rbac.yaml 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. {{- if .Values.processClusterStore }}
  21. - "clustersecretstores"
  22. {{- end }}
  23. - "externalsecrets"
  24. {{- if .Values.processClusterExternalSecret }}
  25. - "clusterexternalsecrets"
  26. {{- end }}
  27. {{- if .Values.processPushSecret }}
  28. - "pushsecrets"
  29. {{- end }}
  30. {{- if .Values.processClusterPushSecret }}
  31. - "clusterpushsecrets"
  32. {{- end }}
  33. verbs:
  34. - "get"
  35. - "list"
  36. - "watch"
  37. - apiGroups:
  38. - "external-secrets.io"
  39. resources:
  40. - "externalsecrets"
  41. - "externalsecrets/status"
  42. {{- if .Values.openshiftFinalizers }}
  43. - "externalsecrets/finalizers"
  44. {{- end }}
  45. - "secretstores"
  46. - "secretstores/status"
  47. {{- if .Values.openshiftFinalizers }}
  48. - "secretstores/finalizers"
  49. {{- end }}
  50. {{- if .Values.processClusterStore }}
  51. - "clustersecretstores"
  52. - "clustersecretstores/status"
  53. {{- if .Values.openshiftFinalizers }}
  54. - "clustersecretstores/finalizers"
  55. {{- end }}
  56. {{- end }}
  57. {{- if .Values.processClusterExternalSecret }}
  58. - "clusterexternalsecrets"
  59. - "clusterexternalsecrets/status"
  60. {{- if .Values.openshiftFinalizers }}
  61. - "clusterexternalsecrets/finalizers"
  62. {{- end }}
  63. {{- end }}
  64. {{- if .Values.processPushSecret }}
  65. - "pushsecrets"
  66. - "pushsecrets/status"
  67. {{- if .Values.openshiftFinalizers }}
  68. - "pushsecrets/finalizers"
  69. {{- end }}
  70. {{- end }}
  71. {{- if .Values.processClusterPushSecret }}
  72. - "clusterpushsecrets"
  73. - "clusterpushsecrets/status"
  74. {{- if .Values.openshiftFinalizers }}
  75. - "clusterpushsecrets/finalizers"
  76. {{- end }}
  77. {{- end }}
  78. verbs:
  79. - "get"
  80. - "update"
  81. - "patch"
  82. - apiGroups:
  83. - "generators.external-secrets.io"
  84. resources:
  85. - "generatorstates"
  86. verbs:
  87. - "get"
  88. - "list"
  89. - "watch"
  90. - "create"
  91. - "update"
  92. - "patch"
  93. - "delete"
  94. - "deletecollection"
  95. - apiGroups:
  96. - "generators.external-secrets.io"
  97. resources:
  98. - "acraccesstokens"
  99. - "cloudsmithaccesstokens"
  100. {{- if .Values.processClusterGenerator }}
  101. - "clustergenerators"
  102. {{- end }}
  103. - "ecrauthorizationtokens"
  104. - "fakes"
  105. - "gcraccesstokens"
  106. - "githubaccesstokens"
  107. - "quayaccesstokens"
  108. - "passwords"
  109. - "sshkeys"
  110. - "stssessiontokens"
  111. - "uuids"
  112. - "vaultdynamicsecrets"
  113. - "webhooks"
  114. - "grafanas"
  115. - "mfas"
  116. verbs:
  117. - "get"
  118. - "list"
  119. - "watch"
  120. - apiGroups:
  121. - ""
  122. resources:
  123. - "serviceaccounts"
  124. - "namespaces"
  125. verbs:
  126. - "get"
  127. - "list"
  128. - "watch"
  129. {{- if .Values.processClusterExternalSecret }}
  130. - apiGroups:
  131. - ""
  132. resources:
  133. - "namespaces"
  134. verbs:
  135. - "update"
  136. - "patch"
  137. {{- end }}
  138. - apiGroups:
  139. - ""
  140. resources:
  141. - "configmaps"
  142. verbs:
  143. - "get"
  144. - "list"
  145. - "watch"
  146. - apiGroups:
  147. - ""
  148. resources:
  149. - "secrets"
  150. verbs:
  151. - "get"
  152. - "list"
  153. - "watch"
  154. - "create"
  155. - "update"
  156. - "delete"
  157. - "patch"
  158. - apiGroups:
  159. - ""
  160. resources:
  161. - "serviceaccounts/token"
  162. verbs:
  163. - "create"
  164. - apiGroups:
  165. - ""
  166. resources:
  167. - "events"
  168. verbs:
  169. - "create"
  170. - "patch"
  171. - apiGroups:
  172. - "external-secrets.io"
  173. resources:
  174. - "externalsecrets"
  175. verbs:
  176. - "create"
  177. - "update"
  178. - "delete"
  179. {{- if .Values.processPushSecret }}
  180. - apiGroups:
  181. - "external-secrets.io"
  182. resources:
  183. - "pushsecrets"
  184. verbs:
  185. - "create"
  186. - "update"
  187. - "delete"
  188. {{- end }}
  189. ---
  190. apiVersion: rbac.authorization.k8s.io/v1
  191. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  192. kind: Role
  193. {{- else }}
  194. kind: ClusterRole
  195. {{- end }}
  196. metadata:
  197. name: {{ include "external-secrets.fullname" . }}-view
  198. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  199. namespace: {{ .Values.scopedNamespace | quote }}
  200. {{- end }}
  201. labels:
  202. {{- include "external-secrets.labels" . | nindent 4 }}
  203. {{- if .Values.rbac.aggregateToView }}
  204. rbac.authorization.k8s.io/aggregate-to-view: "true"
  205. {{- end }}
  206. {{- if .Values.rbac.aggregateToEdit }}
  207. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  208. {{- end }}
  209. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  210. rules:
  211. - apiGroups:
  212. - "external-secrets.io"
  213. resources:
  214. - "externalsecrets"
  215. - "secretstores"
  216. {{- if .Values.processClusterStore }}
  217. - "clustersecretstores"
  218. {{- end }}
  219. {{- if .Values.processPushSecret }}
  220. - "pushsecrets"
  221. {{- end }}
  222. {{- if .Values.processClusterPushSecret }}
  223. - "clusterpushsecrets"
  224. {{- end }}
  225. verbs:
  226. - "get"
  227. - "watch"
  228. - "list"
  229. - apiGroups:
  230. - "generators.external-secrets.io"
  231. resources:
  232. - "acraccesstokens"
  233. - "cloudsmithaccesstokens"
  234. {{- if .Values.processClusterGenerator }}
  235. - "clustergenerators"
  236. {{- end }}
  237. - "ecrauthorizationtokens"
  238. - "fakes"
  239. - "gcraccesstokens"
  240. - "githubaccesstokens"
  241. - "quayaccesstokens"
  242. - "passwords"
  243. - "sshkeys"
  244. - "vaultdynamicsecrets"
  245. - "webhooks"
  246. - "grafanas"
  247. - "generatorstates"
  248. - "mfas"
  249. - "uuids"
  250. verbs:
  251. - "get"
  252. - "watch"
  253. - "list"
  254. ---
  255. apiVersion: rbac.authorization.k8s.io/v1
  256. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  257. kind: Role
  258. {{- else }}
  259. kind: ClusterRole
  260. {{- end }}
  261. metadata:
  262. name: {{ include "external-secrets.fullname" . }}-edit
  263. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  264. namespace: {{ .Values.scopedNamespace | quote }}
  265. {{- end }}
  266. labels:
  267. {{- include "external-secrets.labels" . | nindent 4 }}
  268. {{- if .Values.rbac.aggregateToEdit }}
  269. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  270. {{- end }}
  271. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  272. rules:
  273. - apiGroups:
  274. - "external-secrets.io"
  275. resources:
  276. - "externalsecrets"
  277. - "secretstores"
  278. {{- if .Values.processClusterStore }}
  279. - "clustersecretstores"
  280. {{- end }}
  281. {{- if .Values.processPushSecret }}
  282. - "pushsecrets"
  283. {{- end }}
  284. {{- if .Values.processClusterPushSecret }}
  285. - "clusterpushsecrets"
  286. {{- end }}
  287. verbs:
  288. - "create"
  289. - "delete"
  290. - "deletecollection"
  291. - "patch"
  292. - "update"
  293. - apiGroups:
  294. - "generators.external-secrets.io"
  295. resources:
  296. - "acraccesstokens"
  297. - "cloudsmithaccesstokens"
  298. {{- if .Values.processClusterGenerator }}
  299. - "clustergenerators"
  300. {{- end }}
  301. - "ecrauthorizationtokens"
  302. - "fakes"
  303. - "gcraccesstokens"
  304. - "githubaccesstokens"
  305. - "quayaccesstokens"
  306. - "passwords"
  307. - "sshkeys"
  308. - "vaultdynamicsecrets"
  309. - "webhooks"
  310. - "grafanas"
  311. - "generatorstates"
  312. - "mfas"
  313. - "uuids"
  314. verbs:
  315. - "create"
  316. - "delete"
  317. - "deletecollection"
  318. - "patch"
  319. - "update"
  320. ---
  321. apiVersion: rbac.authorization.k8s.io/v1
  322. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  323. kind: RoleBinding
  324. {{- else }}
  325. kind: ClusterRoleBinding
  326. {{- end }}
  327. metadata:
  328. name: {{ include "external-secrets.fullname" . }}-controller
  329. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  330. namespace: {{ .Values.scopedNamespace | quote }}
  331. {{- end }}
  332. labels:
  333. {{- include "external-secrets.labels" . | nindent 4 }}
  334. roleRef:
  335. apiGroup: rbac.authorization.k8s.io
  336. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  337. kind: Role
  338. {{- else }}
  339. kind: ClusterRole
  340. {{- end }}
  341. name: {{ include "external-secrets.fullname" . }}-controller
  342. subjects:
  343. - name: {{ include "external-secrets.serviceAccountName" . }}
  344. namespace: {{ template "external-secrets.namespace" . }}
  345. kind: ServiceAccount
  346. ---
  347. apiVersion: rbac.authorization.k8s.io/v1
  348. kind: Role
  349. metadata:
  350. name: {{ include "external-secrets.fullname" . }}-leaderelection
  351. namespace: {{ template "external-secrets.namespace" . }}
  352. labels:
  353. {{- include "external-secrets.labels" . | nindent 4 }}
  354. rules:
  355. - apiGroups:
  356. - ""
  357. resources:
  358. - "configmaps"
  359. resourceNames:
  360. - "external-secrets-controller"
  361. verbs:
  362. - "get"
  363. - "update"
  364. - "patch"
  365. - apiGroups:
  366. - ""
  367. resources:
  368. - "configmaps"
  369. verbs:
  370. - "create"
  371. - apiGroups:
  372. - "coordination.k8s.io"
  373. resources:
  374. - "leases"
  375. verbs:
  376. - "get"
  377. - "create"
  378. - "update"
  379. - "patch"
  380. ---
  381. apiVersion: rbac.authorization.k8s.io/v1
  382. kind: RoleBinding
  383. metadata:
  384. name: {{ include "external-secrets.fullname" . }}-leaderelection
  385. namespace: {{ template "external-secrets.namespace" . }}
  386. labels:
  387. {{- include "external-secrets.labels" . | nindent 4 }}
  388. roleRef:
  389. apiGroup: rbac.authorization.k8s.io
  390. kind: Role
  391. name: {{ include "external-secrets.fullname" . }}-leaderelection
  392. subjects:
  393. - kind: ServiceAccount
  394. name: {{ include "external-secrets.serviceAccountName" . }}
  395. namespace: {{ template "external-secrets.namespace" . }}
  396. {{- if .Values.rbac.servicebindings.create }}
  397. ---
  398. apiVersion: rbac.authorization.k8s.io/v1
  399. kind: ClusterRole
  400. metadata:
  401. name: {{ include "external-secrets.fullname" . }}-servicebindings
  402. labels:
  403. servicebinding.io/controller: "true"
  404. {{- include "external-secrets.labels" . | nindent 4 }}
  405. rules:
  406. - apiGroups:
  407. - "external-secrets.io"
  408. resources:
  409. - "externalsecrets"
  410. {{- if .Values.processPushSecret }}
  411. - "pushsecrets"
  412. {{- end }}
  413. verbs:
  414. - "get"
  415. - "list"
  416. - "watch"
  417. {{- end }}
  418. {{- end }}
  419. {{- if .Values.systemAuthDelegator }}
  420. ---
  421. apiVersion: rbac.authorization.k8s.io/v1
  422. kind: ClusterRoleBinding
  423. metadata:
  424. name: {{ include "external-secrets.fullname" . }}-auth-delegator
  425. labels:
  426. {{- include "external-secrets.labels" . | nindent 4 }}
  427. roleRef:
  428. apiGroup: rbac.authorization.k8s.io
  429. kind: ClusterRole
  430. name: system:auth-delegator
  431. subjects:
  432. - kind: ServiceAccount
  433. name: {{ include "external-secrets.serviceAccountName" . }}
  434. namespace: {{ template "external-secrets.namespace" . }}
  435. {{- end }}