Files
cicd/custom-rbac.yaml

41 lines
1.4 KiB
YAML

apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
namespace: goghvideo-cicd-pipeline
name: tekton-pipeline-role
rules:
- apiGroups: ["triggers.tekton.dev"]
resources: ["triggertemplates", "interceptors", "triggerbindings", "eventlisteners", "triggers"]
verbs: ["list","get", "create", "update", "delete", "watch"]
- apiGroups: ["tekton.dev"]
resources: ["pipelineruns"]
verbs: ["list","get", "create", "update", "delete", "watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
# Name the role appropriately
# Adjust the name and namespace as needed
name: tekton-pipeline-role
namespace: tekton-pipelines
rules:
- apiGroups:
- triggers.tekton.dev
resources: [ "triggerbindings", "eventlisteners", "clustertriggerbindings", "interceptors", "triggers", "triggertemplates", "clusterinterceptors"]
verbs: ["list", "get", "create", "update", "delete", "watch"]
- apiGroups:
- tekton.dev
resources: ["pipelineruns"]
verbs: ["list", "get", "create", "update", "delete", "watch"]
- apiGroups: ["project.openshift.io"]
resources: ["*"]
verbs: ["*"]
- apiGroups: ["*"]
resources: ["namespaces"]
verbs: ["*"]
- apiGroups: ["keda.sh"]
resources: ["scaledjobs","triggerauthentications"]
verbs: ["*"]
# Add any other resources you need access to (modify the apiGroups/resources as required)