Skip to content

Instantly share code, notes, and snippets.

@mimizone
Created August 8, 2018 21:48
Show Gist options
  • Save mimizone/30f608534cf02ccc26520b697b18f3c3 to your computer and use it in GitHub Desktop.
Save mimizone/30f608534cf02ccc26520b697b18f3c3 to your computer and use it in GitHub Desktop.
setup Gitlab runner namespace, service account and token for kubernetes
apiVersion: v1
kind: Namespace
metadata:
name: gitlab-managed-apps
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: gitlab-sa
namespace: gitlab-managed-apps
---
kind: Role
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: gitlab-role
namespace: gitlab-managed-apps
rules:
- apiGroups:
- ""
- extensions
resources:
- '*'
verbs:
- '*'
---
kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: gitlab-rb
namespace: gitlab-managed-apps
subjects:
- kind: ServiceAccount
name: gitlab-sa
namespace: gitlab-managed-apps
roleRef:
kind: Role
name: gitlab-role
apiGroup: rbac.authorization.k8s.io
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: gitlab-cluster
namespace: gitlab-managed-apps
subjects:
- kind: ServiceAccount
name: default
namespace: gitlab-managed-apps
roleRef:
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io
---
apiVersion: v1
kind: Secret
metadata:
name: gitlab-secret
namespace: gitlab-managed-apps
annotations:
kubernetes.io/service-account.name: gitlab-sa
type: kubernetes.io/service-account-token
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment