Employee-manifest/base/rbac.yaml

104 lines
2.0 KiB
YAML

# Frontend Tier
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: frontend-sa
namespace: intern-workspace
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: frontend-role
namespace: intern-workspace
rules:
- apiGroups: [""]
resources: ["pods"]
verbs: ["get", "list"]
- apiGroups: [""]
resources: ["configmaps"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: frontend-rolebinding
namespace: intern-workspace
subjects:
- kind: ServiceAccount
name: frontend-sa
namespace: intern-workspace
roleRef:
kind: Role
name: frontend-role
apiGroup: rbac.authorization.k8s.io
# Backend Tier
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: backend-sa
namespace: intern-workspace
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: backend-role
namespace: intern-workspace
rules:
- apiGroups: [""]
resources: ["secrets", "configmaps"]
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["pods", "services"]
verbs: ["get", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: backend-rolebinding
namespace: intern-workspace
subjects:
- kind: ServiceAccount
name: backend-sa
namespace: intern-workspace
roleRef:
kind: Role
name: backend-role
apiGroup: rbac.authorization.k8s.io
# Database Tier
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: database-sa
namespace: intern-workspace
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: database-role
namespace: intern-workspace
rules:
- apiGroups: [""]
resources: ["pods"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: database-rolebinding
namespace: intern-workspace
subjects:
- kind: ServiceAccount
name: database-sa
namespace: intern-workspace
roleRef:
kind: Role
name: database-role
apiGroup: rbac.authorization.k8s.io