the last yml to yaml
This commit is contained in:
@@ -1,89 +0,0 @@
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: kubernetes-admins
|
||||
subjects:
|
||||
- kind: Group
|
||||
name: "k-space:kubernetes:admins"
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
roleRef:
|
||||
kind: ClusterRole
|
||||
name: cluster-admin
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
---
|
||||
# AD/Samba group "Developers" members have view access for everything
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: kubernetes-developers
|
||||
subjects:
|
||||
- kind: Group
|
||||
name: Developers
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
roleRef:
|
||||
kind: ClusterRole
|
||||
name: view
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: developers
|
||||
namespace: camtiler
|
||||
subjects:
|
||||
- kind: Group
|
||||
name: Developers
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
roleRef:
|
||||
kind: ClusterRole
|
||||
name: developers
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: developers
|
||||
namespace: members-site
|
||||
subjects:
|
||||
- kind: Group
|
||||
name: Developers
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
roleRef:
|
||||
kind: ClusterRole
|
||||
name: developers
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: developers
|
||||
rules:
|
||||
- verbs:
|
||||
- create
|
||||
- delete
|
||||
- patch
|
||||
- update
|
||||
apiGroups:
|
||||
- ''
|
||||
resources:
|
||||
- configmaps
|
||||
- pods/attach
|
||||
- pods/exec
|
||||
- pods/portforward
|
||||
- pods/proxy
|
||||
- verbs:
|
||||
- patch
|
||||
apiGroups:
|
||||
- apps
|
||||
resources:
|
||||
- deployments
|
||||
- statefulsets
|
||||
- deployments/scale
|
||||
- statefulsets/scale
|
||||
- verbs:
|
||||
- delete
|
||||
apiGroups:
|
||||
- ''
|
||||
resources:
|
||||
- pods
|
||||
@@ -14,6 +14,6 @@ helmCharts:
|
||||
|
||||
resources:
|
||||
- ssh://git@git.k-space.ee/secretspace/kube/frigate # secrets (.env): go2rtc-config, frigate-mqtt-secret, frigate-rtsp-secret
|
||||
- ./auth.yml
|
||||
- ./rabbitmq.yml
|
||||
- ./transcode.yml
|
||||
- ./auth.yaml
|
||||
- ./rabbitmq.yaml
|
||||
- ./transcode.yaml
|
||||
|
||||
@@ -67,4 +67,4 @@ helmCharts:
|
||||
|
||||
resources:
|
||||
- ./passmower.yaml
|
||||
- ./mariadb.yml
|
||||
- ./mariadb.yaml
|
||||
|
||||
@@ -13,5 +13,5 @@ helmCharts:
|
||||
version: 1.17.1
|
||||
|
||||
resources:
|
||||
- ./application-extras.yml
|
||||
- ./application-extras.yaml
|
||||
- ssh://git@git.k-space.ee/secretspace/kube/harbor
|
||||
|
||||
@@ -19,3 +19,16 @@ spec:
|
||||
- openid
|
||||
- profile
|
||||
tokenEndpointAuthMethod: none
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: kubernetes-admins
|
||||
subjects:
|
||||
- kind: Group
|
||||
name: "k-space:kubernetes:admins"
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
roleRef:
|
||||
kind: ClusterRole
|
||||
name: cluster-admin
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -66,5 +66,5 @@ helmCharts:
|
||||
version: v36.2.0 # helm search repo traefik/traefik --versions
|
||||
|
||||
resources:
|
||||
- ./application-extras.yml
|
||||
- ./networkpolicy-base.yml #TODO: should be ../shared/networkpolicy-base.yml
|
||||
- ./application-extras.yaml
|
||||
- ./networkpolicy-base.yaml #TODO: should be ../shared/networkpolicy-base.yml
|
||||
|
||||
@@ -54,4 +54,4 @@ helmCharts:
|
||||
# secrets (.env): woodpecker-gitea-oauth2, woodpecker-db
|
||||
resources:
|
||||
- ssh://git@git.k-space.ee/secretspace/kube/woodpecker
|
||||
- ./mariadb.yml
|
||||
- ./mariadb.yaml
|
||||
|
||||
Reference in New Issue
Block a user