...

Text file src/github.com/datawire/ambassador/v2/python/tests/integration/manifests/rbac_namespace_scope.yaml

Documentation: github.com/datawire/ambassador/v2/python/tests/integration/manifests

     1# GENERATED FILE: edits made by hand will not be preserved.
     2---
     3aggregationRule:
     4  clusterRoleSelectors:
     5  - matchLabels:
     6      rbac.getambassador.io/role-group: {self.path.k8s}
     7apiVersion: rbac.authorization.k8s.io/v1
     8kind: ClusterRole
     9metadata:
    10  labels:
    11    app.kubernetes.io/instance: kat-rbac-singlenamespace
    12    app.kubernetes.io/managed-by: kat
    13    app.kubernetes.io/name: emissary-ingress
    14    app.kubernetes.io/part-of: kat-rbac-singlenamespace
    15    product: aes
    16  name: {self.path.k8s}
    17rules: []
    18---
    19{serviceAccountExtra}
    20apiVersion: v1
    21kind: ServiceAccount
    22metadata:
    23  labels:
    24    app.kubernetes.io/instance: kat-rbac-singlenamespace
    25    app.kubernetes.io/managed-by: kat
    26    app.kubernetes.io/name: emissary-ingress
    27    app.kubernetes.io/part-of: kat-rbac-singlenamespace
    28    product: aes
    29  name: {self.path.k8s}
    30  namespace: {self.namespace}
    31---
    32apiVersion: rbac.authorization.k8s.io/v1
    33kind: ClusterRoleBinding
    34metadata:
    35  labels:
    36    app.kubernetes.io/instance: kat-rbac-singlenamespace
    37    app.kubernetes.io/managed-by: kat
    38    app.kubernetes.io/name: emissary-ingress
    39    app.kubernetes.io/part-of: kat-rbac-singlenamespace
    40    product: aes
    41  name: {self.path.k8s}
    42roleRef:
    43  apiGroup: rbac.authorization.k8s.io
    44  kind: ClusterRole
    45  name: {self.path.k8s}
    46subjects:
    47- kind: ServiceAccount
    48  name: {self.path.k8s}
    49  namespace: {self.namespace}
    50---
    51apiVersion: rbac.authorization.k8s.io/v1
    52kind: ClusterRole
    53metadata:
    54  labels:
    55    app.kubernetes.io/instance: kat-rbac-singlenamespace
    56    app.kubernetes.io/managed-by: kat
    57    app.kubernetes.io/name: emissary-ingress
    58    app.kubernetes.io/part-of: kat-rbac-singlenamespace
    59    product: aes
    60    rbac.getambassador.io/role-group: {self.path.k8s}
    61  name: {self.path.k8s}-crd
    62rules:
    63- apiGroups:
    64  - apiextensions.k8s.io
    65  resources:
    66  - customresourcedefinitions
    67  verbs:
    68  - get
    69  - list
    70  - watch
    71  - delete
    72---
    73apiVersion: rbac.authorization.k8s.io/v1
    74kind: Role
    75metadata:
    76  labels:
    77    app.kubernetes.io/instance: kat-rbac-singlenamespace
    78    app.kubernetes.io/managed-by: kat
    79    app.kubernetes.io/name: emissary-ingress
    80    app.kubernetes.io/part-of: kat-rbac-singlenamespace
    81    product: aes
    82    rbac.getambassador.io/role-group: {self.path.k8s}
    83  name: {self.path.k8s}
    84  namespace: {self.namespace}
    85rules:
    86- apiGroups:
    87  - ""
    88  resources:
    89  - namespaces
    90  - services
    91  - secrets
    92  - configmaps
    93  - endpoints
    94  verbs:
    95  - get
    96  - list
    97  - watch
    98- apiGroups:
    99  - getambassador.io
   100  resources:
   101  - '*'
   102  verbs:
   103  - get
   104  - list
   105  - watch
   106  - update
   107  - patch
   108  - create
   109  - delete
   110- apiGroups:
   111  - getambassador.io
   112  resources:
   113  - mappings/status
   114  verbs:
   115  - update
   116- apiGroups:
   117  - networking.internal.knative.dev
   118  resources:
   119  - clusteringresses
   120  - ingresses
   121  verbs:
   122  - get
   123  - list
   124  - watch
   125- apiGroups:
   126  - networking.x-k8s.io
   127  resources:
   128  - '*'
   129  verbs:
   130  - get
   131  - list
   132  - watch
   133- apiGroups:
   134  - networking.internal.knative.dev
   135  resources:
   136  - ingresses/status
   137  - clusteringresses/status
   138  verbs:
   139  - update
   140- apiGroups:
   141  - extensions
   142  - networking.k8s.io
   143  resources:
   144  - ingresses
   145  - ingressclasses
   146  verbs:
   147  - get
   148  - list
   149  - watch
   150- apiGroups:
   151  - extensions
   152  - networking.k8s.io
   153  resources:
   154  - ingresses/status
   155  verbs:
   156  - update
   157---
   158apiVersion: rbac.authorization.k8s.io/v1
   159kind: RoleBinding
   160metadata:
   161  labels:
   162    app.kubernetes.io/instance: kat-rbac-singlenamespace
   163    app.kubernetes.io/managed-by: kat
   164    app.kubernetes.io/name: emissary-ingress
   165    app.kubernetes.io/part-of: kat-rbac-singlenamespace
   166    product: aes
   167  name: {self.path.k8s}
   168  namespace: {self.namespace}
   169roleRef:
   170  apiGroup: rbac.authorization.k8s.io
   171  kind: Role
   172  name: {self.path.k8s}
   173subjects:
   174- kind: ServiceAccount
   175  name: {self.path.k8s}
   176  namespace: {self.namespace}

View as plain text