the last yml to yaml
This commit is contained in:
@@ -1,89 +0,0 @@
|
|||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
|
||||||
name: kubernetes-admins
|
|
||||||
subjects:
|
|
||||||
- kind: Group
|
|
||||||
name: "k-space:kubernetes:admins"
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
roleRef:
|
|
||||||
kind: ClusterRole
|
|
||||||
name: cluster-admin
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
---
|
|
||||||
# AD/Samba group "Developers" members have view access for everything
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
|
||||||
name: kubernetes-developers
|
|
||||||
subjects:
|
|
||||||
- kind: Group
|
|
||||||
name: Developers
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
roleRef:
|
|
||||||
kind: ClusterRole
|
|
||||||
name: view
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: RoleBinding
|
|
||||||
metadata:
|
|
||||||
name: developers
|
|
||||||
namespace: camtiler
|
|
||||||
subjects:
|
|
||||||
- kind: Group
|
|
||||||
name: Developers
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
roleRef:
|
|
||||||
kind: ClusterRole
|
|
||||||
name: developers
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: RoleBinding
|
|
||||||
metadata:
|
|
||||||
name: developers
|
|
||||||
namespace: members-site
|
|
||||||
subjects:
|
|
||||||
- kind: Group
|
|
||||||
name: Developers
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
roleRef:
|
|
||||||
kind: ClusterRole
|
|
||||||
name: developers
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
|
||||||
name: developers
|
|
||||||
rules:
|
|
||||||
- verbs:
|
|
||||||
- create
|
|
||||||
- delete
|
|
||||||
- patch
|
|
||||||
- update
|
|
||||||
apiGroups:
|
|
||||||
- ''
|
|
||||||
resources:
|
|
||||||
- configmaps
|
|
||||||
- pods/attach
|
|
||||||
- pods/exec
|
|
||||||
- pods/portforward
|
|
||||||
- pods/proxy
|
|
||||||
- verbs:
|
|
||||||
- patch
|
|
||||||
apiGroups:
|
|
||||||
- apps
|
|
||||||
resources:
|
|
||||||
- deployments
|
|
||||||
- statefulsets
|
|
||||||
- deployments/scale
|
|
||||||
- statefulsets/scale
|
|
||||||
- verbs:
|
|
||||||
- delete
|
|
||||||
apiGroups:
|
|
||||||
- ''
|
|
||||||
resources:
|
|
||||||
- pods
|
|
||||||
@@ -14,6 +14,6 @@ helmCharts:
|
|||||||
|
|
||||||
resources:
|
resources:
|
||||||
- ssh://git@git.k-space.ee/secretspace/kube/frigate # secrets (.env): go2rtc-config, frigate-mqtt-secret, frigate-rtsp-secret
|
- ssh://git@git.k-space.ee/secretspace/kube/frigate # secrets (.env): go2rtc-config, frigate-mqtt-secret, frigate-rtsp-secret
|
||||||
- ./auth.yml
|
- ./auth.yaml
|
||||||
- ./rabbitmq.yml
|
- ./rabbitmq.yaml
|
||||||
- ./transcode.yml
|
- ./transcode.yaml
|
||||||
|
|||||||
@@ -67,4 +67,4 @@ helmCharts:
|
|||||||
|
|
||||||
resources:
|
resources:
|
||||||
- ./passmower.yaml
|
- ./passmower.yaml
|
||||||
- ./mariadb.yml
|
- ./mariadb.yaml
|
||||||
|
|||||||
@@ -13,5 +13,5 @@ helmCharts:
|
|||||||
version: 1.17.1
|
version: 1.17.1
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
- ./application-extras.yml
|
- ./application-extras.yaml
|
||||||
- ssh://git@git.k-space.ee/secretspace/kube/harbor
|
- ssh://git@git.k-space.ee/secretspace/kube/harbor
|
||||||
|
|||||||
@@ -19,3 +19,16 @@ spec:
|
|||||||
- openid
|
- openid
|
||||||
- profile
|
- profile
|
||||||
tokenEndpointAuthMethod: none
|
tokenEndpointAuthMethod: none
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: kubernetes-admins
|
||||||
|
subjects:
|
||||||
|
- kind: Group
|
||||||
|
name: "k-space:kubernetes:admins"
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
roleRef:
|
||||||
|
kind: ClusterRole
|
||||||
|
name: cluster-admin
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
|||||||
@@ -66,5 +66,5 @@ helmCharts:
|
|||||||
version: v36.2.0 # helm search repo traefik/traefik --versions
|
version: v36.2.0 # helm search repo traefik/traefik --versions
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
- ./application-extras.yml
|
- ./application-extras.yaml
|
||||||
- ./networkpolicy-base.yml #TODO: should be ../shared/networkpolicy-base.yml
|
- ./networkpolicy-base.yaml #TODO: should be ../shared/networkpolicy-base.yml
|
||||||
|
|||||||
@@ -54,4 +54,4 @@ helmCharts:
|
|||||||
# secrets (.env): woodpecker-gitea-oauth2, woodpecker-db
|
# secrets (.env): woodpecker-gitea-oauth2, woodpecker-db
|
||||||
resources:
|
resources:
|
||||||
- ssh://git@git.k-space.ee/secretspace/kube/woodpecker
|
- ssh://git@git.k-space.ee/secretspace/kube/woodpecker
|
||||||
- ./mariadb.yml
|
- ./mariadb.yaml
|
||||||
|
|||||||
Reference in New Issue
Block a user