rbac.yaml 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. {{- if .Values.processClusterStore }}
  21. - "clustersecretstores"
  22. {{- end }}
  23. - "externalsecrets"
  24. {{- if .Values.processClusterExternalSecret }}
  25. - "clusterexternalsecrets"
  26. {{- end }}
  27. {{- if .Values.processPushSecret }}
  28. - "pushsecrets"
  29. {{- end }}
  30. {{- if .Values.processClusterPushSecret }}
  31. - "clusterpushsecrets"
  32. {{- end }}
  33. verbs:
  34. - "get"
  35. - "list"
  36. - "watch"
  37. - apiGroups:
  38. - "external-secrets.io"
  39. resources:
  40. - "externalsecrets"
  41. - "externalsecrets/status"
  42. {{- if .Values.openshiftFinalizers }}
  43. - "externalsecrets/finalizers"
  44. {{- end }}
  45. - "secretstores"
  46. - "secretstores/status"
  47. {{- if .Values.openshiftFinalizers }}
  48. - "secretstores/finalizers"
  49. {{- end }}
  50. {{- if .Values.processClusterStore }}
  51. - "clustersecretstores"
  52. - "clustersecretstores/status"
  53. {{- if .Values.openshiftFinalizers }}
  54. - "clustersecretstores/finalizers"
  55. {{- end }}
  56. {{- end }}
  57. {{- if .Values.processClusterExternalSecret }}
  58. - "clusterexternalsecrets"
  59. - "clusterexternalsecrets/status"
  60. {{- if .Values.openshiftFinalizers }}
  61. - "clusterexternalsecrets/finalizers"
  62. {{- end }}
  63. {{- end }}
  64. {{- if .Values.processPushSecret }}
  65. - "pushsecrets"
  66. - "pushsecrets/status"
  67. {{- if .Values.openshiftFinalizers }}
  68. - "pushsecrets/finalizers"
  69. {{- end }}
  70. {{- end }}
  71. {{- if .Values.processClusterPushSecret }}
  72. - "clusterpushsecrets"
  73. - "clusterpushsecrets/status"
  74. {{- if .Values.openshiftFinalizers }}
  75. - "clusterpushsecrets/finalizers"
  76. {{- end }}
  77. {{- end }}
  78. verbs:
  79. - "get"
  80. - "update"
  81. - "patch"
  82. - apiGroups:
  83. - "generators.external-secrets.io"
  84. resources:
  85. - "generatorstates"
  86. verbs:
  87. - "get"
  88. - "list"
  89. - "watch"
  90. - "create"
  91. - "update"
  92. - "patch"
  93. - "delete"
  94. - "deletecollection"
  95. - apiGroups:
  96. - "generators.external-secrets.io"
  97. resources:
  98. - "acraccesstokens"
  99. - "clustergenerators"
  100. - "ecrauthorizationtokens"
  101. - "fakes"
  102. - "gcraccesstokens"
  103. - "githubaccesstokens"
  104. - "quayaccesstokens"
  105. - "passwords"
  106. - "stssessiontokens"
  107. - "uuids"
  108. - "vaultdynamicsecrets"
  109. - "webhooks"
  110. - "grafanas"
  111. - "mfas"
  112. verbs:
  113. - "get"
  114. - "list"
  115. - "watch"
  116. - apiGroups:
  117. - ""
  118. resources:
  119. - "serviceaccounts"
  120. - "namespaces"
  121. verbs:
  122. - "get"
  123. - "list"
  124. - "watch"
  125. - apiGroups:
  126. - ""
  127. resources:
  128. - "configmaps"
  129. verbs:
  130. - "get"
  131. - "list"
  132. - "watch"
  133. - apiGroups:
  134. - ""
  135. resources:
  136. - "secrets"
  137. verbs:
  138. - "get"
  139. - "list"
  140. - "watch"
  141. - "create"
  142. - "update"
  143. - "delete"
  144. - "patch"
  145. - apiGroups:
  146. - ""
  147. resources:
  148. - "serviceaccounts/token"
  149. verbs:
  150. - "create"
  151. - apiGroups:
  152. - ""
  153. resources:
  154. - "events"
  155. verbs:
  156. - "create"
  157. - "patch"
  158. - apiGroups:
  159. - "external-secrets.io"
  160. resources:
  161. - "externalsecrets"
  162. verbs:
  163. - "create"
  164. - "update"
  165. - "delete"
  166. {{- if .Values.processPushSecret }}
  167. - apiGroups:
  168. - "external-secrets.io"
  169. resources:
  170. - "pushsecrets"
  171. verbs:
  172. - "create"
  173. - "update"
  174. - "delete"
  175. {{- end }}
  176. ---
  177. apiVersion: rbac.authorization.k8s.io/v1
  178. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  179. kind: Role
  180. {{- else }}
  181. kind: ClusterRole
  182. {{- end }}
  183. metadata:
  184. name: {{ include "external-secrets.fullname" . }}-view
  185. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  186. namespace: {{ .Values.scopedNamespace | quote }}
  187. {{- end }}
  188. labels:
  189. {{- include "external-secrets.labels" . | nindent 4 }}
  190. {{- if .Values.rbac.aggregateToView }}
  191. rbac.authorization.k8s.io/aggregate-to-view: "true"
  192. {{- end }}
  193. {{- if .Values.rbac.aggregateToEdit }}
  194. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  195. {{- end }}
  196. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  197. rules:
  198. - apiGroups:
  199. - "external-secrets.io"
  200. resources:
  201. - "externalsecrets"
  202. - "secretstores"
  203. {{- if .Values.processClusterStore }}
  204. - "clustersecretstores"
  205. {{- end }}
  206. {{- if .Values.processPushSecret }}
  207. - "pushsecrets"
  208. {{- end }}
  209. {{- if .Values.processClusterPushSecret }}
  210. - "clusterpushsecrets"
  211. {{- end }}
  212. verbs:
  213. - "get"
  214. - "watch"
  215. - "list"
  216. - apiGroups:
  217. - "generators.external-secrets.io"
  218. resources:
  219. - "acraccesstokens"
  220. - "clustergenerators"
  221. - "ecrauthorizationtokens"
  222. - "fakes"
  223. - "gcraccesstokens"
  224. - "githubaccesstokens"
  225. - "quayaccesstokens"
  226. - "passwords"
  227. - "vaultdynamicsecrets"
  228. - "webhooks"
  229. - "grafanas"
  230. - "generatorstates"
  231. - "mfas"
  232. - "uuids"
  233. verbs:
  234. - "get"
  235. - "watch"
  236. - "list"
  237. ---
  238. apiVersion: rbac.authorization.k8s.io/v1
  239. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  240. kind: Role
  241. {{- else }}
  242. kind: ClusterRole
  243. {{- end }}
  244. metadata:
  245. name: {{ include "external-secrets.fullname" . }}-edit
  246. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  247. namespace: {{ .Values.scopedNamespace | quote }}
  248. {{- end }}
  249. labels:
  250. {{- include "external-secrets.labels" . | nindent 4 }}
  251. {{- if .Values.rbac.aggregateToEdit }}
  252. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  253. {{- end }}
  254. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  255. rules:
  256. - apiGroups:
  257. - "external-secrets.io"
  258. resources:
  259. - "externalsecrets"
  260. - "secretstores"
  261. {{- if .Values.processClusterStore }}
  262. - "clustersecretstores"
  263. {{- end }}
  264. {{- if .Values.processPushSecret }}
  265. - "pushsecrets"
  266. {{- end }}
  267. {{- if .Values.processClusterPushSecret }}
  268. - "clusterpushsecrets"
  269. {{- end }}
  270. verbs:
  271. - "create"
  272. - "delete"
  273. - "deletecollection"
  274. - "patch"
  275. - "update"
  276. - apiGroups:
  277. - "generators.external-secrets.io"
  278. resources:
  279. - "acraccesstokens"
  280. - "clustergenerators"
  281. - "ecrauthorizationtokens"
  282. - "fakes"
  283. - "gcraccesstokens"
  284. - "githubaccesstokens"
  285. - "quayaccesstokens"
  286. - "passwords"
  287. - "vaultdynamicsecrets"
  288. - "webhooks"
  289. - "grafanas"
  290. - "generatorstates"
  291. - "mfas"
  292. - "uuids"
  293. verbs:
  294. - "create"
  295. - "delete"
  296. - "deletecollection"
  297. - "patch"
  298. - "update"
  299. ---
  300. apiVersion: rbac.authorization.k8s.io/v1
  301. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  302. kind: RoleBinding
  303. {{- else }}
  304. kind: ClusterRoleBinding
  305. {{- end }}
  306. metadata:
  307. name: {{ include "external-secrets.fullname" . }}-controller
  308. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  309. namespace: {{ .Values.scopedNamespace | quote }}
  310. {{- end }}
  311. labels:
  312. {{- include "external-secrets.labels" . | nindent 4 }}
  313. roleRef:
  314. apiGroup: rbac.authorization.k8s.io
  315. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  316. kind: Role
  317. {{- else }}
  318. kind: ClusterRole
  319. {{- end }}
  320. name: {{ include "external-secrets.fullname" . }}-controller
  321. subjects:
  322. - name: {{ include "external-secrets.serviceAccountName" . }}
  323. namespace: {{ template "external-secrets.namespace" . }}
  324. kind: ServiceAccount
  325. ---
  326. apiVersion: rbac.authorization.k8s.io/v1
  327. kind: Role
  328. metadata:
  329. name: {{ include "external-secrets.fullname" . }}-leaderelection
  330. namespace: {{ template "external-secrets.namespace" . }}
  331. labels:
  332. {{- include "external-secrets.labels" . | nindent 4 }}
  333. rules:
  334. - apiGroups:
  335. - ""
  336. resources:
  337. - "configmaps"
  338. resourceNames:
  339. - "external-secrets-controller"
  340. verbs:
  341. - "get"
  342. - "update"
  343. - "patch"
  344. - apiGroups:
  345. - ""
  346. resources:
  347. - "configmaps"
  348. verbs:
  349. - "create"
  350. - apiGroups:
  351. - "coordination.k8s.io"
  352. resources:
  353. - "leases"
  354. verbs:
  355. - "get"
  356. - "create"
  357. - "update"
  358. - "patch"
  359. ---
  360. apiVersion: rbac.authorization.k8s.io/v1
  361. kind: RoleBinding
  362. metadata:
  363. name: {{ include "external-secrets.fullname" . }}-leaderelection
  364. namespace: {{ template "external-secrets.namespace" . }}
  365. labels:
  366. {{- include "external-secrets.labels" . | nindent 4 }}
  367. roleRef:
  368. apiGroup: rbac.authorization.k8s.io
  369. kind: Role
  370. name: {{ include "external-secrets.fullname" . }}-leaderelection
  371. subjects:
  372. - kind: ServiceAccount
  373. name: {{ include "external-secrets.serviceAccountName" . }}
  374. namespace: {{ template "external-secrets.namespace" . }}
  375. {{- if .Values.rbac.servicebindings.create }}
  376. ---
  377. apiVersion: rbac.authorization.k8s.io/v1
  378. kind: ClusterRole
  379. metadata:
  380. name: {{ include "external-secrets.fullname" . }}-servicebindings
  381. labels:
  382. servicebinding.io/controller: "true"
  383. {{- include "external-secrets.labels" . | nindent 4 }}
  384. rules:
  385. - apiGroups:
  386. - "external-secrets.io"
  387. resources:
  388. - "externalsecrets"
  389. {{- if .Values.processPushSecret }}
  390. - "pushsecrets"
  391. {{- end }}
  392. verbs:
  393. - "get"
  394. - "list"
  395. - "watch"
  396. {{- end }}
  397. {{- end }}