cert-controller-rbac.yaml 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869
  1. {{- if and .Values.certController.create .Values.certController.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. kind: ClusterRole
  4. metadata:
  5. name: {{ include "external-secrets.fullname" . }}-cert-controller
  6. labels:
  7. {{- include "external-secrets-cert-controller.labels" . | nindent 4 }}
  8. rules:
  9. - apiGroups:
  10. - "apiextensions.k8s.io"
  11. resources:
  12. - "customresourcedefinitions"
  13. verbs:
  14. - "get"
  15. - "list"
  16. - "watch"
  17. - "update"
  18. - "patch"
  19. - apiGroups:
  20. - "admissionregistration.k8s.io"
  21. resources:
  22. - "validatingwebhookconfigurations"
  23. verbs:
  24. - "get"
  25. - "list"
  26. - "watch"
  27. - "update"
  28. - "patch"
  29. - apiGroups:
  30. - ""
  31. resources:
  32. - "endpoints"
  33. verbs:
  34. - "list"
  35. - "get"
  36. - "watch"
  37. - apiGroups:
  38. - ""
  39. resources:
  40. - "events"
  41. verbs:
  42. - "create"
  43. - "patch"
  44. - apiGroups:
  45. - ""
  46. resources:
  47. - "secrets"
  48. verbs:
  49. - "get"
  50. - "list"
  51. - "watch"
  52. - "update"
  53. - "patch"
  54. ---
  55. apiVersion: rbac.authorization.k8s.io/v1
  56. kind: ClusterRoleBinding
  57. metadata:
  58. name: {{ include "external-secrets.fullname" . }}-cert-controller
  59. labels:
  60. {{- include "external-secrets-cert-controller.labels" . | nindent 4 }}
  61. roleRef:
  62. apiGroup: rbac.authorization.k8s.io
  63. kind: ClusterRole
  64. name: {{ include "external-secrets.fullname" . }}-cert-controller
  65. subjects:
  66. - name: {{ include "external-secrets-cert-controller.serviceAccountName" . }}
  67. namespace: {{ .Release.Namespace | quote }}
  68. kind: ServiceAccount
  69. {{- end }}