Files @ b605b92e89b8
Branch filter:

Location: pomerium/kube/02-roles.yaml - annotation

drewp@bigasterisk.com
change provider to oidc to try to stop failed user directory syncs
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
6bf643829330
apiVersion: v1
kind: ServiceAccount
metadata:
  labels:
    app.kubernetes.io/name: pomerium
  name: pomerium-controller
  namespace: pomerium
---
apiVersion: v1
kind: ServiceAccount
metadata:
  labels:
    app.kubernetes.io/name: pomerium
  name: pomerium-gen-secrets
  namespace: pomerium
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  labels:
    app.kubernetes.io/name: pomerium
  name: pomerium-controller
rules:
- apiGroups:
  - ""
  resources:
  - services
  - endpoints
  - secrets
  verbs:
  - get
  - list
  - watch
- apiGroups:
  - ""
  resources:
  - services/status
  - secrets/status
  - endpoints/status
  verbs:
  - get
- apiGroups:
  - networking.k8s.io
  resources:
  - ingresses
  - ingressclasses
  verbs:
  - get
  - list
  - watch
- apiGroups:
  - networking.k8s.io
  resources:
  - ingresses/status
  verbs:
  - get
  - patch
  - update
- apiGroups:
  - ingress.pomerium.io
  resources:
  - pomerium
  verbs:
  - get
  - list
  - watch
- apiGroups:
  - ingress.pomerium.io
  resources:
  - pomerium/status
  verbs:
  - get
  - update
  - patch
- apiGroups:
  - ""
  resources:
  - events
  verbs:
  - create
  - patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  labels:
    app.kubernetes.io/name: pomerium
  name: pomerium-gen-secrets
rules:
- apiGroups:
  - ""
  resources:
  - secrets
  verbs:
  - create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  labels:
    app.kubernetes.io/name: pomerium
  name: pomerium-controller
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: pomerium-controller
subjects:
- kind: ServiceAccount
  name: pomerium-controller
  namespace: pomerium
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  labels:
    app.kubernetes.io/name: pomerium
  name: pomerium-gen-secrets
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: pomerium-gen-secrets
subjects:
- kind: ServiceAccount
  name: pomerium-gen-secrets
  namespace: pomerium