Make service-cidrs-controller role feature-gated
This commit is contained in:
		@@ -369,16 +369,18 @@ func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding)
 | 
			
		||||
			eventsRule(),
 | 
			
		||||
		},
 | 
			
		||||
	})
 | 
			
		||||
	addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{
 | 
			
		||||
		ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-cidrs-controller"},
 | 
			
		||||
		Rules: []rbacv1.PolicyRule{
 | 
			
		||||
			rbacv1helpers.NewRule("get", "list", "watch", "patch", "update").Groups(networkingGroup).Resources("servicecidrs").RuleOrDie(),
 | 
			
		||||
			rbacv1helpers.NewRule("patch", "update").Groups(networkingGroup).Resources("servicecidrs/finalizers").RuleOrDie(),
 | 
			
		||||
			rbacv1helpers.NewRule("patch", "update").Groups(networkingGroup).Resources("servicecidrs/status").RuleOrDie(),
 | 
			
		||||
			rbacv1helpers.NewRule("get", "list", "watch").Groups(networkingGroup).Resources("ipaddresses").RuleOrDie(),
 | 
			
		||||
			eventsRule(),
 | 
			
		||||
		},
 | 
			
		||||
	})
 | 
			
		||||
	if utilfeature.DefaultFeatureGate.Enabled(features.MultiCIDRServiceAllocator) {
 | 
			
		||||
		addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{
 | 
			
		||||
			ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-cidrs-controller"},
 | 
			
		||||
			Rules: []rbacv1.PolicyRule{
 | 
			
		||||
				rbacv1helpers.NewRule("get", "list", "watch", "patch", "update").Groups(networkingGroup).Resources("servicecidrs").RuleOrDie(),
 | 
			
		||||
				rbacv1helpers.NewRule("patch", "update").Groups(networkingGroup).Resources("servicecidrs/finalizers").RuleOrDie(),
 | 
			
		||||
				rbacv1helpers.NewRule("patch", "update").Groups(networkingGroup).Resources("servicecidrs/status").RuleOrDie(),
 | 
			
		||||
				rbacv1helpers.NewRule("get", "list", "watch").Groups(networkingGroup).Resources("ipaddresses").RuleOrDie(),
 | 
			
		||||
				eventsRule(),
 | 
			
		||||
			},
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
	addControllerRole(&controllerRoles, &controllerRoleBindings, func() rbacv1.ClusterRole {
 | 
			
		||||
		role := rbacv1.ClusterRole{
 | 
			
		||||
			ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "statefulset-controller"},
 | 
			
		||||
 
 | 
			
		||||
@@ -476,23 +476,6 @@ items:
 | 
			
		||||
  - kind: ServiceAccount
 | 
			
		||||
    name: service-account-controller
 | 
			
		||||
    namespace: kube-system
 | 
			
		||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
  kind: ClusterRoleBinding
 | 
			
		||||
  metadata:
 | 
			
		||||
    annotations:
 | 
			
		||||
      rbac.authorization.kubernetes.io/autoupdate: "true"
 | 
			
		||||
    creationTimestamp: null
 | 
			
		||||
    labels:
 | 
			
		||||
      kubernetes.io/bootstrapping: rbac-defaults
 | 
			
		||||
    name: system:controller:service-cidrs-controller
 | 
			
		||||
  roleRef:
 | 
			
		||||
    apiGroup: rbac.authorization.k8s.io
 | 
			
		||||
    kind: ClusterRole
 | 
			
		||||
    name: system:controller:service-cidrs-controller
 | 
			
		||||
  subjects:
 | 
			
		||||
  - kind: ServiceAccount
 | 
			
		||||
    name: service-cidrs-controller
 | 
			
		||||
    namespace: kube-system
 | 
			
		||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
  kind: ClusterRoleBinding
 | 
			
		||||
  metadata:
 | 
			
		||||
 
 | 
			
		||||
@@ -1373,57 +1373,6 @@ items:
 | 
			
		||||
    - create
 | 
			
		||||
    - patch
 | 
			
		||||
    - update
 | 
			
		||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
  kind: ClusterRole
 | 
			
		||||
  metadata:
 | 
			
		||||
    annotations:
 | 
			
		||||
      rbac.authorization.kubernetes.io/autoupdate: "true"
 | 
			
		||||
    creationTimestamp: null
 | 
			
		||||
    labels:
 | 
			
		||||
      kubernetes.io/bootstrapping: rbac-defaults
 | 
			
		||||
    name: system:controller:service-cidrs-controller
 | 
			
		||||
  rules:
 | 
			
		||||
  - apiGroups:
 | 
			
		||||
    - networking.k8s.io
 | 
			
		||||
    resources:
 | 
			
		||||
    - servicecidrs
 | 
			
		||||
    verbs:
 | 
			
		||||
    - get
 | 
			
		||||
    - list
 | 
			
		||||
    - patch
 | 
			
		||||
    - update
 | 
			
		||||
    - watch
 | 
			
		||||
  - apiGroups:
 | 
			
		||||
    - networking.k8s.io
 | 
			
		||||
    resources:
 | 
			
		||||
    - servicecidrs/finalizers
 | 
			
		||||
    verbs:
 | 
			
		||||
    - patch
 | 
			
		||||
    - update
 | 
			
		||||
  - apiGroups:
 | 
			
		||||
    - networking.k8s.io
 | 
			
		||||
    resources:
 | 
			
		||||
    - servicecidrs/status
 | 
			
		||||
    verbs:
 | 
			
		||||
    - patch
 | 
			
		||||
    - update
 | 
			
		||||
  - apiGroups:
 | 
			
		||||
    - networking.k8s.io
 | 
			
		||||
    resources:
 | 
			
		||||
    - ipaddresses
 | 
			
		||||
    verbs:
 | 
			
		||||
    - get
 | 
			
		||||
    - list
 | 
			
		||||
    - watch
 | 
			
		||||
  - apiGroups:
 | 
			
		||||
    - ""
 | 
			
		||||
    - events.k8s.io
 | 
			
		||||
    resources:
 | 
			
		||||
    - events
 | 
			
		||||
    verbs:
 | 
			
		||||
    - create
 | 
			
		||||
    - patch
 | 
			
		||||
    - update
 | 
			
		||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
			
		||||
  kind: ClusterRole
 | 
			
		||||
  metadata:
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user