rbac.yaml 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. - "clustersecretstores"
  21. - "externalsecrets"
  22. - "clusterexternalsecrets"
  23. - "pushsecrets"
  24. verbs:
  25. - "get"
  26. - "list"
  27. - "watch"
  28. - apiGroups:
  29. - "external-secrets.io"
  30. resources:
  31. - "externalsecrets"
  32. - "externalsecrets/status"
  33. - "externalsecrets/finalizers"
  34. - "secretstores"
  35. - "secretstores/status"
  36. - "secretstores/finalizers"
  37. - "clustersecretstores"
  38. - "clustersecretstores/status"
  39. - "clustersecretstores/finalizers"
  40. - "clusterexternalsecrets"
  41. - "clusterexternalsecrets/status"
  42. - "clusterexternalsecrets/finalizers"
  43. - "pushsecrets"
  44. - "pushsecrets/status"
  45. - "pushsecrets/finalizers"
  46. verbs:
  47. - "update"
  48. - "patch"
  49. - apiGroups:
  50. - "generators.external-secrets.io"
  51. resources:
  52. - "acraccesstokens"
  53. - "ecrauthorizationtokens"
  54. - "fakes"
  55. - "gcraccesstokens"
  56. - "passwords"
  57. - "vaultdynamicsecrets"
  58. verbs:
  59. - "get"
  60. - "list"
  61. - "watch"
  62. - apiGroups:
  63. - ""
  64. resources:
  65. - "serviceaccounts"
  66. - "namespaces"
  67. verbs:
  68. - "get"
  69. - "list"
  70. - "watch"
  71. - apiGroups:
  72. - ""
  73. resources:
  74. - "configmaps"
  75. verbs:
  76. - "get"
  77. - "list"
  78. - "watch"
  79. - apiGroups:
  80. - ""
  81. resources:
  82. - "secrets"
  83. verbs:
  84. - "get"
  85. - "list"
  86. - "watch"
  87. - "create"
  88. - "update"
  89. - "delete"
  90. - "patch"
  91. - apiGroups:
  92. - ""
  93. resources:
  94. - "serviceaccounts/token"
  95. verbs:
  96. - "create"
  97. - apiGroups:
  98. - ""
  99. resources:
  100. - "events"
  101. verbs:
  102. - "create"
  103. - "patch"
  104. - apiGroups:
  105. - "external-secrets.io"
  106. resources:
  107. - "externalsecrets"
  108. verbs:
  109. - "create"
  110. - "update"
  111. - "delete"
  112. ---
  113. apiVersion: rbac.authorization.k8s.io/v1
  114. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  115. kind: Role
  116. {{- else }}
  117. kind: ClusterRole
  118. {{- end }}
  119. metadata:
  120. name: {{ include "external-secrets.fullname" . }}-view
  121. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  122. namespace: {{ .Values.scopedNamespace | quote }}
  123. {{- end }}
  124. labels:
  125. {{- include "external-secrets.labels" . | nindent 4 }}
  126. rbac.authorization.k8s.io/aggregate-to-view: "true"
  127. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  128. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  129. rules:
  130. - apiGroups:
  131. - "external-secrets.io"
  132. resources:
  133. - "externalsecrets"
  134. - "secretstores"
  135. - "clustersecretstores"
  136. - "pushsecrets"
  137. verbs:
  138. - "get"
  139. - "watch"
  140. - "list"
  141. ---
  142. apiVersion: rbac.authorization.k8s.io/v1
  143. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  144. kind: Role
  145. {{- else }}
  146. kind: ClusterRole
  147. {{- end }}
  148. metadata:
  149. name: {{ include "external-secrets.fullname" . }}-edit
  150. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  151. namespace: {{ .Values.scopedNamespace | quote }}
  152. {{- end }}
  153. labels:
  154. {{- include "external-secrets.labels" . | nindent 4 }}
  155. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  156. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  157. rules:
  158. - apiGroups:
  159. - "external-secrets.io"
  160. resources:
  161. - "externalsecrets"
  162. - "secretstores"
  163. - "clustersecretstores"
  164. - "pushsecrets"
  165. verbs:
  166. - "create"
  167. - "delete"
  168. - "deletecollection"
  169. - "patch"
  170. - "update"
  171. ---
  172. apiVersion: rbac.authorization.k8s.io/v1
  173. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  174. kind: RoleBinding
  175. {{- else }}
  176. kind: ClusterRoleBinding
  177. {{- end }}
  178. metadata:
  179. name: {{ include "external-secrets.fullname" . }}-controller
  180. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  181. namespace: {{ .Values.scopedNamespace | quote }}
  182. {{- end }}
  183. labels:
  184. {{- include "external-secrets.labels" . | nindent 4 }}
  185. roleRef:
  186. apiGroup: rbac.authorization.k8s.io
  187. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  188. kind: Role
  189. {{- else }}
  190. kind: ClusterRole
  191. {{- end }}
  192. name: {{ include "external-secrets.fullname" . }}-controller
  193. subjects:
  194. - name: {{ include "external-secrets.serviceAccountName" . }}
  195. namespace: {{ .Release.Namespace | quote }}
  196. kind: ServiceAccount
  197. ---
  198. apiVersion: rbac.authorization.k8s.io/v1
  199. kind: Role
  200. metadata:
  201. name: {{ include "external-secrets.fullname" . }}-leaderelection
  202. namespace: {{ .Release.Namespace | quote }}
  203. labels:
  204. {{- include "external-secrets.labels" . | nindent 4 }}
  205. rules:
  206. - apiGroups:
  207. - ""
  208. resources:
  209. - "configmaps"
  210. resourceNames:
  211. - "external-secrets-controller"
  212. verbs:
  213. - "get"
  214. - "update"
  215. - "patch"
  216. - apiGroups:
  217. - ""
  218. resources:
  219. - "configmaps"
  220. verbs:
  221. - "create"
  222. - apiGroups:
  223. - "coordination.k8s.io"
  224. resources:
  225. - "leases"
  226. verbs:
  227. - "get"
  228. - "create"
  229. - "update"
  230. - "patch"
  231. ---
  232. apiVersion: rbac.authorization.k8s.io/v1
  233. kind: RoleBinding
  234. metadata:
  235. name: {{ include "external-secrets.fullname" . }}-leaderelection
  236. namespace: {{ .Release.Namespace | quote }}
  237. labels:
  238. {{- include "external-secrets.labels" . | nindent 4 }}
  239. roleRef:
  240. apiGroup: rbac.authorization.k8s.io
  241. kind: Role
  242. name: {{ include "external-secrets.fullname" . }}-leaderelection
  243. subjects:
  244. - kind: ServiceAccount
  245. name: {{ include "external-secrets.serviceAccountName" . }}
  246. namespace: {{ .Release.Namespace | quote }}
  247. {{- end }}