100 lines
1.5 KiB
YAML
100 lines
1.5 KiB
YAML
|
apiVersion: rbac.authorization.k8s.io/v1
|
||
|
kind: ClusterRole
|
||
|
metadata:
|
||
|
name: nginx-ingress
|
||
|
namespace: nginx-ingress
|
||
|
rules:
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- services
|
||
|
- endpoints
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- secrets
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- configmaps
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
- update
|
||
|
- create
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- pods
|
||
|
verbs:
|
||
|
- list
|
||
|
- watch
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- events
|
||
|
verbs:
|
||
|
- create
|
||
|
- patch
|
||
|
- list
|
||
|
- apiGroups:
|
||
|
- networking.k8s.io
|
||
|
resources:
|
||
|
- ingresses
|
||
|
verbs:
|
||
|
- list
|
||
|
- watch
|
||
|
- get
|
||
|
- apiGroups:
|
||
|
- networking.k8s.io
|
||
|
resources:
|
||
|
- ingresses/status
|
||
|
verbs:
|
||
|
- update
|
||
|
- apiGroups:
|
||
|
- k8s.nginx.org
|
||
|
resources:
|
||
|
- virtualservers
|
||
|
- virtualserverroutes
|
||
|
- globalconfigurations
|
||
|
- transportservers
|
||
|
- policies
|
||
|
verbs:
|
||
|
- list
|
||
|
- watch
|
||
|
- get
|
||
|
- apiGroups:
|
||
|
- k8s.nginx.org
|
||
|
resources:
|
||
|
- virtualservers/status
|
||
|
- virtualserverroutes/status
|
||
|
verbs:
|
||
|
- update
|
||
|
- apiGroups:
|
||
|
- networking.k8s.io
|
||
|
resources:
|
||
|
- ingressclasses
|
||
|
verbs:
|
||
|
- get
|
||
|
---
|
||
|
kind: ClusterRoleBinding
|
||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||
|
metadata:
|
||
|
name: nginx-ingress
|
||
|
subjects:
|
||
|
- kind: ServiceAccount
|
||
|
name: nginx-ingress
|
||
|
namespace: nginx-ingress
|
||
|
roleRef:
|
||
|
kind: ClusterRole
|
||
|
name: nginx-ingress
|
||
|
apiGroup: rbac.authorization.k8s.io
|