1.serviceAccount.yaml 698 B

123456789101112131415161718192021222324252627282930313233343536373839
  1. ---
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. kind: ClusterRole
  4. metadata:
  5. name: jenkins-admin
  6. rules:
  7. - apiGroups: [""]
  8. resources: ["*"]
  9. verbs: ["*"]
  10. ---
  11. apiVersion: v1
  12. kind: ServiceAccount
  13. metadata:
  14. name: jenkins-admin
  15. namespace: default
  16. ---
  17. apiVersion: rbac.authorization.k8s.io/v1
  18. kind: ClusterRoleBinding
  19. metadata:
  20. name: jenkins-admin
  21. roleRef:
  22. apiGroup: rbac.authorization.k8s.io
  23. kind: ClusterRole
  24. name: jenkins-admin
  25. subjects:
  26. - kind: ServiceAccount
  27. name: jenkins-admin
  28. namespace: default
  29. ---
  30. apiVersion: v1
  31. kind: Secret
  32. metadata:
  33. name: jenkins-admin
  34. annotations:
  35. kubernetes.io/service-account.name: jenkins-admin
  36. type: kubernetes.io/service-account-token