vcluster-poc/control-api/rbac-test.yaml

48 lines
1.2 KiB
YAML

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: d9050409-b5a2-4058-815e-b5dbead893ed-owner
rules:
- apiGroups: ["appuio.io"]
resources: ["users"]
resourceNames: ["d9050409-b5a2-4058-815e-b5dbead893ed"]
verbs: ["get", "update", "patch", "delete"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: d9050409-b5a2-4058-815e-b5dbead893ed-owner
subjects:
- kind: User
name: appuio#d9050409-b5a2-4058-815e-b5dbead893ed
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: d9050409-b5a2-4058-815e-b5dbead893ed-owner
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: acme-corp-members-viewer
rules:
- apiGroups: ["appuio.io"]
resources: ["users"]
resourceNames:
- d9050409-b5a2-4058-815e-b5dbead893ed
- bec0d928-2ae2-4cec-94a0-5f72f12b8b39
verbs: ["get", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: acme-corp-members
subjects:
- kind: Group
name: developer
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: acme-corp-members-viewer
apiGroup: rbac.authorization.k8s.io