apiVersion: v1 kind: ServiceAccount metadata: name: tekton-triggers-sa namespace: tekton-pipelines --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: tekton-triggers-role namespace: tekton-pipelines rules: - apiGroups: ["triggers.tekton.dev"] resources: ["eventlisteners", "triggerbindings", "triggertemplates", "triggers", "interceptors"] verbs: ["get", "list", "watch"] - apiGroups: ["tekton.dev"] resources: ["pipelineruns", "pipelineresources"] verbs: ["create", "delete", "get", "list", "watch"] - apiGroups: [""] resources: ["configmaps", "secrets", "serviceaccounts"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["create", "delete", "get", "list", "watch"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: tekton-triggers-rolebinding namespace: tekton-pipelines subjects: - kind: ServiceAccount name: tekton-triggers-sa namespace: tekton-pipelines roleRef: kind: Role name: tekton-triggers-role apiGroup: rbac.authorization.k8s.io --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: tekton-triggers-clusterrole rules: - apiGroups: ["triggers.tekton.dev"] resources: ["clustertriggerbindings", "clusterinterceptors"] verbs: ["get", "list", "watch"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: tekton-triggers-clusterrolebinding subjects: - kind: ServiceAccount name: tekton-triggers-sa namespace: tekton-pipelines roleRef: kind: ClusterRole name: tekton-triggers-clusterrole apiGroup: rbac.authorization.k8s.io