:
 | 
					 | 
				
			||||||
    - patch
 | 
					 | 
				
			||||||
    - update
 | 
					 | 
				
			||||||
  - apiGroups:
 | 
					 | 
				
			||||||
    - networking.k8s.io
 | 
					 | 
				
			||||||
    resources:
 | 
					 | 
				
			||||||
    - ipaddresses
 | 
					 | 
				
			||||||
    verbs:
 | 
					 | 
				
			||||||
    - get
 | 
					 | 
				
			||||||
    - list
 | 
					 | 
				
			||||||
    - watch
 | 
					 | 
				
			||||||
  - apiGroups:
 | 
					 | 
				
			||||||
    - ""
 | 
					 | 
				
			||||||
    - events.k8s.io
 | 
					 | 
				
			||||||
    resources:
 | 
					 | 
				
			||||||
    - events
 | 
					 | 
				
			||||||
    verbs:
 | 
					 | 
				
			||||||
    - create
 | 
					 | 
				
			||||||
    - patch
 | 
					 | 
				
			||||||
    - update
 | 
					 | 
				
			||||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
					- apiVersion: rbac.authorization.k8s.io/v1
 | 
				
			||||||
  kind: ClusterRole
 | 
					  kind: ClusterRole
 | 
				
			||||||
  metadata:
 | 
					  metadata:
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user