@@ -625,6 +625,20 @@ rules:
625625 - get
626626---
627627apiVersion : rbac.authorization.k8s.io/v1
628+ kind : ClusterRole
629+ metadata :
630+ name : scc-privileged-granter
631+ rules :
632+ - apiGroups :
633+ - security.openshift.io
634+ resourceNames :
635+ - privileged
636+ resources :
637+ - securitycontextconstraints
638+ verbs :
639+ - use
640+ ---
641+ apiVersion : rbac.authorization.k8s.io/v1
628642kind : RoleBinding
629643metadata :
630644 labels :
@@ -670,6 +684,19 @@ subjects:
670684 name : riverbed-operator-controller-manager
671685 namespace : riverbed-operator
672686---
687+ apiVersion : rbac.authorization.k8s.io/v1
688+ kind : ClusterRoleBinding
689+ metadata :
690+ name : riverbed-operator-privileged-granter-binding
691+ roleRef :
692+ apiGroup : rbac.authorization.k8s.io
693+ kind : ClusterRole
694+ name : scc-privileged-granter
695+ subjects :
696+ - kind : ServiceAccount
697+ name : riverbed-operator-controller-manager
698+ namespace : riverbed-operator
699+ ---
673700apiVersion : v1
674701kind : Service
675702metadata :
@@ -738,12 +765,12 @@ spec:
738765 - /manager
739766 env :
740767 - name : RVBD_JAVA_INSTRUMENTATION_IMAGE
741- value : riverbed/riverbed-java-instrumentation:12.27.0.552
768+ value : riverbed/riverbed-java-instrumentation:2.0.1-1
742769 - name : RVBD_DOTNET_INSTRUMENTATION_IMAGE
743- value : riverbed/riverbed-dotnet-instrumentation:12.27.0.552
770+ value : riverbed/riverbed-dotnet-instrumentation:2.0.1-1
744771 - name : RVBD_APM_AGENT_IMAGE
745- value : riverbed/riverbed-apm-agent:12.27.0.552
746- image : riverbed/riverbed-operator:2.0.0 -9
772+ value : riverbed/riverbed-apm-agent:2.0.1-1
773+ image : riverbed/riverbed-operator:2.0.1 -9
747774 livenessProbe :
748775 httpGet :
749776 path : /healthz
@@ -857,26 +884,3 @@ webhooks:
857884 resources :
858885 - pods
859886 sideEffects : None
860- ---
861- apiVersion : rbac.authorization.k8s.io/v1
862- kind : ClusterRole
863- metadata :
864- name : scc-privileged-granter
865- rules :
866- - apiGroups : ["security.openshift.io"]
867- resources : ["securitycontextconstraints"]
868- resourceNames : ["privileged"]
869- verbs : ["use"]
870- ---
871- apiVersion : rbac.authorization.k8s.io/v1
872- kind : ClusterRoleBinding
873- metadata :
874- name : riverbed-operator-privileged-granter-binding
875- subjects :
876- - kind : ServiceAccount
877- name : riverbed-operator-controller-manager
878- namespace : riverbed-operator
879- roleRef :
880- kind : ClusterRole
881- name : scc-privileged-granter
882- apiGroup : rbac.authorization.k8s.io
0 commit comments