hierarchical-format/config/namespaces/team-1/rolebinding-secret-reader.yaml (13 lines of code) (raw):

# Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # [START anthosconfig_hierarchical_format_config_namespaces_team_1_role_binding_secret_reader] apiVersion: rbac.authorization.k8s.io/v1 # This role binding allows "jane" to read pods in the "default" namespace. # You need to already have a Role named "pod-reader" in that namespace. kind: RoleBinding metadata: name: secret-reader namespace: team-1 subjects: # You can specify more than one "subject" - kind: ServiceAccount name: sa namespace: team-1 roleRef: kind: ClusterRole name: secret-reader apiGroup: rbac.authorization.k8s.io # [END anthosconfig_hierarchical_format_config_namespaces_team_1_role_binding_secret_reader]