apps/replikate/kustomize/base/rbac.yaml (76 lines of code) (raw):

--- apiVersion: v1 kind: ServiceAccount metadata: name: app --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: app rules: - apiGroups: ["kubeflow.org"] resources: ["profiles", "poddefaults"] verbs: ["create", "get", "list", "update", "patch"] - apiGroups: [""] resources: ["namespaces", "limitranges", "secrets"] verbs: ["create", "get", "update", "patch", "list"] - apiGroups: [""] resources: - secrets - configmaps - configmaps/status - configmaps/logs - events - namespaces - namespaces/status - namespaces/logs verbs: ["*"] - apiGroups: ["networking.istio.io", "rbac.istio.io"] resources: ["gateways", "envoyfilters", "servicerolebindings"] verbs: ["*"] - apiGroups: ["rbac.authorization.k8s.io"] resources: ["roles", "rolebindings", "clusterroles", "clusterrolebindings"] verbs: ["*"] - apiGroups: - serving.kubeflow.org - serving.kserve.io - serving.knative.dev resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: app-default subjects: - kind: ServiceAccount name: app roleRef: kind: ClusterRole name: app apiGroup: rbac.authorization.k8s.io --- # Workaround for error: serviceacccount is attempting # to grant RBAC permissions not currently held apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: app-kserving-edit subjects: - kind: ServiceAccount name: app roleRef: kind: ClusterRole name: kserve-manager-role apiGroup: rbac.authorization.k8s.io --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: app-kubeflow-edit subjects: - kind: ServiceAccount name: app roleRef: kind: ClusterRole name: kubeflow-edit apiGroup: rbac.authorization.k8s.io # --- # apiVersion: rbac.authorization.k8s.io/v1 # kind: RoleBinding # metadata: # name: kubeflow-serving-editor # roleRef: # apiGroup: rbac.authorization.k8s.io # kind: ClusterRole # name: kubeflow-kserve-edit # subjects: # - kind: ServiceAccount # name: app # --- # apiVersion: rbac.authorization.k8s.io/v1 # kind: RoleBinding # metadata: # name: kserve-webapp-user # namespace: "{{name}}" # roleRef: # apiGroup: rbac.authorization.k8s.io # kind: ClusterRole # name: kfserving-models-web-app-cluster-role # subjects: # - kind: ServiceAccount # name: app