1
1
---
2
2
# Source: mongodb-enterprise-operator/templates/operator-roles.yaml
3
+ ---
3
4
apiVersion : v1
4
5
kind : ServiceAccount
5
6
metadata :
6
7
name : enterprise-operator
7
8
namespace : mongodb
9
+
10
+
8
11
---
9
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
10
- kind : ClusterRole
11
- apiVersion : rbac.authorization.k8s.io/v1
12
- metadata :
13
- name : enterprise-operator-mongodb-certs
14
- rules :
15
- - apiGroups :
16
- - certificates.k8s.io
17
- resources :
18
- - certificatesigningrequests
19
- verbs :
20
- - get
21
- - create
22
- - list
23
- - watch
24
- ---
25
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
26
- kind : ClusterRoleBinding
27
- apiVersion : rbac.authorization.k8s.io/v1
28
- metadata :
29
- name : enterprise-operator-mongodb-webhook-binding
30
- namespace : mongodb
31
- roleRef :
32
- apiGroup : rbac.authorization.k8s.io
33
- kind : ClusterRole
34
- name : mongodb-enterprise-operator-mongodb-webhook
35
- subjects :
36
- - kind : ServiceAccount
37
- name : enterprise-operator
38
- namespace : mongodb
39
- ---
40
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
41
- kind : ClusterRoleBinding
42
- apiVersion : rbac.authorization.k8s.io/v1
43
- metadata :
44
- name : enterprise-operator-mongodb-certs-binding
45
- namespace : mongodb
46
- roleRef :
47
- apiGroup : rbac.authorization.k8s.io
48
- kind : ClusterRole
49
- name : enterprise-operator-mongodb-certs
50
- subjects :
51
- - kind : ServiceAccount
52
- name : enterprise-operator
53
- namespace : mongodb
54
- ---
55
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
56
12
kind : Role
57
13
apiVersion : rbac.authorization.k8s.io/v1
58
14
metadata :
@@ -101,7 +57,21 @@ rules:
101
57
# definitions. The validating webhooks are optional so this can be removed if
102
58
# necessary.
103
59
---
104
- # Source: mongodb-enterprise-operator/templates/operator-roles.yaml
60
+ kind : ClusterRoleBinding
61
+ apiVersion : rbac.authorization.k8s.io/v1
62
+ metadata :
63
+ name : enterprise-operator-mongodb-webhook-binding
64
+ namespace : mongodb
65
+ roleRef :
66
+ apiGroup : rbac.authorization.k8s.io
67
+ kind : ClusterRole
68
+ name : mongodb-enterprise-operator-mongodb-webhook
69
+ subjects :
70
+ - kind : ServiceAccount
71
+ name : enterprise-operator
72
+ namespace : mongodb
73
+
74
+ ---
105
75
kind : RoleBinding
106
76
apiVersion : rbac.authorization.k8s.io/v1
107
77
metadata :
@@ -118,29 +88,62 @@ subjects:
118
88
119
89
# This ClusterRole is needed if the user wants to use the Kubernetes CA
120
90
# infrastructure to generate certificates.
91
+ ---
92
+ kind : ClusterRole
93
+ apiVersion : rbac.authorization.k8s.io/v1
94
+ metadata :
95
+ name : enterprise-operator-mongodb-certs
96
+ rules :
97
+ - apiGroups :
98
+ - certificates.k8s.io
99
+ resources :
100
+ - certificatesigningrequests
101
+ verbs :
102
+ - get
103
+ - create
104
+ - list
105
+ - watch
106
+
107
+ ---
108
+ kind : ClusterRoleBinding
109
+ apiVersion : rbac.authorization.k8s.io/v1
110
+ metadata :
111
+ name : enterprise-operator-mongodb-certs-binding
112
+ namespace : mongodb
113
+ roleRef :
114
+ apiGroup : rbac.authorization.k8s.io
115
+ kind : ClusterRole
116
+ name : enterprise-operator-mongodb-certs
117
+ subjects :
118
+ - kind : ServiceAccount
119
+ name : enterprise-operator
120
+ namespace : mongodb
121
+
122
+
121
123
---
122
124
# Source: mongodb-enterprise-operator/templates/database-roles.yaml
125
+ ---
123
126
apiVersion : v1
124
127
kind : ServiceAccount
125
128
metadata :
126
129
name : mongodb-enterprise-appdb
127
130
namespace : mongodb
131
+
128
132
---
129
- # Source: mongodb-enterprise-operator/templates/database-roles.yaml
130
133
apiVersion : v1
131
134
kind : ServiceAccount
132
135
metadata :
133
136
name : mongodb-enterprise-database-pods
134
137
namespace : mongodb
138
+
135
139
---
136
- # Source: mongodb-enterprise-operator/templates/database-roles.yaml
137
140
apiVersion : v1
138
141
kind : ServiceAccount
139
142
metadata :
140
143
name : mongodb-enterprise-ops-manager
141
144
namespace : mongodb
145
+
142
146
---
143
- # Source: mongodb-enterprise-operator/templates/database-roles.yaml
144
147
kind : Role
145
148
apiVersion : rbac.authorization.k8s.io/v1
146
149
metadata :
@@ -153,8 +156,8 @@ rules:
153
156
- configmaps
154
157
verbs :
155
158
- get
159
+
156
160
---
157
- # Source: mongodb-enterprise-operator/templates/database-roles.yaml
158
161
kind : RoleBinding
159
162
apiVersion : rbac.authorization.k8s.io/v1
160
163
metadata :
@@ -168,8 +171,10 @@ subjects:
168
171
- kind : ServiceAccount
169
172
name : mongodb-enterprise-appdb
170
173
namespace : mongodb
174
+
171
175
---
172
176
# Source: mongodb-enterprise-operator/templates/operator.yaml
177
+ ---
173
178
apiVersion : apps/v1
174
179
kind : Deployment
175
180
metadata :
@@ -187,8 +192,8 @@ spec:
187
192
spec :
188
193
serviceAccountName : enterprise-operator
189
194
containers :
190
- - name : enterprise-operator
191
- image : registry.connect.redhat.com/mongodb/enterprise-operator:1.5.2
195
+ - name : mongodb- enterprise-operator
196
+ image : registry.connect.redhat.com/mongodb/enterprise-operator:1.5.3
192
197
imagePullPolicy : Always
193
198
args :
194
199
- " -watch-resource=mongodb"
@@ -210,7 +215,7 @@ spec:
210
215
- name : MANAGED_SECURITY_CONTEXT
211
216
value : ' true'
212
217
- name : MONGODB_ENTERPRISE_DATABASE_IMAGE
213
- value : registry.connect.redhat.com/mongodb/enterprise-database:1.5.2
218
+ value : registry.connect.redhat.com/mongodb/enterprise-database:1.5.3
214
219
- name : IMAGE_PULL_POLICY
215
220
value : Always
216
221
- name : OPS_MANAGER_IMAGE_REPOSITORY
0 commit comments