config/rbac/role_binding.yaml (37 lines of code) (raw):
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
app.kubernetes.io/name: clusterrolebinding
app.kubernetes.io/instance: controller-rolebinding
app.kubernetes.io/component: rbac
app.kubernetes.io/created-by: amazon-network-policy-controller-k8s
app.kubernetes.io/part-of: amazon-network-policy-controller-k8s
app.kubernetes.io/managed-by: kustomize
name: controller-k8s-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: controller-k8s
subjects:
- kind: ServiceAccount
name: controller-k8s
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
labels:
app.kubernetes.io/name: rolebinding
app.kubernetes.io/instance: configmap-rolebinding
app.kubernetes.io/component: rbac
app.kubernetes.io/created-by: amazon-network-policy-controller-k8s
app.kubernetes.io/part-of: amazon-network-policy-controller-k8s
app.kubernetes.io/managed-by: kustomize
name: controller-k8s-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: controller-k8s
subjects:
- kind: ServiceAccount
name: controller-k8s