titan-iac/services/jenkins/serviceaccount.yaml

42 lines
779 B
YAML
Raw Normal View History

# services/jenkins/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: jenkins
namespace: jenkins
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: jenkins-agent
namespace: jenkins
rules:
- apiGroups: [""]
resources:
- pods
- pods/exec
- pods/log
- pods/portforward
- services
- endpoints
- persistentvolumeclaims
- configmaps
- secrets
verbs: ["get", "list", "watch", "create", "delete"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: jenkins-agent
namespace: jenkins
subjects:
- kind: ServiceAccount
name: jenkins
namespace: jenkins
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: jenkins-agent