cert-controller-rbac.yaml 1.1 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. {{- if .Values.certController.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. kind: ClusterRole
  4. metadata:
  5. name: {{ include "external-secrets.fullname" . }}-cert-controller
  6. labels:
  7. {{- include "external-secrets-cert-controller.labels" . | nindent 4 }}
  8. rules:
  9. - apiGroups:
  10. - "apiextensions.k8s.io"
  11. resources:
  12. - "customresourcedefinitions"
  13. verbs:
  14. - "get"
  15. - "list"
  16. - "watch"
  17. - "update"
  18. - "patch"
  19. - apiGroups:
  20. - ""
  21. resources:
  22. - "secrets"
  23. verbs:
  24. - "get"
  25. - "list"
  26. - "watch"
  27. - "update"
  28. - "patch"
  29. ---
  30. apiVersion: rbac.authorization.k8s.io/v1
  31. kind: ClusterRoleBinding
  32. metadata:
  33. name: {{ include "external-secrets.fullname" . }}-cert-controller
  34. labels:
  35. {{- include "external-secrets-cert-controller.labels" . | nindent 4 }}
  36. roleRef:
  37. apiGroup: rbac.authorization.k8s.io
  38. kind: ClusterRole
  39. name: {{ include "external-secrets.fullname" . }}-cert-controller
  40. subjects:
  41. - name: {{ include "external-secrets-cert-controller.serviceAccountName" . }}
  42. namespace: {{ .Release.Namespace | quote }}
  43. kind: ServiceAccount
  44. {{- end }}