fix: add dev namespace role for manager to manage dev pod deployment

This commit is contained in:
Ryan Moon
2026-04-05 09:28:39 -05:00
parent 25238ca677
commit a677d9c366

View File

@@ -63,6 +63,34 @@ roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
name: manager-argocd name: manager-argocd
--- ---
# Dev pod management
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: manager-dev
namespace: dev
rules:
- apiGroups: ["apps"]
resources: ["deployments"]
verbs: ["get", "list", "patch", "update"]
- apiGroups: [""]
resources: ["pods"]
verbs: ["get", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: manager-dev
namespace: dev
subjects:
- kind: ServiceAccount
name: manager
namespace: manager
roleRef:
kind: Role
apiGroup: rbac.authorization.k8s.io
name: manager-dev
---
# Cluster-wide: create/delete customer namespaces and manage secrets within them # Cluster-wide: create/delete customer namespaces and manage secrets within them
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole