apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: tekton-pipelineloop-controller-cluster-access labels: app.kubernetes.io/component: controller app.kubernetes.io/instance: default app.kubernetes.io/part-of: tekton-pipeline-loops subjects: - kind: ServiceAccount name: tekton-pipelineloop-controller namespace: tekton-pipelines roleRef: kind: ClusterRole name: tekton-pipelineloop-controller-cluster-access apiGroup: rbac.authorization.k8s.io --- # If this ClusterRoleBinding is replaced with a RoleBinding # then the ClusterRole would be namespaced. The access described by # the tekton-pipelineloop-controller-tenant-access ClusterRole would # be scoped to individual tenant namespaces. apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: tekton-pipelineloop-controller-tenant-access labels: app.kubernetes.io/component: controller app.kubernetes.io/instance: default app.kubernetes.io/part-of: tekton-pipeline-loops subjects: - kind: ServiceAccount name: tekton-pipelineloop-controller namespace: tekton-pipelines roleRef: kind: ClusterRole name: tekton-pipelineloop-controller-tenant-access apiGroup: rbac.authorization.k8s.io --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: tekton-pipelineloop-controller-leaderelection labels: app.kubernetes.io/component: controller app.kubernetes.io/instance: default app.kubernetes.io/part-of: tekton-pipeline-loops subjects: - kind: ServiceAccount name: tekton-pipelineloop-controller namespace: tekton-pipelines roleRef: kind: ClusterRole name: tekton-pipelineloop-leader-election apiGroup: rbac.authorization.k8s.io --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: tekton-pipelineloop-webhook-cluster-access labels: app.kubernetes.io/component: webhook app.kubernetes.io/instance: default app.kubernetes.io/part-of: tekton-pipeline-loops subjects: - kind: ServiceAccount name: tekton-pipelineloop-webhook namespace: tekton-pipelines roleRef: kind: ClusterRole name: tekton-pipelineloop-webhook-cluster-access apiGroup: rbac.authorization.k8s.io --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: tekton-pipelineloop-webhook-leaderelection labels: app.kubernetes.io/component: webhook app.kubernetes.io/instance: default app.kubernetes.io/part-of: tekton-pipeline-loops subjects: - kind: ServiceAccount name: tekton-pipelineloop-webhook namespace: tekton-pipelines roleRef: kind: ClusterRole name: tekton-pipelineloop-leader-election apiGroup: rbac.authorization.k8s.io