apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: namespace: goghvideo-cicd-pipeline name: tekton-pipeline-role rules: - apiGroups: ["triggers.tekton.dev"] resources: ["triggertemplates", "interceptors", "triggerbindings", "eventlisteners", "triggers"] verbs: ["list","get", "create", "update", "delete", "watch"] - apiGroups: ["tekton.dev"] resources: ["pipelineruns"] verbs: ["list","get", "create", "update", "delete", "watch"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: # Name the role appropriately # Adjust the name and namespace as needed name: tekton-pipeline-role namespace: tekton-pipelines rules: - apiGroups: - triggers.tekton.dev resources: [ "triggerbindings", "eventlisteners", "clustertriggerbindings", "interceptors", "triggers", "triggertemplates", "clusterinterceptors"] verbs: ["list", "get", "create", "update", "delete", "watch"] - apiGroups: - tekton.dev resources: ["pipelineruns"] verbs: ["list", "get", "create", "update", "delete", "watch"] - apiGroups: ["project.openshift.io"] resources: ["*"] verbs: ["*"] - apiGroups: ["*"] resources: ["namespaces"] verbs: ["*"] - apiGroups: ["keda.sh"] resources: ["scaledjobs","triggerauthentications"] verbs: ["*"] # Add any other resources you need access to (modify the apiGroups/resources as required)