--- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: nmstate-operator rules: - apiGroups: - "" resources: - configmaps - endpoints - events - namespaces - persistentvolumeclaims - pods - secrets - serviceaccounts - services verbs: - '*' - apiGroups: - "" resources: - nodes verbs: - get - list - apiGroups: - admissionregistration.k8s.io resources: - mutatingwebhookconfigurations verbs: - '*' - apiGroups: - apiextensions.k8s.io - nmstate.io resources: - '*' verbs: - '*' - apiGroups: - apps resources: - daemonsets - deployments - replicasets - statefulsets verbs: - '*' - apiGroups: - console.openshift.io resources: - consoleplugins verbs: - '*' - apiGroups: - monitoring.coreos.com resources: - servicemonitors verbs: - create - get - list - patch - update - watch - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - '*' - apiGroups: - operator.openshift.io resources: - consoles verbs: - get - list - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - clusterrolebindings - clusterroles - rolebindings - roles verbs: - '*' --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: nmstate-operator namespace: '{{ .OperatorNamespace }}' rules: - apiGroups: - apps resources: - daemonsets - deployments - replicasets - statefulsets verbs: - '*' - apiGroups: - policy resources: - poddisruptionbudgets verbs: - '*'