mirror of
https://github.com/kubernetes-sigs/kubespray.git
synced 2026-04-11 21:19:28 -02:30
* Use alternate self-sufficient shellcheck precommit This pre-commit does not require prerequisite on the host, making it easier to run in CI workflows. * Switch to upstream ansible-lint pre-commit hook This way, the hook is self contained and does not depend on a previous virtualenv installation. * pre-commit: fix hooks dependencies - ansible-syntax-check - tox-inventory-builder - jinja-syntax-check * Fix ci-matrix pre-commit hook - Remove dependency of pydblite which fails to setup on recent pythons - Discard shell script and put everything into pre-commit * pre-commit: apply autofixes hooks and fix the rest manually - markdownlint (manual fix) - end-of-file-fixer - requirements-txt-fixer - trailing-whitespace * Convert check_typo to pre-commit + use maintained version client9/misspell is unmaintained, and has been forked by the golangci team, see https://github.com/client9/misspell/issues/197#issuecomment-1596318684. They haven't yet added a pre-commit config, so use my fork with the pre-commit hook config until the pull request is merged. * collection-build-install convert to pre-commit * Run pre-commit hooks in dynamic pipeline Use gitlab dynamic child pipelines feature to have one source of truth for the pre-commit jobs, the pre-commit config file. Use one cache per pre-commit. This should reduce the "fetching cache" time steps in gitlab-ci, since each job will have a separate cache with only its hook installed. * Remove gitlab-ci job done in pre-commit * pre-commit: adjust mardownlint default, md fixes Use a style file as recommended by upstream. This makes for only one source of truth. Conserve previous upstream default for MD007 (upstream default changed here https://github.com/markdownlint/markdownlint/pull/373) * Update pre-commit hooks --------- Co-authored-by: Max Gautier <mg@max.gautier.name>
141 lines
4.4 KiB
Django/Jinja
141 lines
4.4 KiB
Django/Jinja
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: scheduler-plugins-scheduler
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["namespaces"]
|
|
verbs: ["get", "list", "watch"]
|
|
- apiGroups: ["", "events.k8s.io"]
|
|
resources: ["events"]
|
|
verbs: ["create", "patch", "update"]
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resources: ["leases"]
|
|
verbs: ["create"]
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resourceNames: ["kube-scheduler"]
|
|
resources: ["leases"]
|
|
verbs: ["get", "update"]
|
|
- apiGroups: [""]
|
|
resources: ["endpoints"]
|
|
verbs: ["create"]
|
|
- apiGroups: [""]
|
|
resourceNames: ["kube-scheduler"]
|
|
resources: ["endpoints"]
|
|
verbs: ["get", "update"]
|
|
- apiGroups: [""]
|
|
resources: ["nodes"]
|
|
verbs: ["get", "list", "watch", "patch"]
|
|
- apiGroups: [""]
|
|
resources: ["pods"]
|
|
verbs: ["delete", "get", "list", "watch", "update"]
|
|
- apiGroups: [""]
|
|
resources: ["bindings", "pods/binding"]
|
|
verbs: ["create"]
|
|
- apiGroups: [""]
|
|
resources: ["pods/status"]
|
|
verbs: ["patch", "update"]
|
|
- apiGroups: [""]
|
|
resources: ["replicationcontrollers", "services"]
|
|
verbs: ["get", "list", "watch"]
|
|
- apiGroups: ["apps", "extensions"]
|
|
resources: ["replicasets"]
|
|
verbs: ["get", "list", "watch"]
|
|
- apiGroups: ["apps"]
|
|
resources: ["statefulsets"]
|
|
verbs: ["get", "list", "watch"]
|
|
- apiGroups: ["policy"]
|
|
resources: ["poddisruptionbudgets"]
|
|
verbs: ["get", "list", "watch"]
|
|
- apiGroups: [""]
|
|
resources: ["persistentvolumeclaims", "persistentvolumes"]
|
|
verbs: ["get", "list", "watch", "patch", "update"]
|
|
- apiGroups: ["authentication.k8s.io"]
|
|
resources: ["tokenreviews"]
|
|
verbs: ["create"]
|
|
- apiGroups: ["authorization.k8s.io"]
|
|
resources: ["subjectaccessreviews"]
|
|
verbs: ["create"]
|
|
- apiGroups: ["storage.k8s.io"]
|
|
resources: ["csinodes", "storageclasses" , "csidrivers" , "csistoragecapacities"]
|
|
verbs: ["get", "list", "watch"]
|
|
- apiGroups: ["topology.node.k8s.io"]
|
|
resources: ["noderesourcetopologies"]
|
|
verbs: ["get", "list", "watch"]
|
|
# resources need to be updated with the scheduler plugins used
|
|
- apiGroups: ["scheduling.x-k8s.io"]
|
|
resources: ["podgroups", "elasticquotas", "podgroups/status", "elasticquotas/status"]
|
|
verbs: ["get", "list", "watch", "create", "delete", "update", "patch"]
|
|
# for network-aware plugins add the following lines (scheduler-plugins v0.27.8)
|
|
#- apiGroups: [ "appgroup.diktyo.x-k8s.io" ]
|
|
# resources: [ "appgroups" ]
|
|
# verbs: [ "get", "list", "watch", "create", "delete", "update", "patch" ]
|
|
#- apiGroups: [ "networktopology.diktyo.x-k8s.io" ]
|
|
# resources: [ "networktopologies" ]
|
|
# verbs: [ "get", "list", "watch", "create", "delete", "update", "patch" ]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: scheduler-plugins-scheduler
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: scheduler-plugins-scheduler
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: scheduler-plugins-scheduler
|
|
namespace: {{ scheduler_plugins_namespace }}
|
|
---
|
|
kind: ClusterRole
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: scheduler-plugins-controller
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["pods"]
|
|
verbs: ["get", "list", "watch"]
|
|
- apiGroups: [""]
|
|
resources: ["events"]
|
|
verbs: ["create", "patch", "update"]
|
|
- apiGroups: [""]
|
|
resources: ["nodes"]
|
|
verbs: ["get", "list", "watch", "patch"]
|
|
- apiGroups: ["topology.node.k8s.io"]
|
|
resources: ["noderesourcetopologies"]
|
|
verbs: ["get", "list", "watch"]
|
|
# resources need to be updated with the scheduler plugins used
|
|
- apiGroups: ["scheduling.x-k8s.io"]
|
|
resources: ["podgroups", "elasticquotas", "podgroups/status", "elasticquotas/status"]
|
|
verbs: ["get", "list", "watch", "create", "delete", "update", "patch"]
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: scheduler-plugins-controller
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: scheduler-plugins-controller
|
|
namespace: {{ scheduler_plugins_namespace }}
|
|
roleRef:
|
|
kind: ClusterRole
|
|
name: scheduler-plugins-controller
|
|
apiGroup: rbac.authorization.k8s.io
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: sched-plugins::extension-apiserver-authentication-reader
|
|
namespace: kube-system
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: extension-apiserver-authentication-reader
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: scheduler-plugins-scheduler
|
|
namespace: {{ scheduler_plugins_namespace }}
|
|
- kind: ServiceAccount
|
|
name: scheduler-plugins-controller
|
|
namespace: {{ scheduler_plugins_namespace }}
|