fix: non-namespaced resources incorrectly have ns (#2158)

This commit is contained in:
Brian Torres-Gil
2023-07-13 12:22:56 -07:00
committed by GitHub
parent d588c9773e
commit 3af1d8320c
11 changed files with 22 additions and 16 deletions

View File

@@ -147,7 +147,10 @@ function(params) {
clusterRoleBinding: { clusterRoleBinding: {
apiVersion: 'rbac.authorization.k8s.io/v1', apiVersion: 'rbac.authorization.k8s.io/v1',
kind: 'ClusterRoleBinding', kind: 'ClusterRoleBinding',
metadata: bb._metadata, metadata: {
name: 'blackbox-exporter',
labels: bb._config.commonLabels,
},
roleRef: { roleRef: {
apiGroup: 'rbac.authorization.k8s.io', apiGroup: 'rbac.authorization.k8s.io',
kind: 'ClusterRole', kind: 'ClusterRole',

View File

@@ -92,7 +92,10 @@ function(params) {
clusterRoleBinding: { clusterRoleBinding: {
apiVersion: 'rbac.authorization.k8s.io/v1', apiVersion: 'rbac.authorization.k8s.io/v1',
kind: 'ClusterRoleBinding', kind: 'ClusterRoleBinding',
metadata: ne._metadata, metadata: {
name: ne._config.name,
labels: ne._config.commonLabels,
},
roleRef: { roleRef: {
apiGroup: 'rbac.authorization.k8s.io', apiGroup: 'rbac.authorization.k8s.io',
kind: 'ClusterRole', kind: 'ClusterRole',
@@ -108,7 +111,10 @@ function(params) {
clusterRole: { clusterRole: {
apiVersion: 'rbac.authorization.k8s.io/v1', apiVersion: 'rbac.authorization.k8s.io/v1',
kind: 'ClusterRole', kind: 'ClusterRole',
metadata: ne._metadata, metadata: {
name: ne._config.name,
labels: ne._config.commonLabels,
},
rules: [ rules: [
{ {
apiGroups: ['authentication.k8s.io'], apiGroups: ['authentication.k8s.io'],

View File

@@ -133,6 +133,11 @@ function(params) {
labels: pa._config.commonLabels, labels: pa._config.commonLabels,
}, },
_metadata_no_ns:: {
name: pa._config.name,
labels: pa._config.commonLabels,
},
apiService: { apiService: {
apiVersion: 'apiregistration.k8s.io/v1', apiVersion: 'apiregistration.k8s.io/v1',
kind: 'APIService', kind: 'APIService',
@@ -322,7 +327,7 @@ function(params) {
clusterRole: { clusterRole: {
apiVersion: 'rbac.authorization.k8s.io/v1', apiVersion: 'rbac.authorization.k8s.io/v1',
kind: 'ClusterRole', kind: 'ClusterRole',
metadata: pa._metadata, metadata: pa._metadata_no_ns,
rules: [{ rules: [{
apiGroups: [''], apiGroups: [''],
resources: ['nodes', 'namespaces', 'pods', 'services'], resources: ['nodes', 'namespaces', 'pods', 'services'],
@@ -333,7 +338,7 @@ function(params) {
clusterRoleBinding: { clusterRoleBinding: {
apiVersion: 'rbac.authorization.k8s.io/v1', apiVersion: 'rbac.authorization.k8s.io/v1',
kind: 'ClusterRoleBinding', kind: 'ClusterRoleBinding',
metadata: pa._metadata, metadata: pa._metadata_no_ns,
roleRef: { roleRef: {
apiGroup: 'rbac.authorization.k8s.io', apiGroup: 'rbac.authorization.k8s.io',
kind: 'ClusterRole', kind: 'ClusterRole',
@@ -349,7 +354,7 @@ function(params) {
clusterRoleBindingDelegator: { clusterRoleBindingDelegator: {
apiVersion: 'rbac.authorization.k8s.io/v1', apiVersion: 'rbac.authorization.k8s.io/v1',
kind: 'ClusterRoleBinding', kind: 'ClusterRoleBinding',
metadata: pa._metadata { metadata: pa._metadata_no_ns {
name: 'resource-metrics:system:auth-delegator', name: 'resource-metrics:system:auth-delegator',
}, },
roleRef: { roleRef: {
@@ -367,7 +372,7 @@ function(params) {
clusterRoleServerResources: { clusterRoleServerResources: {
apiVersion: 'rbac.authorization.k8s.io/v1', apiVersion: 'rbac.authorization.k8s.io/v1',
kind: 'ClusterRole', kind: 'ClusterRole',
metadata: pa._metadata { metadata: pa._metadata_no_ns {
name: 'resource-metrics-server-resources', name: 'resource-metrics-server-resources',
}, },
rules: [{ rules: [{
@@ -380,7 +385,7 @@ function(params) {
clusterRoleAggregatedMetricsReader: { clusterRoleAggregatedMetricsReader: {
apiVersion: 'rbac.authorization.k8s.io/v1', apiVersion: 'rbac.authorization.k8s.io/v1',
kind: 'ClusterRole', kind: 'ClusterRole',
metadata: pa._metadata { metadata: pa._metadata_no_ns {
name: 'system:aggregated-metrics-reader', name: 'system:aggregated-metrics-reader',
labels+: { labels+: {
'rbac.authorization.k8s.io/aggregate-to-admin': 'true', 'rbac.authorization.k8s.io/aggregate-to-admin': 'true',

View File

@@ -7,7 +7,6 @@ metadata:
app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 0.24.0 app.kubernetes.io/version: 0.24.0
name: blackbox-exporter name: blackbox-exporter
namespace: monitoring
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
kind: ClusterRole kind: ClusterRole

View File

@@ -7,7 +7,6 @@ metadata:
app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 1.6.0 app.kubernetes.io/version: 1.6.0
name: node-exporter name: node-exporter
namespace: monitoring
rules: rules:
- apiGroups: - apiGroups:
- authentication.k8s.io - authentication.k8s.io

View File

@@ -7,7 +7,6 @@ metadata:
app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 1.6.0 app.kubernetes.io/version: 1.6.0
name: node-exporter name: node-exporter
namespace: monitoring
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
kind: ClusterRole kind: ClusterRole

View File

@@ -7,7 +7,6 @@ metadata:
app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 0.10.0 app.kubernetes.io/version: 0.10.0
name: prometheus-adapter name: prometheus-adapter
namespace: monitoring
rules: rules:
- apiGroups: - apiGroups:
- "" - ""

View File

@@ -10,7 +10,6 @@ metadata:
rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-view: "true"
name: system:aggregated-metrics-reader name: system:aggregated-metrics-reader
namespace: monitoring
rules: rules:
- apiGroups: - apiGroups:
- metrics.k8s.io - metrics.k8s.io

View File

@@ -7,7 +7,6 @@ metadata:
app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 0.10.0 app.kubernetes.io/version: 0.10.0
name: prometheus-adapter name: prometheus-adapter
namespace: monitoring
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
kind: ClusterRole kind: ClusterRole

View File

@@ -7,7 +7,6 @@ metadata:
app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 0.10.0 app.kubernetes.io/version: 0.10.0
name: resource-metrics:system:auth-delegator name: resource-metrics:system:auth-delegator
namespace: monitoring
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
kind: ClusterRole kind: ClusterRole

View File

@@ -7,7 +7,6 @@ metadata:
app.kubernetes.io/part-of: kube-prometheus app.kubernetes.io/part-of: kube-prometheus
app.kubernetes.io/version: 0.10.0 app.kubernetes.io/version: 0.10.0
name: resource-metrics-server-resources name: resource-metrics-server-resources
namespace: monitoring
rules: rules:
- apiGroups: - apiGroups:
- metrics.k8s.io - metrics.k8s.io