cloud-8.x-2.0-beta1/modules/cloud_service_providers/k8s/k8s.routing.yml
modules/cloud_service_providers/k8s/k8s.routing.yml
# Kubernetes Routing Definition
# Kubernetes Admin Settings
k8s.settings:
path: '/admin/config/services/cloud/k8s'
defaults:
_entity_list: 'cloud_config'
_title: Kubernetes
requirements:
_permission: 'administer k8s'
k8s.settings.options:
path: '/admin/config/services/cloud/k8s/settings'
defaults:
_title: Kubernetes
_form: '\Drupal\k8s\Form\Config\K8sAdminSettings'
requirements:
_permission: 'administer k8s'
k8s.update_all_resources:
path: '/clouds/k8s/{cloud_context}/node/update_all_resources'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateAllResources'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'view k8s node'
entity.k8s_node.list_update:
path: '/clouds/k8s/{cloud_context}/node/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateNodeList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'view k8s node'
entity.k8s_node.metrics:
path: '/clouds/k8s/{cloud_context}/node/{k8s_node}/metrics'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::getNodeMetrics'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'view k8s node'
parameters:
k8s_node:
type: 'entity:k8s_node'
converter: paramconverter.entity
entity.k8s_node.usage_list:
path: '/clouds/k8s/{cloud_context}/node/allocated_resources'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::getNodeAllocatedResourcesList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'view k8s node'
entity.k8s_node.usage:
path: '/clouds/k8s/{cloud_context}/node/{k8s_node}/allocated_resources'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::getNodeAllocatedResources'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'view k8s node'
entity.k8s_namespace.list_update:
path: '/clouds/k8s/{cloud_context}/namespace/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateNamespaceList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s namespace'
entity.k8s_pod.list_update:
path: '/clouds/k8s/{cloud_context}/pod/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updatePodList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit any k8s pod+edit own k8s pod'
entity.k8s_pod.metrics:
path: '/clouds/k8s/{cloud_context}/pod/{k8s_pod}/metrics'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::getPodMetrics'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'view any k8s pod+view own k8s pod'
parameters:
k8s_pod:
type: 'entity:k8s_pod'
converter: paramconverter.entity
entity.k8s_deployment.list_update:
path: '/clouds/k8s/{cloud_context}/deployment/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateDeploymentList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s deployment'
entity.k8s_replica_set.list_update:
path: '/clouds/k8s/{cloud_context}/replica_set/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateReplicaSetList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s replica set'
entity.k8s_service.list_update:
path: '/clouds/k8s/{cloud_context}/service/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateServiceList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s service'
entity.k8s_cron_job.list_update:
path: '/clouds/k8s/{cloud_context}/cron_job/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateCronJobList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s cron job'
entity.k8s_job.list_update:
path: '/clouds/k8s/{cloud_context}/job/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateJobList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s job'
entity.k8s_resource_quota.list_update:
path: '/clouds/k8s/{cloud_context}/resource_quota/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateResourceQuotaList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s resource quota'
entity.k8s_limit_range.list_update:
path: '/clouds/k8s/{cloud_context}/limit_range/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateLimitRangeList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s limit range'
entity.k8s_secret.list_update:
path: '/clouds/k8s/{cloud_context}/secret/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateSecretList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s secret'
entity.k8s_config_map.list_update:
path: '/clouds/k8s/{cloud_context}/config_map/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateConfigMapList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s config map'
entity.k8s_pod.log_form:
path: '/clouds/k8s/{cloud_context}/pod/{k8s_pod}/log'
defaults:
_entity_form: 'k8s_pod.log'
_title: 'Log'
requirements:
_entity_access: 'k8s_pod.log'
entity.k8s_network_policy.list_update:
path: '/clouds/k8s/{cloud_context}/network_policy/update'
defaults:
_controller: '\Drupal\k8s\Controller\ApiController::updateNetworkPolicyList'
requirements:
# Use custom access that will check for cloud_context and the desired permission.
# Desired permission is passed as an option in the "perm" variable
_custom_access: '\Drupal\cloud\Controller\CloudConfigController::access'
options:
perm: 'edit k8s network policy'
