diff --git a/control-plane-operator/controllers/hostedcontrolplane/storage/assets/role.yaml b/control-plane-operator/controllers/hostedcontrolplane/storage/assets/role.yaml index 302b57c3b2..c02d4f1470 100644 --- a/control-plane-operator/controllers/hostedcontrolplane/storage/assets/role.yaml +++ b/control-plane-operator/controllers/hostedcontrolplane/storage/assets/role.yaml @@ -1,48 +1,58 @@ +# TODO: Prune the RBACs as cluster-storage-operator and aws-ebs-csi-driver-operator are pruned. apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: cluster-storage-operator-role rules: -- apiGroups: - - coordination.k8s.io - resources: - - leases - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - '*' -- apiGroups: - - "" - resources: - - serviceaccounts - - services - - configmaps - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch - - update + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - '*' + - apiGroups: + - apps + resources: + - deployments + - replicasets + verbs: + - '*' + - apiGroups: + - policy + resources: + - poddisruptionbudgets + verbs: + - '*' + - apiGroups: + - "" + resources: + - serviceaccounts + - services + - configmaps + - pods + - endpoints + - events + - secrets + verbs: + - '*' + - apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - rbac.authorization.k8s.io + resources: + - roles + - rolebindings + verbs: + - watch + - list + - get + - create + - delete + - patch + - update