feat: support third party orm to interact with go-zero (#1286)
* fixes #987 * chore: fix test failure * chore: add comments * feat: support third party orm to interact with go-zero * chore: refactor
This commit is contained in:
9
zrpc/resolver/internal/kube/deploy/clusterrole.yaml
Normal file
9
zrpc/resolver/internal/kube/deploy/clusterrole.yaml
Normal file
@@ -0,0 +1,9 @@
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: endpoints-reader
|
||||
rules:
|
||||
- apiGroups: [""]
|
||||
resources: ["endpoints"]
|
||||
verbs: ["get", "watch", "list"]
|
||||
|
||||
12
zrpc/resolver/internal/kube/deploy/clusterrolebinding.yaml
Normal file
12
zrpc/resolver/internal/kube/deploy/clusterrolebinding.yaml
Normal file
@@ -0,0 +1,12 @@
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: endpoints-reader
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: endpoints-reader
|
||||
namespace: kevin # the namespace that the ServiceAccount resides in
|
||||
roleRef:
|
||||
kind: ClusterRole
|
||||
name: endpoints-reader
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
5
zrpc/resolver/internal/kube/deploy/serviceaccount.yaml
Normal file
5
zrpc/resolver/internal/kube/deploy/serviceaccount.yaml
Normal file
@@ -0,0 +1,5 @@
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: endpoints-reader
|
||||
namespace: kevin # the namespace to create the ServiceAccount
|
||||
Reference in New Issue
Block a user