diff --git a/cmd/openshift/operator/kodata/tekton-addon/addons/06-results/cluster-role.yaml b/cmd/openshift/operator/kodata/tekton-addon/addons/06-results/cluster-role.yaml new file mode 100644 index 0000000000..90f86915f4 --- /dev/null +++ b/cmd/openshift/operator/kodata/tekton-addon/addons/06-results/cluster-role.yaml @@ -0,0 +1,23 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + rbac.authorization.k8s.io/aggregate-to-view: "true" + name: tekton-result-route-view +rules: +- apiGroups: + - route.openshift.io + resources: + - routes + verbs: + - get + resourceNames: + - tekton-results-api-service +- apiGroups: + - "" + resources: + - services + verbs: + - get + resourceNames: + - tekton-results-api-service diff --git a/cmd/openshift/operator/kodata/tekton-addon/addons/06-results/cluster-rolebinding.yaml b/cmd/openshift/operator/kodata/tekton-addon/addons/06-results/cluster-rolebinding.yaml new file mode 100644 index 0000000000..36e2c337b1 --- /dev/null +++ b/cmd/openshift/operator/kodata/tekton-addon/addons/06-results/cluster-rolebinding.yaml @@ -0,0 +1,12 @@ +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: tekton-result-route-view-auth +roleRef: + kind: ClusterRole + name: tekton-result-route-view + apiGroup: rbac.authorization.k8s.io +subjects: +- apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:authenticated