This is an automated email from the ASF dual-hosted git repository.

astefanutti pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-k.git

commit e9f1105e1c8c7d40594db4b4aad2edd68b0bd7cf
Author: Antonin Stefanutti <anto...@stefanutti.fr>
AuthorDate: Fri Jan 28 12:31:39 2022 +0100

    chore(doc): Document Knative Addressable resolver RBAC for Knative Sinks
---
 .../ROOT/pages/installation/advanced/knative.adoc  | 43 ++--------------------
 1 file changed, 3 insertions(+), 40 deletions(-)

diff --git a/docs/modules/ROOT/pages/installation/advanced/knative.adoc 
b/docs/modules/ROOT/pages/installation/advanced/knative.adoc
index 7bb61d7..a67d6ca 100644
--- a/docs/modules/ROOT/pages/installation/advanced/knative.adoc
+++ b/docs/modules/ROOT/pages/installation/advanced/knative.adoc
@@ -41,45 +41,8 @@ However, a Knative Sink can be any Kubernetes resource 
that's _addressable_, i.e
 This is what the Camel K operator does to resolve the Sink URLs, so that 
events can be sent to.
 That requires the ServiceAccount that runs the operator to be granted 
permission to GET these resources, while it configures the integration runtime.
 
-As the set of resources is arbitrary, and cannot be known _a-priori_, these 
permissions must be added to a Camel K operator Role, or ClusterRole, that's 
bound to the `camel-k-operator` ServiceAccount.
+As the set of resources is arbitrary, and cannot be known _a-priori_, these 
permissions are automatically granted to `camel-k-operator` ServiceAccount, by 
relying on the Knative Addressable resolver aggregated ClusterRole.
 
-For the above examples, that sink into an `eventing.knative.dev/broker` 
resource, this can be achieved by creating the following resources:
+For the above examples, that sink into an `eventing.knative.dev/broker` 
resource, this is already being configured by Knative, that aggregates the 
required permissions for its own resources by default.
 
-.operator-role-knative-sinks.yaml
-[source,yaml]
-----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRole
-metadata:
-  labels:
-    app: camel-k
-  name: camel-k-operator-knative-sinks
-rules:
-- apiGroups:
-  - eventing.knative.dev
-  resources:
-  - brokers
-  verbs:
-  - get
-----
-
-.operator-rolebinding-knative-sinks.yaml
-[source,yaml]
-----
-kind: ClusterRoleBinding
-apiVersion: rbac.authorization.k8s.io/v1
-metadata:
-  name: camel-k-operator-knative-sinks
-  labels:
-    app: "camel-k"
-subjects:
-- kind: ServiceAccount
-  name: camel-k-operator
-  namespace: camel-k
-roleRef:
-  apiGroup: rbac.authorization.k8s.io
-  kind: ClusterRole
-  name: camel-k-operator-knative-sinks
-----
-
-These resources apply when the Camel K operator is deployed in _global_ mode, 
into the `camel-k` namespace, and should be adapted depending on how the 
operator is actually deployed.
+However, if you integrate custom resources as sinks, the required permissions 
must be added manually, as documented in the 
https://knative.dev/docs/eventing/sinks/#using-custom-resources-as-sinks[Knative
 documentation].

Reply via email to