fix typo for karmada
Signed-off-by: Zechun Chen <zechun.chen@daocloud.io>
This commit is contained in:
parent
aa89947194
commit
b8f9209574
|
@ -161,12 +161,12 @@ func InitKarmadaBootstrapToken(dir string) (string, error) {
|
|||
}
|
||||
|
||||
func createExtraResources(clientSet *kubernetes.Clientset, dir string) error {
|
||||
// grant view clusterrole with karamda resource permission
|
||||
// grant view clusterrole with karmada resource permission
|
||||
if err := grantKarmadaPermissionToViewClusterRole(clientSet); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
// grant edit clusterrole with karamda resource permission
|
||||
// grant edit clusterrole with karmada resource permission
|
||||
if err := grantKarmadaPermissionToEditClusterRole(clientSet); err != nil {
|
||||
return err
|
||||
}
|
||||
|
|
|
@ -26,7 +26,7 @@ import (
|
|||
)
|
||||
|
||||
const (
|
||||
karamdaViewClusterRole = "karmada-view"
|
||||
karmadaViewClusterRole = "karmada-view"
|
||||
karmadaEditClusterRole = "karmada-edit"
|
||||
karmadaAgentAccessClusterRole = "system:karmada:agent"
|
||||
karmadaAgentGroup = "system:nodes"
|
||||
|
@ -142,7 +142,7 @@ func grantAccessPermissionToAgent(clientSet kubernetes.Interface) error {
|
|||
return nil
|
||||
}
|
||||
|
||||
// grantKarmadaPermissionToViewClusterRole grants view clusterrole with karamda resource permission
|
||||
// grantKarmadaPermissionToViewClusterRole grants view clusterrole with karmada resource permission
|
||||
func grantKarmadaPermissionToViewClusterRole(clientSet kubernetes.Interface) error {
|
||||
annotations := map[string]string{
|
||||
// refer to https://kubernetes.io/docs/reference/access-authn-authz/rbac/#auto-reconciliation
|
||||
|
@ -155,7 +155,7 @@ func grantKarmadaPermissionToViewClusterRole(clientSet kubernetes.Interface) err
|
|||
// used to aggregate rules to view clusterrole
|
||||
"rbac.authorization.k8s.io/aggregate-to-view": "true",
|
||||
}
|
||||
clusterRole := utils.ClusterRoleFromRules(karamdaViewClusterRole, []rbacv1.PolicyRule{
|
||||
clusterRole := utils.ClusterRoleFromRules(karmadaViewClusterRole, []rbacv1.PolicyRule{
|
||||
{
|
||||
APIGroups: []string{"autoscaling.karmada.io"},
|
||||
Resources: []string{
|
||||
|
@ -213,7 +213,7 @@ func grantKarmadaPermissionToViewClusterRole(clientSet kubernetes.Interface) err
|
|||
return nil
|
||||
}
|
||||
|
||||
// grantKarmadaPermissionToEditClusterRole grants edit clusterrole with karamda resource permission
|
||||
// grantKarmadaPermissionToEditClusterRole grants edit clusterrole with karmada resource permission
|
||||
func grantKarmadaPermissionToEditClusterRole(clientSet kubernetes.Interface) error {
|
||||
annotations := map[string]string{
|
||||
// refer to https://kubernetes.io/docs/reference/access-authn-authz/rbac/#auto-reconciliation
|
||||
|
|
Loading…
Reference in New Issue