92 lines
1.6 KiB
YAML
92 lines
1.6 KiB
YAML
|
apiVersion: apiextensions.k8s.io/v1beta1
|
||
|
kind: CustomResourceDefinition
|
||
|
metadata:
|
||
|
name: ingressroutes.traefik.containo.us
|
||
|
|
||
|
spec:
|
||
|
group: traefik.containo.us
|
||
|
version: v1alpha1
|
||
|
names:
|
||
|
kind: IngressRoute
|
||
|
plural: ingressroutes
|
||
|
singular: ingressroute
|
||
|
scope: Namespaced
|
||
|
|
||
|
---
|
||
|
apiVersion: apiextensions.k8s.io/v1beta1
|
||
|
kind: CustomResourceDefinition
|
||
|
metadata:
|
||
|
name: middlewares.traefik.containo.us
|
||
|
|
||
|
spec:
|
||
|
group: traefik.containo.us
|
||
|
version: v1alpha1
|
||
|
names:
|
||
|
kind: Middleware
|
||
|
plural: middlewares
|
||
|
singular: middleware
|
||
|
scope: Namespaced
|
||
|
|
||
|
---
|
||
|
kind: ClusterRole
|
||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||
|
metadata:
|
||
|
name: traefik-ingress-controller
|
||
|
|
||
|
rules:
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- services
|
||
|
- endpoints
|
||
|
- secrets
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
- apiGroups:
|
||
|
- extensions
|
||
|
resources:
|
||
|
- ingresses
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
- apiGroups:
|
||
|
- extensions
|
||
|
resources:
|
||
|
- ingresses/status
|
||
|
verbs:
|
||
|
- update
|
||
|
- apiGroups:
|
||
|
- traefik.containo.us
|
||
|
resources:
|
||
|
- middlewares
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
- apiGroups:
|
||
|
- traefik.containo.us
|
||
|
resources:
|
||
|
- ingressroutes
|
||
|
verbs:
|
||
|
- get
|
||
|
- list
|
||
|
- watch
|
||
|
|
||
|
---
|
||
|
kind: ClusterRoleBinding
|
||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||
|
metadata:
|
||
|
name: traefik-ingress-controller
|
||
|
|
||
|
roleRef:
|
||
|
apiGroup: rbac.authorization.k8s.io
|
||
|
kind: ClusterRole
|
||
|
name: traefik-ingress-controller
|
||
|
subjects:
|
||
|
- kind: ServiceAccount
|
||
|
name: traefik-ingress-controller
|
||
|
namespace: default
|