78 lines
1.4 KiB
YAML
78 lines
1.4 KiB
YAML
---
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
name: pl-deleter-service-account
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: pl-deleter-cluster-binding
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: pl-deleter-role
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: pl-deleter-service-account
|
|
namespace: "{{ .Release.Namespace }}"
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: pl-deleter-cluster-role
|
|
rules:
|
|
# Allow actions on Kubernetes objects
|
|
- apiGroups:
|
|
- rbac.authorization.k8s.io
|
|
- etcd.database.coreos.com
|
|
- nats.io
|
|
resources:
|
|
- clusterroles
|
|
- clusterrolebindings
|
|
- persistentvolumes
|
|
- etcdclusters
|
|
- natsclusters
|
|
verbs: ["*"]
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: pl-deleter-role
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
- apps
|
|
- rbac.authorization.k8s.io
|
|
- extensions
|
|
- batch
|
|
- policy
|
|
resources:
|
|
- configmaps
|
|
- secrets
|
|
- pods
|
|
- services
|
|
- deployments
|
|
- daemonsets
|
|
- persistentvolumes
|
|
- roles
|
|
- rolebindings
|
|
- serviceaccounts
|
|
- statefulsets
|
|
- cronjobs
|
|
- jobs
|
|
verbs: ["*"]
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: pl-deleter-binding
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: pl-deleter-role
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: pl-deleter-service-account
|
|
namespace: "{{ .Release.Namespace }}"
|