Documentation ¶
Overview ¶
Example ¶
package main import ( "os" "knative.dev/reconciler-test/pkg/manifest" ) func main() { images := map[string]string{} cfg := map[string]interface{}{ "name": "foo", "namespace": "bar", "role": "baz", "matchLabels": "whomp", } files, err := manifest.ExecuteLocalYAML(images, cfg) if err != nil { panic(err) } manifest.OutputYAML(os.Stdout, files) }
Output: apiVersion: v1 kind: ServiceAccount metadata: name: foo namespace: bar --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: foo subjects: - kind: ServiceAccount name: foo namespace: bar roleRef: kind: ClusterRole name: baz apiGroup: rbac.authorization.k8s.io
Example (AddressableResolver) ¶
package main import ( "os" "knative.dev/eventing/test/rekt/resources/account_role" "knative.dev/reconciler-test/pkg/manifest" ) func main() { images := map[string]string{} cfg := map[string]interface{}{ "name": "foo", "namespace": "bar", } account_role.AsAddressableResolver(cfg) files, err := manifest.ExecuteLocalYAML(images, cfg) if err != nil { panic(err) } manifest.OutputYAML(os.Stdout, files) }
Output: apiVersion: v1 kind: ServiceAccount metadata: name: foo namespace: bar --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: addressable-resolver-collector-foo aggregationRule: clusterRoleSelectors: - matchLabels: duck.knative.dev/addressable: "true" rules: [] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: foo subjects: - kind: ServiceAccount name: foo namespace: bar roleRef: kind: ClusterRole name: addressable-resolver-collector-foo apiGroup: rbac.authorization.k8s.io
Example (ChannelableManipulator) ¶
package main import ( "os" "knative.dev/eventing/test/rekt/resources/account_role" "knative.dev/reconciler-test/pkg/manifest" ) func main() { images := map[string]string{} cfg := map[string]interface{}{ "name": "foo", "namespace": "bar", } account_role.AsChannelableManipulator(cfg) files, err := manifest.ExecuteLocalYAML(images, cfg) if err != nil { panic(err) } manifest.OutputYAML(os.Stdout, files) }
Output: apiVersion: v1 kind: ServiceAccount metadata: name: foo namespace: bar --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: channelable-manipulator-collector-foo aggregationRule: clusterRoleSelectors: - matchLabels: duck.knative.dev/channelable: "true" rules: [] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: foo subjects: - kind: ServiceAccount name: foo namespace: bar roleRef: kind: ClusterRole name: channelable-manipulator-collector-foo apiGroup: rbac.authorization.k8s.io
Example (MatchLabel) ¶
package main import ( "os" "knative.dev/reconciler-test/pkg/manifest" ) func main() { images := map[string]string{} cfg := map[string]interface{}{ "name": "foo", "namespace": "bar", "role": "baz", "matchLabel": "whomp", } files, err := manifest.ExecuteLocalYAML(images, cfg) if err != nil { panic(err) } manifest.OutputYAML(os.Stdout, files) }
Output: apiVersion: v1 kind: ServiceAccount metadata: name: foo namespace: bar --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: baz aggregationRule: clusterRoleSelectors: - matchLabels: whomp: "true" rules: [] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: foo subjects: - kind: ServiceAccount name: foo namespace: bar roleRef: kind: ClusterRole name: baz apiGroup: rbac.authorization.k8s.io
Example (WithRoleAndRules) ¶
package main import ( "os" rbacv1 "k8s.io/api/rbac/v1" "knative.dev/eventing/test/rekt/resources/account_role" "knative.dev/reconciler-test/pkg/manifest" ) func main() { images := map[string]string{} cfg := map[string]interface{}{ "name": "foo", "namespace": "bar", } rule1 := rbacv1.PolicyRule{ APIGroups: []string{"rule1ApiGroupA", "rule1ApiGroupB"}, Resources: []string{"rule1ResourceA", "rule1ResourceB"}, Verbs: []string{"rule1VerbA", "rule1VerbB"}, } rule2 := rbacv1.PolicyRule{ APIGroups: []string{"rule2ApiGroupA", "rule2ApiGroupB"}, Resources: []string{"rule2ResourceA", "rule2ResourceB"}, Verbs: []string{"rule2VerbA", "rule2VerbB"}, } account_role.WithRole("baz")(cfg) account_role.WithRules(rule1, rule2)(cfg) files, err := manifest.ExecuteLocalYAML(images, cfg) if err != nil { panic(err) } manifest.OutputYAML(os.Stdout, files) }
Output: apiVersion: v1 kind: ServiceAccount metadata: name: foo namespace: bar --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: baz rules: - apiGroups: - rule1ApiGroupA - rule1ApiGroupB resources: - rule1ResourceA - rule1ResourceB verbs: - rule1VerbA - rule1VerbB - apiGroups: - rule2ApiGroupA - rule2ApiGroupB resources: - rule2ResourceA - rule2ResourceB verbs: - rule2VerbA - rule2VerbB --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: foo subjects: - kind: ServiceAccount name: foo namespace: bar roleRef: kind: ClusterRole name: baz apiGroup: rbac.authorization.k8s.io
Index ¶
- func AsAddressableResolver(cfg map[string]interface{})
- func AsChannelableManipulator(cfg map[string]interface{})
- func Install(name string, opts ...manifest.CfgFn) feature.StepFn
- func WithRole(role string) manifest.CfgFn
- func WithRoleMatchLabel(matchLabel string) manifest.CfgFn
- func WithRules(rules ...rbacv1.PolicyRule) manifest.CfgFn
Examples ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func AsAddressableResolver ¶
func AsAddressableResolver(cfg map[string]interface{})
func AsChannelableManipulator ¶
func AsChannelableManipulator(cfg map[string]interface{})
func Install ¶
Install will create a channelable-manipulator bound service account, augmented with the config fn options.
func WithRoleMatchLabel ¶
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.