# services/comms/mas-secrets-ensure-rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: mas-secrets-ensure rules: - apiGroups: [""] resources: ["secrets"] verbs: ["get", "create", "patch", "update"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: mas-secrets-ensure roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: mas-secrets-ensure subjects: - kind: ServiceAccount name: mas-secrets-ensure namespace: sso