Skip to content

Commit

Permalink
Merge pull request #788 from Comcast/flat-file-auto-regen
Browse files Browse the repository at this point in the history
Flat Spec File Regeneration
  • Loading branch information
Eric Greer committed Jan 22, 2021
2 parents 86f8ca0 + 2960b10 commit 8fd9f98
Show file tree
Hide file tree
Showing 3 changed files with 85 additions and 85 deletions.
38 changes: 19 additions & 19 deletions deploy/kuberhealthy-prometheus-operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -103,6 +103,19 @@ metadata:
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-daemonset-khcheck
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
---
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy
rules:
Expand Down Expand Up @@ -173,19 +186,6 @@ rules:
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-daemonset-khcheck
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
---
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-check-reaper
rules:
Expand Down Expand Up @@ -230,28 +230,28 @@ subjects:
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRoleBinding
metadata:
name: kuberhealthy
name: kuberhealthy-daemonset-khcheck
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kuberhealthy
name: kuberhealthy-daemonset-khcheck
subjects:
- kind: ServiceAccount
name: kuberhealthy
name: daemonset-khcheck
namespace: kuberhealthy
---
# Source: kuberhealthy/templates/clusterrolebinding.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRoleBinding
metadata:
name: kuberhealthy-daemonset-khcheck
name: kuberhealthy
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kuberhealthy-daemonset-khcheck
name: kuberhealthy
subjects:
- kind: ServiceAccount
name: daemonset-khcheck
name: kuberhealthy
namespace: kuberhealthy
---
# Source: kuberhealthy/templates/khcheck-daemonset.yaml
Expand Down
94 changes: 47 additions & 47 deletions deploy/kuberhealthy-prometheus.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -103,6 +103,47 @@ metadata:
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-daemonset-khcheck
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
---
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-check-reaper
rules:
- apiGroups:
- ""
resources:
- namespaces
verbs:
- list
- apiGroups:
- ""
resources:
- pods
verbs:
- delete
- list
- apiGroups:
- comcast.github.io
resources:
- khchecks
- khjobs
verbs:
- delete
- list
---
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy
rules:
Expand Down Expand Up @@ -170,47 +211,6 @@ rules:
verbs:
- create
---
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-check-reaper
rules:
- apiGroups:
- ""
resources:
- namespaces
verbs:
- list
- apiGroups:
- ""
resources:
- pods
verbs:
- delete
- list
- apiGroups:
- comcast.github.io
resources:
- khchecks
- khjobs
verbs:
- delete
- list
---
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-daemonset-khcheck
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
---
# Source: kuberhealthy/templates/check-reaper.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
Expand All @@ -230,28 +230,28 @@ subjects:
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRoleBinding
metadata:
name: kuberhealthy-daemonset-khcheck
name: kuberhealthy
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kuberhealthy-daemonset-khcheck
name: kuberhealthy
subjects:
- kind: ServiceAccount
name: daemonset-khcheck
name: kuberhealthy
namespace: kuberhealthy
---
# Source: kuberhealthy/templates/clusterrolebinding.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRoleBinding
metadata:
name: kuberhealthy
name: kuberhealthy-daemonset-khcheck
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kuberhealthy
name: kuberhealthy-daemonset-khcheck
subjects:
- kind: ServiceAccount
name: kuberhealthy
name: daemonset-khcheck
namespace: kuberhealthy
---
# Source: kuberhealthy/templates/khcheck-daemonset.yaml
Expand Down
38 changes: 19 additions & 19 deletions deploy/kuberhealthy.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -103,6 +103,19 @@ metadata:
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-daemonset-khcheck
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
---
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-check-reaper
rules:
Expand Down Expand Up @@ -131,19 +144,6 @@ rules:
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy-daemonset-khcheck
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
---
# Source: kuberhealthy/templates/clusterrole.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRole
metadata:
name: kuberhealthy
rules:
Expand Down Expand Up @@ -230,28 +230,28 @@ subjects:
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRoleBinding
metadata:
name: kuberhealthy-daemonset-khcheck
name: kuberhealthy
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kuberhealthy-daemonset-khcheck
name: kuberhealthy
subjects:
- kind: ServiceAccount
name: daemonset-khcheck
name: kuberhealthy
namespace: kuberhealthy
---
# Source: kuberhealthy/templates/clusterrolebinding.yaml
apiVersion: "rbac.authorization.k8s.io/v1"
kind: ClusterRoleBinding
metadata:
name: kuberhealthy
name: kuberhealthy-daemonset-khcheck
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kuberhealthy
name: kuberhealthy-daemonset-khcheck
subjects:
- kind: ServiceAccount
name: kuberhealthy
name: daemonset-khcheck
namespace: kuberhealthy
---
# Source: kuberhealthy/templates/khcheck-daemonset.yaml
Expand Down

0 comments on commit 8fd9f98

Please sign in to comment.