fix typo for karmada

Signed-off-by: Zechun Chen <zechun.chen@daocloud.io>
This commit is contained in:
Zechun Chen 2024-03-18 15:39:16 +08:00
parent aa89947194
commit b8f9209574
2 changed files with 6 additions and 6 deletions

View File

@ -161,12 +161,12 @@ func InitKarmadaBootstrapToken(dir string) (string, error) {
}
func createExtraResources(clientSet *kubernetes.Clientset, dir string) error {
// grant view clusterrole with karamda resource permission
// grant view clusterrole with karmada resource permission
if err := grantKarmadaPermissionToViewClusterRole(clientSet); err != nil {
return err
}
// grant edit clusterrole with karamda resource permission
// grant edit clusterrole with karmada resource permission
if err := grantKarmadaPermissionToEditClusterRole(clientSet); err != nil {
return err
}

View File

@ -26,7 +26,7 @@ import (
)
const (
karamdaViewClusterRole = "karmada-view"
karmadaViewClusterRole = "karmada-view"
karmadaEditClusterRole = "karmada-edit"
karmadaAgentAccessClusterRole = "system:karmada:agent"
karmadaAgentGroup = "system:nodes"
@ -142,7 +142,7 @@ func grantAccessPermissionToAgent(clientSet kubernetes.Interface) error {
return nil
}
// grantKarmadaPermissionToViewClusterRole grants view clusterrole with karamda resource permission
// grantKarmadaPermissionToViewClusterRole grants view clusterrole with karmada resource permission
func grantKarmadaPermissionToViewClusterRole(clientSet kubernetes.Interface) error {
annotations := map[string]string{
// refer to https://kubernetes.io/docs/reference/access-authn-authz/rbac/#auto-reconciliation
@ -155,7 +155,7 @@ func grantKarmadaPermissionToViewClusterRole(clientSet kubernetes.Interface) err
// used to aggregate rules to view clusterrole
"rbac.authorization.k8s.io/aggregate-to-view": "true",
}
clusterRole := utils.ClusterRoleFromRules(karamdaViewClusterRole, []rbacv1.PolicyRule{
clusterRole := utils.ClusterRoleFromRules(karmadaViewClusterRole, []rbacv1.PolicyRule{
{
APIGroups: []string{"autoscaling.karmada.io"},
Resources: []string{
@ -213,7 +213,7 @@ func grantKarmadaPermissionToViewClusterRole(clientSet kubernetes.Interface) err
return nil
}
// grantKarmadaPermissionToEditClusterRole grants edit clusterrole with karamda resource permission
// grantKarmadaPermissionToEditClusterRole grants edit clusterrole with karmada resource permission
func grantKarmadaPermissionToEditClusterRole(clientSet kubernetes.Interface) error {
annotations := map[string]string{
// refer to https://kubernetes.io/docs/reference/access-authn-authz/rbac/#auto-reconciliation