diff --git a/tests/setup.yaml b/tests/setup.yaml index 7b58f86..d7f9f15 100644 --- a/tests/setup.yaml +++ b/tests/setup.yaml @@ -14,7 +14,7 @@ metadata: namespace: dynk8s-test labels: app.kubernetes.io/name: dynk8s-provisioner - app.kubernetes.io/instance: default + app.kubernetes.io/instance: integration-test app.kubernetes.io/component: http-api app.kubernetes.io/part-of: dynk8s-provisioner automountServiceAccountToken: true @@ -31,13 +31,13 @@ type: kubernetes.io/service-account-token --- apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole +kind: Role metadata: name: dynk8s-provisioner namespace: dynk8s-test labels: app.kubernetes.io/name: dynk8s-provisioner - app.kubernetes.io/instance: default + app.kubernetes.io/instance: integration-test app.kubernetes.io/component: http-api app.kubernetes.io/part-of: dynk8s-provisioner rules: @@ -47,6 +47,38 @@ rules: - secrets verbs: - '*' + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: dynk8s-provisioner-test + namespace: kube-system + labels: + app.kubernetes.io/name: dynk8s-provisioner + app.kubernetes.io/instance: integration-test + app.kubernetes.io/component: http-api + app.kubernetes.io/part-of: dynk8s-provisioner +rules: +- apiGroups: + - '' + resources: + - secrets + verbs: + - '*' + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: dynk8s-provisioner-test + namespace: kube-public + labels: + app.kubernetes.io/name: dynk8s-provisioner + app.kubernetes.io/instance: integration-test + app.kubernetes.io/component: http-api + app.kubernetes.io/part-of: dynk8s-provisioner +rules: - apiGroups: - '' resources: @@ -58,17 +90,54 @@ rules: --- apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding +kind: RoleBinding metadata: name: dynk8s-provisioner namespace: dynk8s-test labels: app.kubernetes.io/name: dynk8s-provisioner - app.kubernetes.io/instance: default + app.kubernetes.io/instance: integration-test app.kubernetes.io/part-of: dynk8s-provisioner roleRef: apiGroup: rbac.authorization.k8s.io - kind: ClusterRole + kind: Role + name: dynk8s-provisioner +subjects: +- kind: ServiceAccount + name: dynk8s-provisioner + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: dynk8s-provisioner-test + namespace: kube-system + labels: + app.kubernetes.io/name: dynk8s-provisioner + app.kubernetes.io/instance: integration-test + app.kubernetes.io/part-of: dynk8s-provisioner +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: dynk8s-provisioner +subjects: +- kind: ServiceAccount + name: dynk8s-provisioner + namespace: dynk8s-test + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: dynk8s-provisioner-test + namespace: kube-public + labels: + app.kubernetes.io/name: dynk8s-provisioner + app.kubernetes.io/instance: integration-test + app.kubernetes.io/part-of: dynk8s-provisioner +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role name: dynk8s-provisioner subjects: - kind: ServiceAccount