github.com/pachyderm/pachyderm@v1.13.4/examples/traefik-ingress/roles.yaml (about)

     1  ---
     2  kind: ClusterRole
     3  apiVersion: rbac.authorization.k8s.io/v1beta1
     4  metadata:
     5    name: traefik-ingress-controller
     6  rules:
     7    - apiGroups:
     8        - ""
     9      resources:
    10        - services
    11        - endpoints
    12        - secrets
    13      verbs:
    14        - get
    15        - list
    16        - watch
    17    - apiGroups:
    18        - extensions
    19      resources:
    20        - ingresses
    21      verbs:
    22        - get
    23        - list
    24        - watch
    25    - apiGroups:
    26      - extensions
    27      resources:
    28      - ingresses/status
    29      verbs:
    30      - update
    31  ---
    32  kind: ClusterRoleBinding
    33  apiVersion: rbac.authorization.k8s.io/v1beta1
    34  metadata:
    35    name: traefik-ingress-controller
    36  roleRef:
    37    apiGroup: rbac.authorization.k8s.io
    38    kind: ClusterRole
    39    name: traefik-ingress-controller
    40  subjects:
    41  - kind: ServiceAccount
    42    name: traefik-ingress-controller
    43    namespace: kube-system