Skip to content

Commit

Permalink
chore: Update deployment descriptors and docs (#358)
Browse files Browse the repository at this point in the history
Signed-off-by: Daniel Pacak <pacak.daniel@gmail.com>
Co-authored-by: Liz Rice <liz@lizrice.com>
  • Loading branch information
danielpacak and lizrice committed Jan 26, 2021
1 parent 89a8ceb commit 110c372
Show file tree
Hide file tree
Showing 23 changed files with 2,040 additions and 965 deletions.
3 changes: 2 additions & 1 deletion CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -179,10 +179,11 @@ started with a basic development workflow. For other install modes see [Operator

### Prerequisites

1. Send the definition of the VulnerabilityReport custom resource to the Kubernetes API:
1. Send custom resource definitions to the Kubernetes API:

```
$ kubectl apply -f deploy/crd/vulnerabilityreports.crd.yaml
$ kubectl apply -f deploy/crd/configauditreports.crd.yaml
```
2. Send the following Kubernetes objects definitions to the Kubernetes API:

Expand Down
24 changes: 24 additions & 0 deletions deploy/crd/configauditreports.crd.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,3 +20,27 @@ spec:
- all
shortNames:
- configaudit
additionalPrinterColumns:
- JSONPath: .report.scanner.name
type: string
name: Scanner
description: The name of the config audit scanner
- JSONPath: .metadata.creationTimestamp
type: date
name: Age
description: The age of the report
- JSONPath: .report.summary.passCount
type: integer
name: Pass
priority: 1
description: The number of checks that passed
- JSONPath: .report.summary.dangerCount
type: integer
name: Danger
priority: 1
description: The number of checks that failed with Danger status
- JSONPath: .report.summary.warningCount
type: integer
name: Warning
priority: 1
description: The number of checks that failed with Warning status
2 changes: 1 addition & 1 deletion deploy/crd/vulnerabilityreports.crd.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -151,7 +151,7 @@ spec:
- JSONPath: .metadata.creationTimestamp
type: date
name: Age
description: The age of Vulnerability
description: The age of the report
- JSONPath: .report.summary.criticalCount
type: integer
name: Critical
Expand Down
1 change: 1 addition & 0 deletions deploy/helm/templates/rbac.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,7 @@ rules:
- aquasecurity.github.io
resources:
- vulnerabilityreports
- configauditreports
verbs:
- get
- list
Expand Down
6 changes: 0 additions & 6 deletions deploy/helm/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,12 +50,6 @@ envSecret:
# properly.
stringData:
OPERATOR_LOG_DEV_MODE: "false"
OPERATOR_SCANNER_TRIVY_ENABLED: "true"
OPERATOR_SCANNER_AQUA_CSP_ENABLED: "false"
OPERATOR_SCANNER_AQUA_CSP_VERSION: ""
OPERATOR_SCANNER_AQUA_CSP_HOST: ""
OPERATOR_SCANNER_AQUA_CSP_USER: ""
OPERATOR_SCANNER_AQUA_CSP_PASSWORD: ""

rbac:
create: true
Expand Down
7 changes: 0 additions & 7 deletions deploy/init/01-starboard.ns.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions deploy/init/02-starboard.sa.yaml

This file was deleted.

200 changes: 0 additions & 200 deletions deploy/init/03-starboard.cm.yaml

This file was deleted.

36 changes: 0 additions & 36 deletions deploy/init/04-starboard.clusterrole.yaml

This file was deleted.

14 changes: 0 additions & 14 deletions deploy/init/05-starboard.clusterrolebinding.yaml

This file was deleted.

1 change: 1 addition & 0 deletions deploy/static/03-starboard-operator.clusterrole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,7 @@ rules:
- aquasecurity.github.io
resources:
- vulnerabilityreports
- configauditreports
verbs:
- get
- list
Expand Down

0 comments on commit 110c372

Please sign in to comment.