Skip to content

Commit

Permalink
Include helm chart test output changes
Browse files Browse the repository at this point in the history
Signed-off-by: Evan Anderson <[email protected]>
  • Loading branch information
evankanderson committed Oct 29, 2024
1 parent d4c4c3f commit 5468f84
Show file tree
Hide file tree
Showing 9 changed files with 486 additions and 0 deletions.
54 changes: 54 additions & 0 deletions test/helm/gateway-helm/certjen-custom-scheduling.out.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -172,6 +172,60 @@ rules:
verbs:
- update
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
# These roles grant the standard Kubernetes "admin", "edit", and "view"
# roles access to Gateway API and Envoy-Gateway resources.
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-admin
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["*"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-edit
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["create", "update", "patch", "delete", "deletecollection"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-view
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["get", "list", "watch"]
---
# Source: gateway-helm/templates/envoy-gateway-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
54 changes: 54 additions & 0 deletions test/helm/gateway-helm/control-plane-with-pdb.out.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -187,6 +187,60 @@ rules:
verbs:
- update
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
# These roles grant the standard Kubernetes "admin", "edit", and "view"
# roles access to Gateway API and Envoy-Gateway resources.
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-admin
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["*"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-edit
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["create", "update", "patch", "delete", "deletecollection"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-view
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["get", "list", "watch"]
---
# Source: gateway-helm/templates/envoy-gateway-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
54 changes: 54 additions & 0 deletions test/helm/gateway-helm/default-config.out.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -172,6 +172,60 @@ rules:
verbs:
- update
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
# These roles grant the standard Kubernetes "admin", "edit", and "view"
# roles access to Gateway API and Envoy-Gateway resources.
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-admin
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["*"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-edit
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["create", "update", "patch", "delete", "deletecollection"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-view
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["get", "list", "watch"]
---
# Source: gateway-helm/templates/envoy-gateway-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
54 changes: 54 additions & 0 deletions test/helm/gateway-helm/deployment-custom-topology.out.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -172,6 +172,60 @@ rules:
verbs:
- update
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
# These roles grant the standard Kubernetes "admin", "edit", and "view"
# roles access to Gateway API and Envoy-Gateway resources.
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-admin
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["*"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-edit
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["create", "update", "patch", "delete", "deletecollection"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-view
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["get", "list", "watch"]
---
# Source: gateway-helm/templates/envoy-gateway-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
54 changes: 54 additions & 0 deletions test/helm/gateway-helm/deployment-images-config.out.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -172,6 +172,60 @@ rules:
verbs:
- update
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
# These roles grant the standard Kubernetes "admin", "edit", and "view"
# roles access to Gateway API and Envoy-Gateway resources.
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-admin
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["*"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-edit
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["create", "update", "patch", "delete", "deletecollection"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-view
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["get", "list", "watch"]
---
# Source: gateway-helm/templates/envoy-gateway-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
54 changes: 54 additions & 0 deletions test/helm/gateway-helm/deployment-priorityclass.out.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -172,6 +172,60 @@ rules:
verbs:
- update
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
# These roles grant the standard Kubernetes "admin", "edit", and "view"
# roles access to Gateway API and Envoy-Gateway resources.
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-admin
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["*"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-edit
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["create", "update", "patch", "delete", "deletecollection"]
---
# Source: gateway-helm/templates/k8s-roles-extension.yaml
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: envoy-gateway-namespaced-view
labels:
helm.sh/chart: gateway-helm-v0.0.0-latest
app.kubernetes.io/name: gateway-helm
app.kubernetes.io/instance: gateway-helm
app.kubernetes.io/version: "latest"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rules:
- apiGroups: ["gateway.networking.k8s.io", "gateway.envoyproxy.io"]
resources: ["*"]
verbs: ["get", "list", "watch"]
---
# Source: gateway-helm/templates/envoy-gateway-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
Expand Down
Loading

0 comments on commit 5468f84

Please sign in to comment.