diff --git a/config/manager/webhook-secret.yaml b/config/manager/webhook-secret.yaml index 95dec509..df6957c8 100644 --- a/config/manager/webhook-secret.yaml +++ b/config/manager/webhook-secret.yaml @@ -7,3 +7,5 @@ kind: Secret metadata: name: coherence-webhook-server-cert namespace: coherence + labels: + control-plane: coherence diff --git a/config/rbac/leader_election_role.yaml b/config/rbac/leader_election_role.yaml index 4190ec80..36bfb341 100644 --- a/config/rbac/leader_election_role.yaml +++ b/config/rbac/leader_election_role.yaml @@ -3,6 +3,8 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: leader-election-role + labels: + control-plane: coherence rules: - apiGroups: - "" diff --git a/config/rbac/leader_election_role_binding.yaml b/config/rbac/leader_election_role_binding.yaml index f6f38be3..b9958d30 100644 --- a/config/rbac/leader_election_role_binding.yaml +++ b/config/rbac/leader_election_role_binding.yaml @@ -2,6 +2,8 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: leader-election-rolebinding + labels: + control-plane: coherence roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/config/rbac/role.yaml b/config/rbac/role.yaml index 472c2756..500e3dc5 100644 --- a/config/rbac/role.yaml +++ b/config/rbac/role.yaml @@ -2,8 +2,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: - creationTimestamp: null name: manager-role + labels: + control-plane: coherence rules: - apiGroups: - "" diff --git a/docs/about/04_coherence_spec.adoc b/docs/about/04_coherence_spec.adoc index 0105ffa3..59289807 100644 --- a/docs/about/04_coherence_spec.adoc +++ b/docs/about/04_coherence_spec.adoc @@ -921,7 +921,7 @@ m| allowUnsafeDelete | AllowUnsafeDelete controls whether the Operator will add m| actions | Actions to execute once all the Pods are ready after an initial deployment m| []<> | false m| envFrom | List of sources to populate environment variables in the container. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated. m| []https://{k8s-doc-link}/#envfromsource-v1-core[corev1.EnvFromSource] | false m| global | Global contains attributes that will be applied to all resources managed by the Coherence Operator. m| *<> | false -m| resources | InitResources is the optional resource requests and limits for the init-container that the Operator adds to the Pod. + +m| initResources | InitResources is the optional resource requests and limits for the init-container that the Operator adds to the Pod. + ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ + + The Coherence operator does not apply any default resources. m| *https://{k8s-doc-link}/#resourcerequirements-v1-core[corev1.ResourceRequirements] | false |=== diff --git a/helm-charts/coherence-operator/templates/rbac.yaml b/helm-charts/coherence-operator/templates/rbac.yaml index 44d6d509..b419250a 100644 --- a/helm-charts/coherence-operator/templates/rbac.yaml +++ b/helm-charts/coherence-operator/templates/rbac.yaml @@ -246,6 +246,8 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: leader-election-role + labels: + control-plane: coherence rules: - apiGroups: - "" @@ -287,6 +289,8 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: leader-election-rolebinding + labels: + control-plane: coherence roleRef: apiGroup: rbac.authorization.k8s.io kind: Role