rbac.yaml 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. - "clustersecretstores"
  21. - "externalsecrets"
  22. - "clusterexternalsecrets"
  23. - "pushsecrets"
  24. verbs:
  25. - "get"
  26. - "list"
  27. - "watch"
  28. - apiGroups:
  29. - "external-secrets.io"
  30. resources:
  31. - "externalsecrets"
  32. - "externalsecrets/status"
  33. - "externalsecrets/finalizers"
  34. - "secretstores"
  35. - "secretstores/status"
  36. - "secretstores/finalizers"
  37. - "clustersecretstores"
  38. - "clustersecretstores/status"
  39. - "clustersecretstores/finalizers"
  40. - "clusterexternalsecrets"
  41. - "clusterexternalsecrets/status"
  42. - "clusterexternalsecrets/finalizers"
  43. - "pushsecrets"
  44. - "pushsecrets/status"
  45. - "pushsecrets/finalizers"
  46. verbs:
  47. - "get"
  48. - "update"
  49. - "patch"
  50. - apiGroups:
  51. - "generators.external-secrets.io"
  52. resources:
  53. - "acraccesstokens"
  54. - "ecrauthorizationtokens"
  55. - "fakes"
  56. - "gcraccesstokens"
  57. - "githubaccesstokens"
  58. - "passwords"
  59. - "vaultdynamicsecrets"
  60. - "webhooks"
  61. verbs:
  62. - "get"
  63. - "list"
  64. - "watch"
  65. - apiGroups:
  66. - ""
  67. resources:
  68. - "serviceaccounts"
  69. - "namespaces"
  70. verbs:
  71. - "get"
  72. - "list"
  73. - "watch"
  74. - apiGroups:
  75. - ""
  76. resources:
  77. - "configmaps"
  78. verbs:
  79. - "get"
  80. - "list"
  81. - "watch"
  82. - apiGroups:
  83. - ""
  84. resources:
  85. - "secrets"
  86. verbs:
  87. - "get"
  88. - "list"
  89. - "watch"
  90. - "create"
  91. - "update"
  92. - "delete"
  93. - "patch"
  94. - apiGroups:
  95. - ""
  96. resources:
  97. - "serviceaccounts/token"
  98. verbs:
  99. - "create"
  100. - apiGroups:
  101. - ""
  102. resources:
  103. - "events"
  104. verbs:
  105. - "create"
  106. - "patch"
  107. - apiGroups:
  108. - "external-secrets.io"
  109. resources:
  110. - "externalsecrets"
  111. verbs:
  112. - "create"
  113. - "update"
  114. - "delete"
  115. ---
  116. apiVersion: rbac.authorization.k8s.io/v1
  117. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  118. kind: Role
  119. {{- else }}
  120. kind: ClusterRole
  121. {{- end }}
  122. metadata:
  123. name: {{ include "external-secrets.fullname" . }}-view
  124. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  125. namespace: {{ .Values.scopedNamespace | quote }}
  126. {{- end }}
  127. labels:
  128. {{- include "external-secrets.labels" . | nindent 4 }}
  129. rbac.authorization.k8s.io/aggregate-to-view: "true"
  130. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  131. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  132. rules:
  133. - apiGroups:
  134. - "external-secrets.io"
  135. resources:
  136. - "externalsecrets"
  137. - "secretstores"
  138. - "clustersecretstores"
  139. - "pushsecrets"
  140. verbs:
  141. - "get"
  142. - "watch"
  143. - "list"
  144. - apiGroups:
  145. - "generators.external-secrets.io"
  146. resources:
  147. - "acraccesstokens"
  148. - "ecrauthorizationtokens"
  149. - "fakes"
  150. - "gcraccesstokens"
  151. - "githubaccesstokens"
  152. - "passwords"
  153. - "vaultdynamicsecrets"
  154. - "webhooks"
  155. verbs:
  156. - "get"
  157. - "watch"
  158. - "list"
  159. ---
  160. apiVersion: rbac.authorization.k8s.io/v1
  161. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  162. kind: Role
  163. {{- else }}
  164. kind: ClusterRole
  165. {{- end }}
  166. metadata:
  167. name: {{ include "external-secrets.fullname" . }}-edit
  168. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  169. namespace: {{ .Values.scopedNamespace | quote }}
  170. {{- end }}
  171. labels:
  172. {{- include "external-secrets.labels" . | nindent 4 }}
  173. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  174. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  175. rules:
  176. - apiGroups:
  177. - "external-secrets.io"
  178. resources:
  179. - "externalsecrets"
  180. - "secretstores"
  181. - "clustersecretstores"
  182. - "pushsecrets"
  183. verbs:
  184. - "create"
  185. - "delete"
  186. - "deletecollection"
  187. - "patch"
  188. - "update"
  189. - apiGroups:
  190. - "generators.external-secrets.io"
  191. resources:
  192. - "acraccesstokens"
  193. - "ecrauthorizationtokens"
  194. - "fakes"
  195. - "gcraccesstokens"
  196. - "githubaccesstokens"
  197. - "passwords"
  198. - "vaultdynamicsecrets"
  199. - "webhooks"
  200. verbs:
  201. - "create"
  202. - "delete"
  203. - "deletecollection"
  204. - "patch"
  205. - "update"
  206. ---
  207. apiVersion: rbac.authorization.k8s.io/v1
  208. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  209. kind: RoleBinding
  210. {{- else }}
  211. kind: ClusterRoleBinding
  212. {{- end }}
  213. metadata:
  214. name: {{ include "external-secrets.fullname" . }}-controller
  215. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  216. namespace: {{ .Values.scopedNamespace | quote }}
  217. {{- end }}
  218. labels:
  219. {{- include "external-secrets.labels" . | nindent 4 }}
  220. roleRef:
  221. apiGroup: rbac.authorization.k8s.io
  222. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  223. kind: Role
  224. {{- else }}
  225. kind: ClusterRole
  226. {{- end }}
  227. name: {{ include "external-secrets.fullname" . }}-controller
  228. subjects:
  229. - name: {{ include "external-secrets.serviceAccountName" . }}
  230. namespace: {{ template "external-secrets.namespace" . }}
  231. kind: ServiceAccount
  232. ---
  233. apiVersion: rbac.authorization.k8s.io/v1
  234. kind: Role
  235. metadata:
  236. name: {{ include "external-secrets.fullname" . }}-leaderelection
  237. namespace: {{ template "external-secrets.namespace" . }}
  238. labels:
  239. {{- include "external-secrets.labels" . | nindent 4 }}
  240. rules:
  241. - apiGroups:
  242. - ""
  243. resources:
  244. - "configmaps"
  245. resourceNames:
  246. - "external-secrets-controller"
  247. verbs:
  248. - "get"
  249. - "update"
  250. - "patch"
  251. - apiGroups:
  252. - ""
  253. resources:
  254. - "configmaps"
  255. verbs:
  256. - "create"
  257. - apiGroups:
  258. - "coordination.k8s.io"
  259. resources:
  260. - "leases"
  261. verbs:
  262. - "get"
  263. - "create"
  264. - "update"
  265. - "patch"
  266. ---
  267. apiVersion: rbac.authorization.k8s.io/v1
  268. kind: RoleBinding
  269. metadata:
  270. name: {{ include "external-secrets.fullname" . }}-leaderelection
  271. namespace: {{ template "external-secrets.namespace" . }}
  272. labels:
  273. {{- include "external-secrets.labels" . | nindent 4 }}
  274. roleRef:
  275. apiGroup: rbac.authorization.k8s.io
  276. kind: Role
  277. name: {{ include "external-secrets.fullname" . }}-leaderelection
  278. subjects:
  279. - kind: ServiceAccount
  280. name: {{ include "external-secrets.serviceAccountName" . }}
  281. namespace: {{ template "external-secrets.namespace" . }}
  282. {{- if .Values.rbac.servicebindings.create }}
  283. ---
  284. apiVersion: rbac.authorization.k8s.io/v1
  285. kind: ClusterRole
  286. metadata:
  287. name: {{ include "external-secrets.fullname" . }}-servicebindings
  288. labels:
  289. servicebinding.io/controller: "true"
  290. {{- include "external-secrets.labels" . | nindent 4 }}
  291. rules:
  292. - apiGroups:
  293. - "external-secrets.io"
  294. resources:
  295. - "externalsecrets"
  296. verbs:
  297. - "get"
  298. - "list"
  299. - "watch"
  300. {{- end }}
  301. {{- end }}