k3s/examples/podsecuritypolicy/rbac/bindings.yaml

51 lines
1.3 KiB
YAML
Raw Normal View History

# privileged-psp-users gives the privileged-psp-user role
# to the group privileged-psp-users.
2017-08-21 09:29:10 +00:00
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: privileged-psp-users
subjects:
- kind: Group
2017-02-14 05:50:31 +00:00
apiGroup: rbac.authorization.k8s.io
name: privileged-psp-users
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: privileged-psp-user
---
# restricted-psp-users grants the restricted-psp-user role to
# the groups restricted-psp-users and privileged-psp-users.
2017-08-21 09:29:10 +00:00
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: restricted-psp-users
subjects:
- kind: Group
2017-02-14 05:50:31 +00:00
apiGroup: rbac.authorization.k8s.io
name: restricted-psp-users
- kind: Group
2017-02-14 05:50:31 +00:00
apiGroup: rbac.authorization.k8s.io
name: privileged-psp-users
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: restricted-psp-user
---
2017-07-13 08:58:36 +00:00
# edit grants edit role to the groups
# restricted-psp-users and privileged-psp-users.
2017-08-21 09:29:10 +00:00
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: edit
subjects:
- kind: Group
2017-02-14 05:50:31 +00:00
apiGroup: rbac.authorization.k8s.io
name: privileged-psp-users
- kind: Group
2017-02-14 05:50:31 +00:00
apiGroup: rbac.authorization.k8s.io
name: restricted-psp-users
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: edit