rbac.yaml 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. - "clustersecretstores"
  21. - "externalsecrets"
  22. - "clusterexternalsecrets"
  23. - "pushsecrets"
  24. verbs:
  25. - "get"
  26. - "list"
  27. - "watch"
  28. - apiGroups:
  29. - "external-secrets.io"
  30. resources:
  31. - "externalsecrets"
  32. - "externalsecrets/status"
  33. - "externalsecrets/finalizers"
  34. - "secretstores"
  35. - "secretstores/status"
  36. - "secretstores/finalizers"
  37. - "clustersecretstores"
  38. - "clustersecretstores/status"
  39. - "clustersecretstores/finalizers"
  40. - "clusterexternalsecrets"
  41. - "clusterexternalsecrets/status"
  42. - "clusterexternalsecrets/finalizers"
  43. - "pushsecrets"
  44. - "pushsecrets/status"
  45. - "pushsecrets/finalizers"
  46. verbs:
  47. - "get"
  48. - "update"
  49. - "patch"
  50. - apiGroups:
  51. - "generators.external-secrets.io"
  52. resources:
  53. - "acraccesstokens"
  54. - "clustergenerators"
  55. - "ecrauthorizationtokens"
  56. - "fakes"
  57. - "gcraccesstokens"
  58. - "githubaccesstokens"
  59. - "passwords"
  60. - "stssessiontokens"
  61. - "uuids"
  62. - "vaultdynamicsecrets"
  63. - "webhooks"
  64. verbs:
  65. - "get"
  66. - "list"
  67. - "watch"
  68. - apiGroups:
  69. - ""
  70. resources:
  71. - "serviceaccounts"
  72. - "namespaces"
  73. verbs:
  74. - "get"
  75. - "list"
  76. - "watch"
  77. - apiGroups:
  78. - ""
  79. resources:
  80. - "configmaps"
  81. verbs:
  82. - "get"
  83. - "list"
  84. - "watch"
  85. - apiGroups:
  86. - ""
  87. resources:
  88. - "secrets"
  89. verbs:
  90. - "get"
  91. - "list"
  92. - "watch"
  93. - "create"
  94. - "update"
  95. - "delete"
  96. - "patch"
  97. - apiGroups:
  98. - ""
  99. resources:
  100. - "serviceaccounts/token"
  101. verbs:
  102. - "create"
  103. - apiGroups:
  104. - ""
  105. resources:
  106. - "events"
  107. verbs:
  108. - "create"
  109. - "patch"
  110. - apiGroups:
  111. - "external-secrets.io"
  112. resources:
  113. - "externalsecrets"
  114. verbs:
  115. - "create"
  116. - "update"
  117. - "delete"
  118. ---
  119. apiVersion: rbac.authorization.k8s.io/v1
  120. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  121. kind: Role
  122. {{- else }}
  123. kind: ClusterRole
  124. {{- end }}
  125. metadata:
  126. name: {{ include "external-secrets.fullname" . }}-view
  127. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  128. namespace: {{ .Values.scopedNamespace | quote }}
  129. {{- end }}
  130. labels:
  131. {{- include "external-secrets.labels" . | nindent 4 }}
  132. rbac.authorization.k8s.io/aggregate-to-view: "true"
  133. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  134. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  135. rules:
  136. - apiGroups:
  137. - "external-secrets.io"
  138. resources:
  139. - "externalsecrets"
  140. - "secretstores"
  141. - "clustersecretstores"
  142. - "pushsecrets"
  143. verbs:
  144. - "get"
  145. - "watch"
  146. - "list"
  147. - apiGroups:
  148. - "generators.external-secrets.io"
  149. resources:
  150. - "acraccesstokens"
  151. - "clustergenerators"
  152. - "ecrauthorizationtokens"
  153. - "fakes"
  154. - "gcraccesstokens"
  155. - "githubaccesstokens"
  156. - "passwords"
  157. - "vaultdynamicsecrets"
  158. - "webhooks"
  159. verbs:
  160. - "get"
  161. - "watch"
  162. - "list"
  163. ---
  164. apiVersion: rbac.authorization.k8s.io/v1
  165. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  166. kind: Role
  167. {{- else }}
  168. kind: ClusterRole
  169. {{- end }}
  170. metadata:
  171. name: {{ include "external-secrets.fullname" . }}-edit
  172. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  173. namespace: {{ .Values.scopedNamespace | quote }}
  174. {{- end }}
  175. labels:
  176. {{- include "external-secrets.labels" . | nindent 4 }}
  177. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  178. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  179. rules:
  180. - apiGroups:
  181. - "external-secrets.io"
  182. resources:
  183. - "externalsecrets"
  184. - "secretstores"
  185. - "clustersecretstores"
  186. - "pushsecrets"
  187. verbs:
  188. - "create"
  189. - "delete"
  190. - "deletecollection"
  191. - "patch"
  192. - "update"
  193. - apiGroups:
  194. - "generators.external-secrets.io"
  195. resources:
  196. - "acraccesstokens"
  197. - "clustergenerators"
  198. - "ecrauthorizationtokens"
  199. - "fakes"
  200. - "gcraccesstokens"
  201. - "githubaccesstokens"
  202. - "passwords"
  203. - "vaultdynamicsecrets"
  204. - "webhooks"
  205. verbs:
  206. - "create"
  207. - "delete"
  208. - "deletecollection"
  209. - "patch"
  210. - "update"
  211. ---
  212. apiVersion: rbac.authorization.k8s.io/v1
  213. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  214. kind: RoleBinding
  215. {{- else }}
  216. kind: ClusterRoleBinding
  217. {{- end }}
  218. metadata:
  219. name: {{ include "external-secrets.fullname" . }}-controller
  220. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  221. namespace: {{ .Values.scopedNamespace | quote }}
  222. {{- end }}
  223. labels:
  224. {{- include "external-secrets.labels" . | nindent 4 }}
  225. roleRef:
  226. apiGroup: rbac.authorization.k8s.io
  227. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  228. kind: Role
  229. {{- else }}
  230. kind: ClusterRole
  231. {{- end }}
  232. name: {{ include "external-secrets.fullname" . }}-controller
  233. subjects:
  234. - name: {{ include "external-secrets.serviceAccountName" . }}
  235. namespace: {{ template "external-secrets.namespace" . }}
  236. kind: ServiceAccount
  237. ---
  238. apiVersion: rbac.authorization.k8s.io/v1
  239. kind: Role
  240. metadata:
  241. name: {{ include "external-secrets.fullname" . }}-leaderelection
  242. namespace: {{ template "external-secrets.namespace" . }}
  243. labels:
  244. {{- include "external-secrets.labels" . | nindent 4 }}
  245. rules:
  246. - apiGroups:
  247. - ""
  248. resources:
  249. - "configmaps"
  250. resourceNames:
  251. - "external-secrets-controller"
  252. verbs:
  253. - "get"
  254. - "update"
  255. - "patch"
  256. - apiGroups:
  257. - ""
  258. resources:
  259. - "configmaps"
  260. verbs:
  261. - "create"
  262. - apiGroups:
  263. - "coordination.k8s.io"
  264. resources:
  265. - "leases"
  266. verbs:
  267. - "get"
  268. - "create"
  269. - "update"
  270. - "patch"
  271. ---
  272. apiVersion: rbac.authorization.k8s.io/v1
  273. kind: RoleBinding
  274. metadata:
  275. name: {{ include "external-secrets.fullname" . }}-leaderelection
  276. namespace: {{ template "external-secrets.namespace" . }}
  277. labels:
  278. {{- include "external-secrets.labels" . | nindent 4 }}
  279. roleRef:
  280. apiGroup: rbac.authorization.k8s.io
  281. kind: Role
  282. name: {{ include "external-secrets.fullname" . }}-leaderelection
  283. subjects:
  284. - kind: ServiceAccount
  285. name: {{ include "external-secrets.serviceAccountName" . }}
  286. namespace: {{ template "external-secrets.namespace" . }}
  287. {{- if .Values.rbac.servicebindings.create }}
  288. ---
  289. apiVersion: rbac.authorization.k8s.io/v1
  290. kind: ClusterRole
  291. metadata:
  292. name: {{ include "external-secrets.fullname" . }}-servicebindings
  293. labels:
  294. servicebinding.io/controller: "true"
  295. {{- include "external-secrets.labels" . | nindent 4 }}
  296. rules:
  297. - apiGroups:
  298. - "external-secrets.io"
  299. resources:
  300. - "externalsecrets"
  301. verbs:
  302. - "get"
  303. - "list"
  304. - "watch"
  305. {{- end }}
  306. {{- end }}