From 119c20587f169446481b27ce543766034f319f58 Mon Sep 17 00:00:00 2001 From: Peng Liu Date: Thu, 7 May 2020 22:39:49 -0400 Subject: [PATCH] Use privileged SCC to replace runlevel --- bindata/manifests/plugins/002-rbac.yaml | 43 ++++++ deploy/namespace.yaml | 1 - deploy/role.yaml | 16 +++ ...operator.v4.5.0.clusterserviceversion.yaml | 25 ++-- .../sriovnetworknodepolicy_controller.go | 134 ++---------------- 5 files changed, 87 insertions(+), 132 deletions(-) diff --git a/bindata/manifests/plugins/002-rbac.yaml b/bindata/manifests/plugins/002-rbac.yaml index 7042254d6..f1b205b5e 100644 --- a/bindata/manifests/plugins/002-rbac.yaml +++ b/bindata/manifests/plugins/002-rbac.yaml @@ -10,3 +10,46 @@ kind: ServiceAccount metadata: name: sriov-device-plugin namespace: {{.Namespace}} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: sriov-plugin + namespace: {{.Namespace}} +rules: + - apiGroups: + - security.openshift.io + resourceNames: + - privileged + resources: + - securitycontextconstraints + verbs: + - use +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: sriov-cni + namespace: {{.Namespace}} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: sriov-plugin +subjects: + - kind: ServiceAccount + name: sriov-cni + namespace: {{.Namespace}} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: sriov-device-plugin + namespace: {{.Namespace}} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: sriov-plugin +subjects: + - kind: ServiceAccount + name: sriov-device-plugin + namespace: {{.Namespace}} diff --git a/deploy/namespace.yaml b/deploy/namespace.yaml index 88f50c716..372847857 100644 --- a/deploy/namespace.yaml +++ b/deploy/namespace.yaml @@ -4,4 +4,3 @@ metadata: name: $NAMESPACE labels: name: $NAMESPACE - openshift.io/run-level: "1" diff --git a/deploy/role.yaml b/deploy/role.yaml index 898761aae..79c29777a 100644 --- a/deploy/role.yaml +++ b/deploy/role.yaml @@ -40,6 +40,14 @@ rules: - deployments/finalizers verbs: - update +- apiGroups: + - rbac.authorization.k8s.io + resources: + - serviceaccounts + - roles + - rolebindings + verbs: + - '*' --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role @@ -65,3 +73,11 @@ rules: - sriovnetworknodestates verbs: - '*' +- apiGroups: + - security.openshift.io + resourceNames: + - privileged + resources: + - securitycontextconstraints + verbs: + - use diff --git a/manifests/4.5/sriov-network-operator.v4.5.0.clusterserviceversion.yaml b/manifests/4.5/sriov-network-operator.v4.5.0.clusterserviceversion.yaml index 271f03a32..04a8ac74c 100644 --- a/manifests/4.5/sriov-network-operator.v4.5.0.clusterserviceversion.yaml +++ b/manifests/4.5/sriov-network-operator.v4.5.0.clusterserviceversion.yaml @@ -105,14 +105,7 @@ spec: This operator has to run in namespace 'openshift-sriov-network-operator'. An Operator Group is also required to install this operator: ``` - $ oc create -f - <