titan-iac/services/maintenance/disable-k3s-traefik-rbac.yaml

40 lines
1.1 KiB
YAML

# services/maintenance/disable-k3s-traefik-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: disable-k3s-traefik
rules:
- apiGroups: ["k3s.cattle.io"]
resources: ["addons"]
verbs: ["get", "list", "watch", "delete"]
- apiGroups: ["helm.cattle.io"]
resources: ["helmcharts", "helmchartconfigs"]
verbs: ["get", "list", "watch", "delete"]
- apiGroups: ["batch"]
resources: ["jobs"]
verbs: ["get", "list", "watch", "delete"]
- apiGroups: [""]
resources: ["services", "serviceaccounts"]
verbs: ["get", "list", "watch", "delete"]
- apiGroups: ["apps"]
resources: ["deployments"]
verbs: ["get", "list", "watch", "delete"]
- apiGroups: ["rbac.authorization.k8s.io"]
resources: ["clusterroles", "clusterrolebindings"]
verbs: ["get", "list", "watch", "delete"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: disable-k3s-traefik
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: disable-k3s-traefik
subjects:
- kind: ServiceAccount
name: disable-k3s-traefik
namespace: maintenance