rbac.yaml 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. {{- if .Values.processClusterStore }}
  21. - "clustersecretstores"
  22. {{- end }}
  23. - "externalsecrets"
  24. {{- if .Values.processClusterExternalSecret }}
  25. - "clusterexternalsecrets"
  26. {{- end }}
  27. {{- if .Values.processPushSecret }}
  28. - "pushsecrets"
  29. {{- end }}
  30. {{- if .Values.processClusterPushSecret }}
  31. - "clusterpushsecrets"
  32. {{- end }}
  33. verbs:
  34. - "get"
  35. - "list"
  36. - "watch"
  37. - apiGroups:
  38. - "external-secrets.io"
  39. resources:
  40. - "externalsecrets"
  41. - "externalsecrets/status"
  42. {{- if .Values.openshiftFinalizers }}
  43. - "externalsecrets/finalizers"
  44. {{- end }}
  45. - "secretstores"
  46. - "secretstores/status"
  47. {{- if .Values.openshiftFinalizers }}
  48. - "secretstores/finalizers"
  49. {{- end }}
  50. {{- if .Values.processClusterStore }}
  51. - "clustersecretstores"
  52. - "clustersecretstores/status"
  53. {{- if .Values.openshiftFinalizers }}
  54. - "clustersecretstores/finalizers"
  55. {{- end }}
  56. {{- end }}
  57. {{- if .Values.processClusterExternalSecret }}
  58. - "clusterexternalsecrets"
  59. - "clusterexternalsecrets/status"
  60. {{- if .Values.openshiftFinalizers }}
  61. - "clusterexternalsecrets/finalizers"
  62. {{- end }}
  63. {{- end }}
  64. {{- if .Values.processPushSecret }}
  65. - "pushsecrets"
  66. - "pushsecrets/status"
  67. {{- if .Values.openshiftFinalizers }}
  68. - "pushsecrets/finalizers"
  69. {{- end }}
  70. {{- end }}
  71. {{- if .Values.processClusterPushSecret }}
  72. - "clusterpushsecrets"
  73. - "clusterpushsecrets/status"
  74. {{- if .Values.openshiftFinalizers }}
  75. - "clusterpushsecrets/finalizers"
  76. {{- end }}
  77. {{- end }}
  78. verbs:
  79. - "get"
  80. - "update"
  81. - "patch"
  82. - apiGroups:
  83. - "generators.external-secrets.io"
  84. resources:
  85. - "generatorstates"
  86. verbs:
  87. - "get"
  88. - "list"
  89. - "watch"
  90. - "create"
  91. - "update"
  92. - "patch"
  93. - "delete"
  94. - "deletecollection"
  95. - apiGroups:
  96. - "generators.external-secrets.io"
  97. resources:
  98. - "acraccesstokens"
  99. {{- if .Values.processClusterGenerator }}
  100. - "clustergenerators"
  101. {{- end }}
  102. - "ecrauthorizationtokens"
  103. - "fakes"
  104. - "gcraccesstokens"
  105. - "githubaccesstokens"
  106. - "quayaccesstokens"
  107. - "passwords"
  108. - "sshkeys"
  109. - "stssessiontokens"
  110. - "uuids"
  111. - "vaultdynamicsecrets"
  112. - "webhooks"
  113. - "grafanas"
  114. - "mfas"
  115. verbs:
  116. - "get"
  117. - "list"
  118. - "watch"
  119. - apiGroups:
  120. - ""
  121. resources:
  122. - "serviceaccounts"
  123. - "namespaces"
  124. verbs:
  125. - "get"
  126. - "list"
  127. - "watch"
  128. - apiGroups:
  129. - ""
  130. resources:
  131. - "configmaps"
  132. verbs:
  133. - "get"
  134. - "list"
  135. - "watch"
  136. - apiGroups:
  137. - ""
  138. resources:
  139. - "secrets"
  140. verbs:
  141. - "get"
  142. - "list"
  143. - "watch"
  144. - "create"
  145. - "update"
  146. - "delete"
  147. - "patch"
  148. - apiGroups:
  149. - ""
  150. resources:
  151. - "serviceaccounts/token"
  152. verbs:
  153. - "create"
  154. - apiGroups:
  155. - ""
  156. resources:
  157. - "events"
  158. verbs:
  159. - "create"
  160. - "patch"
  161. - apiGroups:
  162. - "external-secrets.io"
  163. resources:
  164. - "externalsecrets"
  165. verbs:
  166. - "create"
  167. - "update"
  168. - "delete"
  169. {{- if .Values.processPushSecret }}
  170. - apiGroups:
  171. - "external-secrets.io"
  172. resources:
  173. - "pushsecrets"
  174. verbs:
  175. - "create"
  176. - "update"
  177. - "delete"
  178. {{- end }}
  179. ---
  180. apiVersion: rbac.authorization.k8s.io/v1
  181. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  182. kind: Role
  183. {{- else }}
  184. kind: ClusterRole
  185. {{- end }}
  186. metadata:
  187. name: {{ include "external-secrets.fullname" . }}-view
  188. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  189. namespace: {{ .Values.scopedNamespace | quote }}
  190. {{- end }}
  191. labels:
  192. {{- include "external-secrets.labels" . | nindent 4 }}
  193. {{- if .Values.rbac.aggregateToView }}
  194. rbac.authorization.k8s.io/aggregate-to-view: "true"
  195. {{- end }}
  196. {{- if .Values.rbac.aggregateToEdit }}
  197. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  198. {{- end }}
  199. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  200. rules:
  201. - apiGroups:
  202. - "external-secrets.io"
  203. resources:
  204. - "externalsecrets"
  205. - "secretstores"
  206. {{- if .Values.processClusterStore }}
  207. - "clustersecretstores"
  208. {{- end }}
  209. {{- if .Values.processPushSecret }}
  210. - "pushsecrets"
  211. {{- end }}
  212. {{- if .Values.processClusterPushSecret }}
  213. - "clusterpushsecrets"
  214. {{- end }}
  215. verbs:
  216. - "get"
  217. - "watch"
  218. - "list"
  219. - apiGroups:
  220. - "generators.external-secrets.io"
  221. resources:
  222. - "acraccesstokens"
  223. {{- if .Values.processClusterGenerator }}
  224. - "clustergenerators"
  225. {{- end }}
  226. - "ecrauthorizationtokens"
  227. - "fakes"
  228. - "gcraccesstokens"
  229. - "githubaccesstokens"
  230. - "quayaccesstokens"
  231. - "passwords"
  232. - "sshkeys"
  233. - "vaultdynamicsecrets"
  234. - "webhooks"
  235. - "grafanas"
  236. - "generatorstates"
  237. - "mfas"
  238. - "uuids"
  239. verbs:
  240. - "get"
  241. - "watch"
  242. - "list"
  243. ---
  244. apiVersion: rbac.authorization.k8s.io/v1
  245. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  246. kind: Role
  247. {{- else }}
  248. kind: ClusterRole
  249. {{- end }}
  250. metadata:
  251. name: {{ include "external-secrets.fullname" . }}-edit
  252. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  253. namespace: {{ .Values.scopedNamespace | quote }}
  254. {{- end }}
  255. labels:
  256. {{- include "external-secrets.labels" . | nindent 4 }}
  257. {{- if .Values.rbac.aggregateToEdit }}
  258. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  259. {{- end }}
  260. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  261. rules:
  262. - apiGroups:
  263. - "external-secrets.io"
  264. resources:
  265. - "externalsecrets"
  266. - "secretstores"
  267. {{- if .Values.processClusterStore }}
  268. - "clustersecretstores"
  269. {{- end }}
  270. {{- if .Values.processPushSecret }}
  271. - "pushsecrets"
  272. {{- end }}
  273. {{- if .Values.processClusterPushSecret }}
  274. - "clusterpushsecrets"
  275. {{- end }}
  276. verbs:
  277. - "create"
  278. - "delete"
  279. - "deletecollection"
  280. - "patch"
  281. - "update"
  282. - apiGroups:
  283. - "generators.external-secrets.io"
  284. resources:
  285. - "acraccesstokens"
  286. {{- if .Values.processClusterGenerator }}
  287. - "clustergenerators"
  288. {{- end }}
  289. - "ecrauthorizationtokens"
  290. - "fakes"
  291. - "gcraccesstokens"
  292. - "githubaccesstokens"
  293. - "quayaccesstokens"
  294. - "passwords"
  295. - "sshkeys"
  296. - "vaultdynamicsecrets"
  297. - "webhooks"
  298. - "grafanas"
  299. - "generatorstates"
  300. - "mfas"
  301. - "uuids"
  302. verbs:
  303. - "create"
  304. - "delete"
  305. - "deletecollection"
  306. - "patch"
  307. - "update"
  308. ---
  309. apiVersion: rbac.authorization.k8s.io/v1
  310. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  311. kind: RoleBinding
  312. {{- else }}
  313. kind: ClusterRoleBinding
  314. {{- end }}
  315. metadata:
  316. name: {{ include "external-secrets.fullname" . }}-controller
  317. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  318. namespace: {{ .Values.scopedNamespace | quote }}
  319. {{- end }}
  320. labels:
  321. {{- include "external-secrets.labels" . | nindent 4 }}
  322. roleRef:
  323. apiGroup: rbac.authorization.k8s.io
  324. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  325. kind: Role
  326. {{- else }}
  327. kind: ClusterRole
  328. {{- end }}
  329. name: {{ include "external-secrets.fullname" . }}-controller
  330. subjects:
  331. - name: {{ include "external-secrets.serviceAccountName" . }}
  332. namespace: {{ template "external-secrets.namespace" . }}
  333. kind: ServiceAccount
  334. ---
  335. apiVersion: rbac.authorization.k8s.io/v1
  336. kind: Role
  337. metadata:
  338. name: {{ include "external-secrets.fullname" . }}-leaderelection
  339. namespace: {{ template "external-secrets.namespace" . }}
  340. labels:
  341. {{- include "external-secrets.labels" . | nindent 4 }}
  342. rules:
  343. - apiGroups:
  344. - ""
  345. resources:
  346. - "configmaps"
  347. resourceNames:
  348. - "external-secrets-controller"
  349. verbs:
  350. - "get"
  351. - "update"
  352. - "patch"
  353. - apiGroups:
  354. - ""
  355. resources:
  356. - "configmaps"
  357. verbs:
  358. - "create"
  359. - apiGroups:
  360. - "coordination.k8s.io"
  361. resources:
  362. - "leases"
  363. verbs:
  364. - "get"
  365. - "create"
  366. - "update"
  367. - "patch"
  368. ---
  369. apiVersion: rbac.authorization.k8s.io/v1
  370. kind: RoleBinding
  371. metadata:
  372. name: {{ include "external-secrets.fullname" . }}-leaderelection
  373. namespace: {{ template "external-secrets.namespace" . }}
  374. labels:
  375. {{- include "external-secrets.labels" . | nindent 4 }}
  376. roleRef:
  377. apiGroup: rbac.authorization.k8s.io
  378. kind: Role
  379. name: {{ include "external-secrets.fullname" . }}-leaderelection
  380. subjects:
  381. - kind: ServiceAccount
  382. name: {{ include "external-secrets.serviceAccountName" . }}
  383. namespace: {{ template "external-secrets.namespace" . }}
  384. {{- if .Values.rbac.servicebindings.create }}
  385. ---
  386. apiVersion: rbac.authorization.k8s.io/v1
  387. kind: ClusterRole
  388. metadata:
  389. name: {{ include "external-secrets.fullname" . }}-servicebindings
  390. labels:
  391. servicebinding.io/controller: "true"
  392. {{- include "external-secrets.labels" . | nindent 4 }}
  393. rules:
  394. - apiGroups:
  395. - "external-secrets.io"
  396. resources:
  397. - "externalsecrets"
  398. {{- if .Values.processPushSecret }}
  399. - "pushsecrets"
  400. {{- end }}
  401. verbs:
  402. - "get"
  403. - "list"
  404. - "watch"
  405. {{- end }}
  406. {{- end }}