summaryrefslogtreecommitdiffstats
path: root/kubernetes/common/serviceAccount/templates/role-binding.yaml
diff options
context:
space:
mode:
authorSylvain Desbureaux <sylvain.desbureaux@orange.com>2020-05-19 17:46:54 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2020-06-26 15:24:04 +0000
commit4534881264e8a125c7eed68992fe4ef32b204caf (patch)
treee54eb051150058e4d2bc3dc62b0aac7dc702cef4 /kubernetes/common/serviceAccount/templates/role-binding.yaml
parentd610a48073273ba043d54647b73b4754a7b8441e (diff)
[COMMON] Templates for services accounts and roles
Create a common chart that will create the relevant service accounts / roles and role binding for ONAP components. Issue-ID: OOM-1971 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: I687ef6debe679b5f7f250d75d93ee4da84d97104
Diffstat (limited to 'kubernetes/common/serviceAccount/templates/role-binding.yaml')
-rw-r--r--kubernetes/common/serviceAccount/templates/role-binding.yaml33
1 files changed, 33 insertions, 0 deletions
diff --git a/kubernetes/common/serviceAccount/templates/role-binding.yaml b/kubernetes/common/serviceAccount/templates/role-binding.yaml
new file mode 100644
index 0000000000..2082f8466b
--- /dev/null
+++ b/kubernetes/common/serviceAccount/templates/role-binding.yaml
@@ -0,0 +1,33 @@
+{{/*
+# Copyright © 2020 Orange
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+*/}}
+
+{{- $dot := . -}}
+{{- range $role_type := $dot.Values.roles }}
+---
+apiVersion: rbac.authorization.k8s.io/v1
+# This cluster role binding allows anyone in the "manager" group to read secrets in any namespace.
+kind: RoleBinding
+metadata:
+ name: {{ include "common.fullname" (dict "suffix" $role_type "dot" $dot )}}
+ namespace: {{ include "common.namespace" $dot }}
+subjects:
+- kind: ServiceAccount
+ name: {{ include "common.fullname" (dict "suffix" $role_type "dot" $dot )}}
+roleRef:
+ kind: Role
+ name: {{ include "common.fullname" (dict "suffix" $role_type "dot" $dot )}}
+ apiGroup: rbac.authorization.k8s.io
+{{- end }}