k8s/flink-operator/resources/service-accounts.yaml (276 lines of code) (raw):

# CRD creator service account apiVersion: v1 kind: ServiceAccount metadata: name: $CRD_SERVICE_ACCOUNT --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: $CRD_SERVICE_ACCOUNT-role rules: - apiGroups: - apiextensions.k8s.io resources: - customresourcedefinitions verbs: - get - list - create - apiGroups: - admissionregistration.k8s.io resources: - validatingwebhookconfigurations verbs: - '*' - apiGroups: - admissionregistration.k8s.io resources: - mutatingwebhookconfigurations verbs: - '*' --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: $CRD_SERVICE_ACCOUNT-rb roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: $CRD_SERVICE_ACCOUNT-role subjects: - kind: ServiceAccount name: $CRD_SERVICE_ACCOUNT namespace: $NAMESPACE --- # Service account for operator apiVersion: v1 kind: ServiceAccount metadata: name: $SERVICE_ACCOUNT --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: flink-operator-leader-election-role namespace: $NAMESPACE rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - configmaps/status verbs: - get - update - patch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: creationTimestamp: null name: flink-operator-manager-role rules: - apiGroups: - flinkoperator.k8s.io resources: - flinkclusters verbs: - get - list - watch - create - update - patch - delete - apiGroups: - flinkoperator.k8s.io resources: - flinkclusters/status verbs: - get - update - patch - apiGroups: - apps resources: - deployments verbs: - get - list - watch - create - update - patch - delete - apiGroups: - apps resources: - deployments/status verbs: - get - apiGroups: - "" resources: - pods verbs: - get - list - watch - apiGroups: - "" resources: - pods/status verbs: - get - apiGroups: - "" resources: - services verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - services/status verbs: - get - apiGroups: - "" resources: - events verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events/status verbs: - get - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - batch resources: - jobs verbs: - get - list - watch - create - update - patch - delete - apiGroups: - batch resources: - jobs/status verbs: - get - apiGroups: - extensions resources: - ingresses verbs: - get - list - watch - create - update - patch - delete - apiGroups: - extensions resources: - ingresses/status verbs: - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: flink-operator-proxy-role rules: - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: flink-operator-leader-election-rolebinding namespace: $NAMESPACE roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: flink-operator-leader-election-role subjects: - kind: ServiceAccount name: $SERVICE_ACCOUNT namespace: $NAMESPACE --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: flink-operator-manager-rolebinding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: flink-operator-manager-role subjects: - kind: ServiceAccount name: $SERVICE_ACCOUNT namespace: $NAMESPACE --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: flink-operator-proxy-rolebinding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: flink-operator-proxy-role subjects: - kind: ServiceAccount name: $SERVICE_ACCOUNT namespace: $NAMESPACE