api-server/deploy/30-service-account.yaml

78 lines
1.6 KiB
YAML

---
apiVersion: v1
kind: ServiceAccount
metadata:
name: p5x-api-sa
namespace: p5x-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: p5x-api-configmap-role
namespace: p5x-system
rules:
- apiGroups: [""]
resources: ["configmaps"]
resourceNames: ["dynamic-kv"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: p5x-api-configmap-binding
namespace: p5x-system
subjects:
- kind: ServiceAccount
name: p5x-api-sa
namespace: p5x-system
roleRef:
kind: Role
name: p5x-api-configmap-role
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: pod-self-read-role
namespace: p5x-system
rules:
- apiGroups: [""]
resources: ["pods"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: pod-self-read-binding
namespace: p5x-system
subjects:
- kind: ServiceAccount
name: p5x-api-sa
namespace: p5x-system
roleRef:
kind: Role
name: pod-self-read-role
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: node-label-read-role
rules:
- apiGroups: [""]
resources: ["nodes"]
verbs: ["get", "list", "watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: node-label-read-binding
subjects:
- kind: ServiceAccount
name: p5x-api-sa
namespace: p5x-system
roleRef:
kind: ClusterRole
name: node-label-read-role
apiGroup: rbac.authorization.k8s.io