Skip to content

Commit

Permalink
fix: garm-server wasn't able to create runner-ns
Browse files Browse the repository at this point in the history
Signed-off-by: Mario Constanti <mario.constanti@mercedes-benz.com>
  • Loading branch information
bavarianbidi committed Dec 8, 2023
1 parent 962d3dc commit aed0f1b
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 8 deletions.
6 changes: 3 additions & 3 deletions hack/local-development/kubernetes/clusterrole-binding.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@ apiVersion: rbac.authorization.k8s.io/v1
# This cluster role binding allows anyone in the "manager" group to read secrets in any namespace.
kind: RoleBinding
metadata:
name: garm-server
name: garm-provider-k8s
namespace: runner
subjects:
- kind: ServiceAccount
namespace: garm-server
name: garm-server
roleRef:
kind: Role
name: garm-server
kind: ClusterRole
name: garm-provider-k8s
apiGroup: rbac.authorization.k8s.io
10 changes: 5 additions & 5 deletions hack/local-development/kubernetes/clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
# SPDX-License-Identifier: MIT

apiVersion: rbac.authorization.k8s.io/v1
kind: Role
kind: ClusterRole
metadata:
name: garm-server
namespace: runner
name: garm-provider-k8s
rules:
- apiGroups: [""]
resources: ["namespaces"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
- apiGroups: [""]
resources: ["pods"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]

0 comments on commit aed0f1b

Please sign in to comment.