Added missing permissions for listing events by Jenkins
This commit is contained in:
parent
3dab502234
commit
652580c0a5
|
|
@ -72,6 +72,7 @@ rules:
|
|||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- get
|
||||
- watch
|
||||
- list
|
||||
- create
|
||||
|
|
|
|||
|
|
@ -104,6 +104,7 @@ rules:
|
|||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- get
|
||||
- watch
|
||||
- list
|
||||
- create
|
||||
|
|
|
|||
|
|
@ -63,6 +63,7 @@ rules:
|
|||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- get
|
||||
- watch
|
||||
- list
|
||||
- create
|
||||
|
|
|
|||
4
main.go
4
main.go
|
|
@ -81,7 +81,7 @@ func main() {
|
|||
|
||||
isRunningInCluster, err := resources.IsRunningInCluster()
|
||||
if err != nil {
|
||||
fatal(errors.Wrap(err, "failed to get watch namespace"), true)
|
||||
fatal(errors.Wrap(err, "failed to determine if operator is running in cluster"), true)
|
||||
}
|
||||
|
||||
flag.StringVar(&metricsAddr, "metrics-bind-address", ":8080", "The address the metric endpoint binds to.")
|
||||
|
|
@ -133,7 +133,7 @@ func main() {
|
|||
fatal(errors.Wrap(err, "failed to setup events"), *debug)
|
||||
}
|
||||
|
||||
//Setup controller
|
||||
// setup controller
|
||||
clientSet, err := kubernetes.NewForConfig(cfg)
|
||||
if err != nil {
|
||||
fatal(errors.Wrap(err, "failed to create Kubernetes client set"), *debug)
|
||||
|
|
|
|||
|
|
@ -62,7 +62,6 @@ func NewDefaultPolicyRules() []v1.PolicyRule {
|
|||
readOnly := []string{getVerb, listVerb, watchVerb}
|
||||
Default := []string{createVerb, deleteVerb, getVerb, listVerb, patchVerb, updateVerb, watchVerb}
|
||||
create := []string{createVerb}
|
||||
watch := []string{watchVerb}
|
||||
|
||||
rules = append(rules, NewPolicyRule(EmptyAPIGroup, "pods/portforward", create))
|
||||
rules = append(rules, NewPolicyRule(EmptyAPIGroup, "pods", Default))
|
||||
|
|
@ -70,7 +69,7 @@ func NewDefaultPolicyRules() []v1.PolicyRule {
|
|||
rules = append(rules, NewPolicyRule(EmptyAPIGroup, "configmaps", readOnly))
|
||||
rules = append(rules, NewPolicyRule(EmptyAPIGroup, "pods/log", readOnly))
|
||||
rules = append(rules, NewPolicyRule(EmptyAPIGroup, "secrets", readOnly))
|
||||
rules = append(rules, NewPolicyRule(EmptyAPIGroup, "events", watch))
|
||||
rules = append(rules, NewPolicyRule(EmptyAPIGroup, "events", readOnly))
|
||||
|
||||
rules = append(rules, NewOpenShiftPolicyRule(OpenshiftAPIGroup, "imagestreams", readOnly))
|
||||
rules = append(rules, NewOpenShiftPolicyRule(BuildAPIGroup, "buildconfigs", readOnly))
|
||||
|
|
|
|||
Loading…
Reference in New Issue