Init project
Some checks failed
Lint / Run on Ubuntu (push) Has been cancelled
E2E Tests / Run on Ubuntu (push) Has been cancelled
Tests / Run on Ubuntu (push) Has been cancelled

This commit is contained in:
2025-07-15 17:58:36 +02:00
parent 61902f4159
commit 7c2294d9df
77 changed files with 4797 additions and 0 deletions

View File

@@ -0,0 +1,27 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants full permissions ('*') over yaho.badhouseplants.net.
# This role is intended for users authorized to modify roles and bindings within the cluster,
# enabling them to delegate specific permissions to other users or groups as needed.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmdiff-admin-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs
verbs:
- '*'
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs/status
verbs:
- get

View File

@@ -0,0 +1,33 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants permissions to create, update, and delete resources within the yaho.badhouseplants.net.
# This role is intended for users who need to manage these resources
# but should not control RBAC or manage permissions for others.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmdiff-editor-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs/status
verbs:
- get

View File

@@ -0,0 +1,29 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants read-only access to yaho.badhouseplants.net resources.
# This role is intended for users who need visibility into these resources
# without permissions to modify them. It is ideal for monitoring purposes and limited-access viewing.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmdiff-viewer-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs
verbs:
- get
- list
- watch
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs/status
verbs:
- get

View File

@@ -0,0 +1,27 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants full permissions ('*') over yaho.badhouseplants.net.
# This role is intended for users authorized to modify roles and bindings within the cluster,
# enabling them to delegate specific permissions to other users or groups as needed.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmrelease-admin-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmreleases
verbs:
- '*'
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmreleases/status
verbs:
- get

View File

@@ -0,0 +1,33 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants permissions to create, update, and delete resources within the yaho.badhouseplants.net.
# This role is intended for users who need to manage these resources
# but should not control RBAC or manage permissions for others.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmrelease-editor-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmreleases
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmreleases/status
verbs:
- get

View File

@@ -0,0 +1,29 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants read-only access to yaho.badhouseplants.net resources.
# This role is intended for users who need visibility into these resources
# without permissions to modify them. It is ideal for monitoring purposes and limited-access viewing.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmrelease-viewer-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmreleases
verbs:
- get
- list
- watch
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmreleases/status
verbs:
- get

View File

@@ -0,0 +1,27 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants full permissions ('*') over yaho.badhouseplants.net.
# This role is intended for users authorized to modify roles and bindings within the cluster,
# enabling them to delegate specific permissions to other users or groups as needed.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmvalues-admin-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmvalues
verbs:
- '*'
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmvalues/status
verbs:
- get

View File

@@ -0,0 +1,33 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants permissions to create, update, and delete resources within the yaho.badhouseplants.net.
# This role is intended for users who need to manage these resources
# but should not control RBAC or manage permissions for others.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmvalues-editor-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmvalues
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmvalues/status
verbs:
- get

View File

@@ -0,0 +1,29 @@
# This rule is not used by the project yaho itself.
# It is provided to allow the cluster admin to help manage permissions for users.
#
# Grants read-only access to yaho.badhouseplants.net resources.
# This role is intended for users who need visibility into these resources
# without permissions to modify them. It is ideal for monitoring purposes and limited-access viewing.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: helmvalues-viewer-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmvalues
verbs:
- get
- list
- watch
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmvalues/status
verbs:
- get

View File

@@ -0,0 +1,34 @@
resources:
# All RBAC will be applied under this service account in
# the deployment namespace. You may comment out this resource
# if your manager will use a service account that exists at
# runtime. Be sure to update RoleBinding and ClusterRoleBinding
# subjects if changing service account names.
- service_account.yaml
- role.yaml
- role_binding.yaml
- leader_election_role.yaml
- leader_election_role_binding.yaml
# The following RBAC configurations are used to protect
# the metrics endpoint with authn/authz. These configurations
# ensure that only authorized users and service accounts
# can access the metrics endpoint. Comment the following
# permissions if you want to disable this protection.
# More info: https://book.kubebuilder.io/reference/metrics.html
- metrics_auth_role.yaml
- metrics_auth_role_binding.yaml
- metrics_reader_role.yaml
# For each CRD, "Admin", "Editor" and "Viewer" roles are scaffolded by
# default, aiding admins in cluster management. Those roles are
# not used by the yaho itself. You can comment the following lines
# if you do not want those helpers be installed with your Project.
- helmvalues_admin_role.yaml
- helmvalues_editor_role.yaml
- helmvalues_viewer_role.yaml
- helmdiff_admin_role.yaml
- helmdiff_editor_role.yaml
- helmdiff_viewer_role.yaml
- helmrelease_admin_role.yaml
- helmrelease_editor_role.yaml
- helmrelease_viewer_role.yaml

View File

@@ -0,0 +1,40 @@
# permissions to do leader election.
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: leader-election-role
rules:
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch

View File

@@ -0,0 +1,15 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: leader-election-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: leader-election-role
subjects:
- kind: ServiceAccount
name: controller-manager
namespace: system

View File

@@ -0,0 +1,17 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: metrics-auth-role
rules:
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create

View File

@@ -0,0 +1,12 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: metrics-auth-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: metrics-auth-role
subjects:
- kind: ServiceAccount
name: controller-manager
namespace: system

View File

@@ -0,0 +1,9 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: metrics-reader
rules:
- nonResourceURLs:
- "/metrics"
verbs:
- get

38
config/rbac/role.yaml Normal file
View File

@@ -0,0 +1,38 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: manager-role
rules:
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs
- helmreleases
- helmvalues
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs/finalizers
- helmreleases/finalizers
- helmvalues/finalizers
verbs:
- update
- apiGroups:
- yaho.badhouseplants.net
resources:
- helmdiffs/status
- helmreleases/status
- helmvalues/status
verbs:
- get
- patch
- update

View File

@@ -0,0 +1,15 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: manager-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: manager-role
subjects:
- kind: ServiceAccount
name: controller-manager
namespace: system

View File

@@ -0,0 +1,8 @@
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
app.kubernetes.io/name: yaho
app.kubernetes.io/managed-by: kustomize
name: controller-manager
namespace: system