Files
app-kubevirt/stx-kubevirt-app-helm/stx-kubevirt-app-helm/helm-charts/kubevirt-app/templates/cdi-clusterrolebinding.yaml
Gleb Aronsky 3985cc7a84 Add KubeVirt app to StarlingX
Builds and installs a FluxCD package with KubeVirt.

This builds a deb format package that contains the .tgz file
that can be installed on the controller using
system application management.

Installation Steps for the Controller
  - Unpack deb package
  - Find the kubevirt.tgz versioned file in
    /usr/local/share/applications/helm/ and execute:
    	- 'system application-upload <kubevirt.tgz file>'
        - 'system application-apply kubevirt-app'
 - Verify that kubevirt is running by executing
   'kubectl get all -n kubevirt'
 - Verify that cdi is running by executing
   'kubectl get all -n cdi'
 - virtctl is installed to /var/opt/kubevirt

Test Plan:
  Passed: Install KubeVirt using sysinv
  Passed: Remove KubeVirt using sysinv
  Passed: Testing creating a Debian VM AIO-SX
  Passed: Executed virtctl
  Passed: Verify application-remove removes virtctl
  Passed: Exercised kubevirt.io lab 2 using CDI to import a VM

Story: 2010096
Task: 45651

Change-Id: I9624089a0f9e6a8dcdb7805c6b9091ae33c06cd7
Signed-off-by: Gleb Aronsky <gleb.aronsky@windriver.com>
2022-09-30 08:14:18 -07:00

33 lines
945 B
YAML

# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http:#www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# Copyright (c) 2022 Wind River Systems, Inc.
#
# SPDX-License-Identifier: Apache-2.0
#
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
operator.cdi.kubevirt.io: ""
name: cdi-operator
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cdi-operator-cluster
subjects:
- kind: ServiceAccount
name: cdi-operator
namespace: cdi