X-Git-Url: https://gerrit.akraino.org/r/gitweb?p=ta%2Fcaas-security.git;a=blobdiff_plain;f=rbac_manifests%2Fsvcwatcher-rbac-config.yml;fp=rbac_manifests%2Fsvcwatcher-rbac-config.yml;h=d827b7273aaa76ca80656478aa0d3e1b9a9f6618;hp=0000000000000000000000000000000000000000;hb=c177c44e5d4c49eeb51b44487a614b865f8bf002;hpb=f2937b9484f58be8f23ae50500f30ca0f0e16e3b diff --git a/rbac_manifests/svcwatcher-rbac-config.yml b/rbac_manifests/svcwatcher-rbac-config.yml new file mode 100644 index 0000000..d827b72 --- /dev/null +++ b/rbac_manifests/svcwatcher-rbac-config.yml @@ -0,0 +1,87 @@ +--- +# Copyright 2019 Nokia +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +apiVersion: v1 +kind: ServiceAccount +metadata: + name: svcwatcher + namespace: kube-system + labels: + kubernetes.io/cluster-service: "true" +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: caas:svcwatcher +rules: +- apiGroups: + - "" + resources: + - endpoints + verbs: + - list + - watch + - get + - update + - create + - delete +- apiGroups: + - "" + resources: + - services + - pods + verbs: + - list + - watch + - get +- apiGroups: + - "danm.k8s.io" + resources: + - danmnets + - danmeps + verbs: + - get + - list + - watch + - create + - update + - patch + - delete +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: caas:svcwatcher +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: caas:svcwatcher +subjects: +- kind: ServiceAccount + namespace: kube-system + name: svcwatcher +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: caas:svcwatcher-psp +subjects: +- kind: ServiceAccount + name: svcwatcher + namespace: kube-system +roleRef: + kind: ClusterRole + name: caas:infra-psp + apiGroup: rbac.authorization.k8s.io