housekeeping

This commit is contained in:
2020-03-16 11:14:14 +01:00
parent 1f3a134e52
commit 40c6faf21c
41 changed files with 496 additions and 1006 deletions

Binary file not shown.

View File

@@ -0,0 +1,13 @@
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: allow-creation-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: allow-creation
subjects:
- kind: ServiceAccount
name: service-acc
namespace: default

View File

@@ -0,0 +1,43 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: allow-creation
rules:
- apiGroups:
- ""
- "apps"
- "deploy"
- "rbac.authorization.k8s.io"
- "networking.k8s.io"
- "extensions"
- "tekton.dev"
# deze zullen we ook moeten aanpassen elke pipeline die we maken, maar, deze pipelines zijn nu specifiek per branch, dus dit zou geen probleem leveren.
resources:
- pods
- serviceaccounts
- namespaces
- services
- deployments
- deployments.apps
- clusterroles
- roles
- clusterrolebindings
- rolebindings
- ingresses
- eventlisteners
- triggerbindings
- triggertemplates
- configmaps
- secrets
- pipelineruns
- pipelineresources
- taskruns
verbs:
- list
- watch
- get
- create
- update
- patch
- delete

View File

@@ -0,0 +1,7 @@
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: service-acc
secrets:
- name: regcred #docker registry credentials