rbac.yaml 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. {{- if .Values.processClusterStore }}
  21. - "clustersecretstores"
  22. {{- end }}
  23. - "externalsecrets"
  24. {{- if .Values.processClusterExternalSecret }}
  25. - "clusterexternalsecrets"
  26. {{- end }}
  27. {{- if .Values.processPushSecret }}
  28. - "pushsecrets"
  29. {{- end }}
  30. {{- if .Values.processClusterPushSecret }}
  31. - "clusterpushsecrets"
  32. {{- end }}
  33. verbs:
  34. - "get"
  35. - "list"
  36. - "watch"
  37. - apiGroups:
  38. - "external-secrets.io"
  39. resources:
  40. - "externalsecrets"
  41. - "externalsecrets/status"
  42. {{- if .Values.openshiftFinalizers }}
  43. - "externalsecrets/finalizers"
  44. {{- end }}
  45. - "secretstores"
  46. - "secretstores/status"
  47. {{- if .Values.openshiftFinalizers }}
  48. - "secretstores/finalizers"
  49. {{- end }}
  50. {{- if .Values.processClusterStore }}
  51. - "clustersecretstores"
  52. - "clustersecretstores/status"
  53. {{- if .Values.openshiftFinalizers }}
  54. - "clustersecretstores/finalizers"
  55. {{- end }}
  56. {{- end }}
  57. {{- if .Values.processClusterExternalSecret }}
  58. - "clusterexternalsecrets"
  59. - "clusterexternalsecrets/status"
  60. {{- if .Values.openshiftFinalizers }}
  61. - "clusterexternalsecrets/finalizers"
  62. {{- end }}
  63. {{- end }}
  64. {{- if .Values.processPushSecret }}
  65. - "pushsecrets"
  66. - "pushsecrets/status"
  67. {{- if .Values.openshiftFinalizers }}
  68. - "pushsecrets/finalizers"
  69. {{- end }}
  70. {{- end }}
  71. {{- if .Values.processClusterPushSecret }}
  72. - "clusterpushsecrets"
  73. - "clusterpushsecrets/status"
  74. {{- if .Values.openshiftFinalizers }}
  75. - "clusterpushsecrets/finalizers"
  76. {{- end }}
  77. {{- end }}
  78. verbs:
  79. - "get"
  80. - "update"
  81. - "patch"
  82. - apiGroups:
  83. - "generators.external-secrets.io"
  84. resources:
  85. - "generatorstates"
  86. verbs:
  87. - "get"
  88. - "list"
  89. - "watch"
  90. - "create"
  91. - "update"
  92. - "patch"
  93. - "delete"
  94. - "deletecollection"
  95. - apiGroups:
  96. - "generators.external-secrets.io"
  97. resources:
  98. - "acraccesstokens"
  99. - "cloudsmithaccesstokens"
  100. {{- if .Values.processClusterGenerator }}
  101. - "clustergenerators"
  102. {{- end }}
  103. - "ecrauthorizationtokens"
  104. - "fakes"
  105. - "gcraccesstokens"
  106. - "githubaccesstokens"
  107. - "quayaccesstokens"
  108. - "passwords"
  109. - "sshkeys"
  110. - "stssessiontokens"
  111. - "uuids"
  112. - "vaultdynamicsecrets"
  113. - "webhooks"
  114. - "grafanas"
  115. - "mfas"
  116. verbs:
  117. - "get"
  118. - "list"
  119. - "watch"
  120. - apiGroups:
  121. - ""
  122. resources:
  123. - "serviceaccounts"
  124. - "namespaces"
  125. verbs:
  126. - "get"
  127. - "list"
  128. - "watch"
  129. {{- if .Values.processClusterExternalSecret }}
  130. - apiGroups:
  131. - ""
  132. resources:
  133. - "namespaces"
  134. verbs:
  135. - "update"
  136. - "patch"
  137. {{- end }}
  138. - apiGroups:
  139. - ""
  140. resources:
  141. - "configmaps"
  142. verbs:
  143. - "get"
  144. - "list"
  145. - "watch"
  146. - apiGroups:
  147. - ""
  148. resources:
  149. - "secrets"
  150. verbs:
  151. - "get"
  152. - "list"
  153. - "watch"
  154. - "create"
  155. - "update"
  156. - "delete"
  157. - "patch"
  158. {{- if .Values.genericTargets.enabled }}
  159. # Generic target permissions (ConfigMaps)
  160. - apiGroups:
  161. - ""
  162. resources:
  163. - "configmaps"
  164. verbs:
  165. - "create"
  166. - "update"
  167. - "delete"
  168. - "patch"
  169. {{- range .Values.genericTargets.resources }}
  170. # Custom resource permissions for non-Secret targets
  171. - apiGroups:
  172. - {{ .apiGroup | quote }}
  173. resources:
  174. {{- range .resources }}
  175. - {{ . | quote }}
  176. {{- end }}
  177. verbs:
  178. {{- range .verbs }}
  179. - {{ . | quote }}
  180. {{- end }}
  181. {{- end }}
  182. {{- end }}
  183. - apiGroups:
  184. - ""
  185. resources:
  186. - "serviceaccounts/token"
  187. verbs:
  188. - "create"
  189. - apiGroups:
  190. - ""
  191. resources:
  192. - "events"
  193. verbs:
  194. - "create"
  195. - "patch"
  196. - apiGroups:
  197. - "external-secrets.io"
  198. resources:
  199. - "externalsecrets"
  200. verbs:
  201. - "create"
  202. - "update"
  203. - "delete"
  204. {{- if .Values.processPushSecret }}
  205. - apiGroups:
  206. - "external-secrets.io"
  207. resources:
  208. - "pushsecrets"
  209. verbs:
  210. - "create"
  211. - "update"
  212. - "delete"
  213. {{- end }}
  214. ---
  215. apiVersion: rbac.authorization.k8s.io/v1
  216. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  217. kind: Role
  218. {{- else }}
  219. kind: ClusterRole
  220. {{- end }}
  221. metadata:
  222. name: {{ include "external-secrets.fullname" . }}-view
  223. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  224. namespace: {{ .Values.scopedNamespace | quote }}
  225. {{- end }}
  226. labels:
  227. {{- include "external-secrets.labels" . | nindent 4 }}
  228. {{- if .Values.rbac.aggregateToView }}
  229. rbac.authorization.k8s.io/aggregate-to-view: "true"
  230. {{- end }}
  231. {{- if .Values.rbac.aggregateToEdit }}
  232. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  233. {{- end }}
  234. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  235. rules:
  236. - apiGroups:
  237. - "external-secrets.io"
  238. resources:
  239. - "externalsecrets"
  240. - "secretstores"
  241. {{- if .Values.processClusterStore }}
  242. - "clustersecretstores"
  243. {{- end }}
  244. {{- if .Values.processPushSecret }}
  245. - "pushsecrets"
  246. {{- end }}
  247. {{- if .Values.processClusterPushSecret }}
  248. - "clusterpushsecrets"
  249. {{- end }}
  250. verbs:
  251. - "get"
  252. - "watch"
  253. - "list"
  254. - apiGroups:
  255. - "generators.external-secrets.io"
  256. resources:
  257. - "acraccesstokens"
  258. - "cloudsmithaccesstokens"
  259. {{- if .Values.processClusterGenerator }}
  260. - "clustergenerators"
  261. {{- end }}
  262. - "ecrauthorizationtokens"
  263. - "fakes"
  264. - "gcraccesstokens"
  265. - "githubaccesstokens"
  266. - "quayaccesstokens"
  267. - "passwords"
  268. - "sshkeys"
  269. - "vaultdynamicsecrets"
  270. - "webhooks"
  271. - "grafanas"
  272. - "generatorstates"
  273. - "mfas"
  274. - "uuids"
  275. verbs:
  276. - "get"
  277. - "watch"
  278. - "list"
  279. ---
  280. apiVersion: rbac.authorization.k8s.io/v1
  281. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  282. kind: Role
  283. {{- else }}
  284. kind: ClusterRole
  285. {{- end }}
  286. metadata:
  287. name: {{ include "external-secrets.fullname" . }}-edit
  288. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  289. namespace: {{ .Values.scopedNamespace | quote }}
  290. {{- end }}
  291. labels:
  292. {{- include "external-secrets.labels" . | nindent 4 }}
  293. {{- if .Values.rbac.aggregateToEdit }}
  294. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  295. {{- end }}
  296. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  297. rules:
  298. - apiGroups:
  299. - "external-secrets.io"
  300. resources:
  301. - "externalsecrets"
  302. - "secretstores"
  303. {{- if .Values.processClusterStore }}
  304. - "clustersecretstores"
  305. {{- end }}
  306. {{- if .Values.processPushSecret }}
  307. - "pushsecrets"
  308. {{- end }}
  309. {{- if .Values.processClusterPushSecret }}
  310. - "clusterpushsecrets"
  311. {{- end }}
  312. verbs:
  313. - "create"
  314. - "delete"
  315. - "deletecollection"
  316. - "patch"
  317. - "update"
  318. - apiGroups:
  319. - "generators.external-secrets.io"
  320. resources:
  321. - "acraccesstokens"
  322. - "cloudsmithaccesstokens"
  323. {{- if .Values.processClusterGenerator }}
  324. - "clustergenerators"
  325. {{- end }}
  326. - "ecrauthorizationtokens"
  327. - "fakes"
  328. - "gcraccesstokens"
  329. - "githubaccesstokens"
  330. - "quayaccesstokens"
  331. - "passwords"
  332. - "sshkeys"
  333. - "vaultdynamicsecrets"
  334. - "webhooks"
  335. - "grafanas"
  336. - "generatorstates"
  337. - "mfas"
  338. - "uuids"
  339. verbs:
  340. - "create"
  341. - "delete"
  342. - "deletecollection"
  343. - "patch"
  344. - "update"
  345. ---
  346. apiVersion: rbac.authorization.k8s.io/v1
  347. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  348. kind: RoleBinding
  349. {{- else }}
  350. kind: ClusterRoleBinding
  351. {{- end }}
  352. metadata:
  353. name: {{ include "external-secrets.fullname" . }}-controller
  354. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  355. namespace: {{ .Values.scopedNamespace | quote }}
  356. {{- end }}
  357. labels:
  358. {{- include "external-secrets.labels" . | nindent 4 }}
  359. roleRef:
  360. apiGroup: rbac.authorization.k8s.io
  361. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  362. kind: Role
  363. {{- else }}
  364. kind: ClusterRole
  365. {{- end }}
  366. name: {{ include "external-secrets.fullname" . }}-controller
  367. subjects:
  368. - name: {{ include "external-secrets.serviceAccountName" . }}
  369. namespace: {{ template "external-secrets.namespace" . }}
  370. kind: ServiceAccount
  371. ---
  372. apiVersion: rbac.authorization.k8s.io/v1
  373. kind: Role
  374. metadata:
  375. name: {{ include "external-secrets.fullname" . }}-leaderelection
  376. namespace: {{ template "external-secrets.namespace" . }}
  377. labels:
  378. {{- include "external-secrets.labels" . | nindent 4 }}
  379. rules:
  380. - apiGroups:
  381. - ""
  382. resources:
  383. - "configmaps"
  384. resourceNames:
  385. - "external-secrets-controller"
  386. verbs:
  387. - "get"
  388. - "update"
  389. - "patch"
  390. - apiGroups:
  391. - ""
  392. resources:
  393. - "configmaps"
  394. verbs:
  395. - "create"
  396. - apiGroups:
  397. - "coordination.k8s.io"
  398. resources:
  399. - "leases"
  400. verbs:
  401. - "get"
  402. - "create"
  403. - "update"
  404. - "patch"
  405. ---
  406. apiVersion: rbac.authorization.k8s.io/v1
  407. kind: RoleBinding
  408. metadata:
  409. name: {{ include "external-secrets.fullname" . }}-leaderelection
  410. namespace: {{ template "external-secrets.namespace" . }}
  411. labels:
  412. {{- include "external-secrets.labels" . | nindent 4 }}
  413. roleRef:
  414. apiGroup: rbac.authorization.k8s.io
  415. kind: Role
  416. name: {{ include "external-secrets.fullname" . }}-leaderelection
  417. subjects:
  418. - kind: ServiceAccount
  419. name: {{ include "external-secrets.serviceAccountName" . }}
  420. namespace: {{ template "external-secrets.namespace" . }}
  421. {{- if .Values.rbac.servicebindings.create }}
  422. ---
  423. apiVersion: rbac.authorization.k8s.io/v1
  424. kind: ClusterRole
  425. metadata:
  426. name: {{ include "external-secrets.fullname" . }}-servicebindings
  427. labels:
  428. servicebinding.io/controller: "true"
  429. {{- include "external-secrets.labels" . | nindent 4 }}
  430. rules:
  431. - apiGroups:
  432. - "external-secrets.io"
  433. resources:
  434. - "externalsecrets"
  435. {{- if .Values.processPushSecret }}
  436. - "pushsecrets"
  437. {{- end }}
  438. verbs:
  439. - "get"
  440. - "list"
  441. - "watch"
  442. {{- end }}
  443. {{- end }}
  444. {{- if .Values.systemAuthDelegator }}
  445. ---
  446. apiVersion: rbac.authorization.k8s.io/v1
  447. kind: ClusterRoleBinding
  448. metadata:
  449. name: {{ include "external-secrets.fullname" . }}-auth-delegator
  450. labels:
  451. {{- include "external-secrets.labels" . | nindent 4 }}
  452. roleRef:
  453. apiGroup: rbac.authorization.k8s.io
  454. kind: ClusterRole
  455. name: system:auth-delegator
  456. subjects:
  457. - kind: ServiceAccount
  458. name: {{ include "external-secrets.serviceAccountName" . }}
  459. namespace: {{ template "external-secrets.namespace" . }}
  460. {{- end }}