@@ -18,9 +18,14 @@ import (
18
18
var DefautltWegoAppRules = []rbacv1.PolicyRule {
19
19
{
20
20
APIGroups : []string {"" },
21
- Resources : []string {"secrets" , " pods" , "events " },
21
+ Resources : []string {"pods" , "secrets " },
22
22
Verbs : []string {"get" , "list" },
23
23
},
24
+ {
25
+ APIGroups : []string {"" },
26
+ Resources : []string {"events" },
27
+ Verbs : []string {"get" , "list" , "watch" },
28
+ },
24
29
{
25
30
APIGroups : []string {"apps" },
26
31
Resources : []string {"deployments" , "replicasets" },
@@ -38,14 +43,9 @@ var DefautltWegoAppRules = []rbacv1.PolicyRule{
38
43
},
39
44
{
40
45
APIGroups : []string {"source.toolkit.fluxcd.io" },
41
- Resources : []string {"buckets" , "helmcharts" , "gitrepositories" , "helmrepositories " },
46
+ Resources : []string {"buckets" , "helmcharts" , "helmrepositories" , " gitrepositories" , "ocirepositories " },
42
47
Verbs : []string {"get" , "list" },
43
48
},
44
- {
45
- APIGroups : []string {"" },
46
- Resources : []string {"events" },
47
- Verbs : []string {"get" , "list" , "watch" },
48
- },
49
49
}
50
50
51
51
// Checker contains methods for validing user access to Kubernetes namespaces, based on a set of PolicyRules
0 commit comments