rbac.yaml 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. {{- if .Values.processClusterStore }}
  21. - "clustersecretstores"
  22. {{- end }}
  23. - "externalsecrets"
  24. {{- if .Values.processClusterExternalSecret }}
  25. - "clusterexternalsecrets"
  26. {{- end }}
  27. {{- if .Values.processPushSecret }}
  28. - "pushsecrets"
  29. {{- end }}
  30. {{- if .Values.processClusterPushSecret }}
  31. - "clusterpushsecrets"
  32. {{- end }}
  33. verbs:
  34. - "get"
  35. - "list"
  36. - "watch"
  37. - apiGroups:
  38. - "external-secrets.io"
  39. resources:
  40. - "externalsecrets"
  41. - "externalsecrets/status"
  42. {{- if .Values.openshiftFinalizers }}
  43. - "externalsecrets/finalizers"
  44. {{- end }}
  45. - "secretstores"
  46. - "secretstores/status"
  47. {{- if .Values.openshiftFinalizers }}
  48. - "secretstores/finalizers"
  49. {{- end }}
  50. {{- if .Values.processClusterStore }}
  51. - "clustersecretstores"
  52. - "clustersecretstores/status"
  53. {{- if .Values.openshiftFinalizers }}
  54. - "clustersecretstores/finalizers"
  55. {{- end }}
  56. {{- end }}
  57. {{- if .Values.processClusterExternalSecret }}
  58. - "clusterexternalsecrets"
  59. - "clusterexternalsecrets/status"
  60. {{- if .Values.openshiftFinalizers }}
  61. - "clusterexternalsecrets/finalizers"
  62. {{- end }}
  63. {{- end }}
  64. {{- if .Values.processPushSecret }}
  65. - "pushsecrets"
  66. - "pushsecrets/status"
  67. {{- if .Values.openshiftFinalizers }}
  68. - "pushsecrets/finalizers"
  69. {{- end }}
  70. {{- end }}
  71. {{- if .Values.processClusterPushSecret }}
  72. - "clusterpushsecrets"
  73. - "clusterpushsecrets/status"
  74. {{- if .Values.openshiftFinalizers }}
  75. - "clusterpushsecrets/finalizers"
  76. {{- end }}
  77. {{- end }}
  78. verbs:
  79. - "get"
  80. - "update"
  81. - "patch"
  82. - apiGroups:
  83. - "generators.external-secrets.io"
  84. resources:
  85. - "generatorstates"
  86. verbs:
  87. - "get"
  88. - "list"
  89. - "watch"
  90. - "create"
  91. - "update"
  92. - "patch"
  93. - "delete"
  94. - "deletecollection"
  95. - apiGroups:
  96. - "generators.external-secrets.io"
  97. resources:
  98. - "acraccesstokens"
  99. - "clustergenerators"
  100. - "ecrauthorizationtokens"
  101. - "fakes"
  102. - "gcraccesstokens"
  103. - "githubaccesstokens"
  104. - "quayaccesstokens"
  105. - "passwords"
  106. - "stssessiontokens"
  107. - "uuids"
  108. - "vaultdynamicsecrets"
  109. - "webhooks"
  110. - "grafanas"
  111. verbs:
  112. - "get"
  113. - "list"
  114. - "watch"
  115. - apiGroups:
  116. - ""
  117. resources:
  118. - "serviceaccounts"
  119. - "namespaces"
  120. verbs:
  121. - "get"
  122. - "list"
  123. - "watch"
  124. - apiGroups:
  125. - ""
  126. resources:
  127. - "configmaps"
  128. verbs:
  129. - "get"
  130. - "list"
  131. - "watch"
  132. - apiGroups:
  133. - ""
  134. resources:
  135. - "secrets"
  136. verbs:
  137. - "get"
  138. - "list"
  139. - "watch"
  140. - "create"
  141. - "update"
  142. - "delete"
  143. - "patch"
  144. - apiGroups:
  145. - ""
  146. resources:
  147. - "serviceaccounts/token"
  148. verbs:
  149. - "create"
  150. - apiGroups:
  151. - ""
  152. resources:
  153. - "events"
  154. verbs:
  155. - "create"
  156. - "patch"
  157. - apiGroups:
  158. - "external-secrets.io"
  159. resources:
  160. - "externalsecrets"
  161. verbs:
  162. - "create"
  163. - "update"
  164. - "delete"
  165. {{- if .Values.processPushSecret }}
  166. - apiGroups:
  167. - "external-secrets.io"
  168. resources:
  169. - "pushsecrets"
  170. verbs:
  171. - "create"
  172. - "update"
  173. - "delete"
  174. {{- end }}
  175. ---
  176. apiVersion: rbac.authorization.k8s.io/v1
  177. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  178. kind: Role
  179. {{- else }}
  180. kind: ClusterRole
  181. {{- end }}
  182. metadata:
  183. name: {{ include "external-secrets.fullname" . }}-view
  184. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  185. namespace: {{ .Values.scopedNamespace | quote }}
  186. {{- end }}
  187. labels:
  188. {{- include "external-secrets.labels" . | nindent 4 }}
  189. rbac.authorization.k8s.io/aggregate-to-view: "true"
  190. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  191. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  192. rules:
  193. - apiGroups:
  194. - "external-secrets.io"
  195. resources:
  196. - "externalsecrets"
  197. - "secretstores"
  198. {{- if .Values.processClusterStore }}
  199. - "clustersecretstores"
  200. {{- end }}
  201. {{- if .Values.processPushSecret }}
  202. - "pushsecrets"
  203. {{- end }}
  204. {{- if .Values.processClusterPushSecret }}
  205. - "clusterpushsecrets"
  206. {{- end }}
  207. verbs:
  208. - "get"
  209. - "watch"
  210. - "list"
  211. - apiGroups:
  212. - "generators.external-secrets.io"
  213. resources:
  214. - "acraccesstokens"
  215. - "clustergenerators"
  216. - "ecrauthorizationtokens"
  217. - "fakes"
  218. - "gcraccesstokens"
  219. - "githubaccesstokens"
  220. - "quayaccesstokens"
  221. - "passwords"
  222. - "vaultdynamicsecrets"
  223. - "webhooks"
  224. - "grafanas"
  225. - "generatorstates"
  226. verbs:
  227. - "get"
  228. - "watch"
  229. - "list"
  230. ---
  231. apiVersion: rbac.authorization.k8s.io/v1
  232. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  233. kind: Role
  234. {{- else }}
  235. kind: ClusterRole
  236. {{- end }}
  237. metadata:
  238. name: {{ include "external-secrets.fullname" . }}-edit
  239. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  240. namespace: {{ .Values.scopedNamespace | quote }}
  241. {{- end }}
  242. labels:
  243. {{- include "external-secrets.labels" . | nindent 4 }}
  244. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  245. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  246. rules:
  247. - apiGroups:
  248. - "external-secrets.io"
  249. resources:
  250. - "externalsecrets"
  251. - "secretstores"
  252. {{- if .Values.processClusterStore }}
  253. - "clustersecretstores"
  254. {{- end }}
  255. {{- if .Values.processPushSecret }}
  256. - "pushsecrets"
  257. {{- end }}
  258. {{- if .Values.processClusterPushSecret }}
  259. - "clusterpushsecrets"
  260. {{- end }}
  261. verbs:
  262. - "create"
  263. - "delete"
  264. - "deletecollection"
  265. - "patch"
  266. - "update"
  267. - apiGroups:
  268. - "generators.external-secrets.io"
  269. resources:
  270. - "acraccesstokens"
  271. - "clustergenerators"
  272. - "ecrauthorizationtokens"
  273. - "fakes"
  274. - "gcraccesstokens"
  275. - "githubaccesstokens"
  276. - "quayaccesstokens"
  277. - "passwords"
  278. - "vaultdynamicsecrets"
  279. - "webhooks"
  280. - "grafanas"
  281. - "generatorstates"
  282. verbs:
  283. - "create"
  284. - "delete"
  285. - "deletecollection"
  286. - "patch"
  287. - "update"
  288. ---
  289. apiVersion: rbac.authorization.k8s.io/v1
  290. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  291. kind: RoleBinding
  292. {{- else }}
  293. kind: ClusterRoleBinding
  294. {{- end }}
  295. metadata:
  296. name: {{ include "external-secrets.fullname" . }}-controller
  297. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  298. namespace: {{ .Values.scopedNamespace | quote }}
  299. {{- end }}
  300. labels:
  301. {{- include "external-secrets.labels" . | nindent 4 }}
  302. roleRef:
  303. apiGroup: rbac.authorization.k8s.io
  304. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  305. kind: Role
  306. {{- else }}
  307. kind: ClusterRole
  308. {{- end }}
  309. name: {{ include "external-secrets.fullname" . }}-controller
  310. subjects:
  311. - name: {{ include "external-secrets.serviceAccountName" . }}
  312. namespace: {{ template "external-secrets.namespace" . }}
  313. kind: ServiceAccount
  314. ---
  315. apiVersion: rbac.authorization.k8s.io/v1
  316. kind: Role
  317. metadata:
  318. name: {{ include "external-secrets.fullname" . }}-leaderelection
  319. namespace: {{ template "external-secrets.namespace" . }}
  320. labels:
  321. {{- include "external-secrets.labels" . | nindent 4 }}
  322. rules:
  323. - apiGroups:
  324. - ""
  325. resources:
  326. - "configmaps"
  327. resourceNames:
  328. - "external-secrets-controller"
  329. verbs:
  330. - "get"
  331. - "update"
  332. - "patch"
  333. - apiGroups:
  334. - ""
  335. resources:
  336. - "configmaps"
  337. verbs:
  338. - "create"
  339. - apiGroups:
  340. - "coordination.k8s.io"
  341. resources:
  342. - "leases"
  343. verbs:
  344. - "get"
  345. - "create"
  346. - "update"
  347. - "patch"
  348. ---
  349. apiVersion: rbac.authorization.k8s.io/v1
  350. kind: RoleBinding
  351. metadata:
  352. name: {{ include "external-secrets.fullname" . }}-leaderelection
  353. namespace: {{ template "external-secrets.namespace" . }}
  354. labels:
  355. {{- include "external-secrets.labels" . | nindent 4 }}
  356. roleRef:
  357. apiGroup: rbac.authorization.k8s.io
  358. kind: Role
  359. name: {{ include "external-secrets.fullname" . }}-leaderelection
  360. subjects:
  361. - kind: ServiceAccount
  362. name: {{ include "external-secrets.serviceAccountName" . }}
  363. namespace: {{ template "external-secrets.namespace" . }}
  364. {{- if .Values.rbac.servicebindings.create }}
  365. ---
  366. apiVersion: rbac.authorization.k8s.io/v1
  367. kind: ClusterRole
  368. metadata:
  369. name: {{ include "external-secrets.fullname" . }}-servicebindings
  370. labels:
  371. servicebinding.io/controller: "true"
  372. {{- include "external-secrets.labels" . | nindent 4 }}
  373. rules:
  374. - apiGroups:
  375. - "external-secrets.io"
  376. resources:
  377. - "externalsecrets"
  378. {{- if .Values.processPushSecret }}
  379. - "pushsecrets"
  380. {{- end }}
  381. verbs:
  382. - "get"
  383. - "list"
  384. - "watch"
  385. {{- end }}
  386. {{- end }}