# services/comms/mas-db-ensure-rbac.yaml apiVersion: v1 kind: ServiceAccount metadata: name: mas-db-ensure namespace: comms --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: mas-db-ensure-postgres namespace: postgres rules: - apiGroups: [""] resources: ["secrets"] resourceNames: ["postgres-auth"] verbs: ["get"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: mas-db-ensure-postgres namespace: postgres subjects: - kind: ServiceAccount name: mas-db-ensure namespace: comms roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: mas-db-ensure-postgres --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: mas-db-ensure-comms namespace: comms rules: - apiGroups: [""] resources: ["secrets"] resourceNames: ["mas-db"] verbs: ["get", "create", "patch", "update"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: mas-db-ensure-comms namespace: comms subjects: - kind: ServiceAccount name: mas-db-ensure namespace: comms roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: mas-db-ensure-comms