rbac.yaml 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. - "clustersecretstores"
  21. - "externalsecrets"
  22. - "clusterexternalsecrets"
  23. - "pushsecrets"
  24. - "clusterpushsecrets"
  25. verbs:
  26. - "get"
  27. - "list"
  28. - "watch"
  29. - apiGroups:
  30. - "external-secrets.io"
  31. resources:
  32. - "externalsecrets"
  33. - "externalsecrets/status"
  34. - "externalsecrets/finalizers"
  35. - "secretstores"
  36. - "secretstores/status"
  37. - "secretstores/finalizers"
  38. - "clustersecretstores"
  39. - "clustersecretstores/status"
  40. - "clustersecretstores/finalizers"
  41. - "clusterexternalsecrets"
  42. - "clusterexternalsecrets/status"
  43. - "clusterexternalsecrets/finalizers"
  44. - "pushsecrets"
  45. - "pushsecrets/status"
  46. - "pushsecrets/finalizers"
  47. - "clusterpushsecrets"
  48. - "clusterpushsecrets/status"
  49. - "clusterpushsecrets/finalizers"
  50. verbs:
  51. - "get"
  52. - "update"
  53. - "patch"
  54. - apiGroups:
  55. - "generators.external-secrets.io"
  56. resources:
  57. - "generatorstates"
  58. verbs:
  59. - "get"
  60. - "list"
  61. - "watch"
  62. - "create"
  63. - "update"
  64. - "patch"
  65. - "delete"
  66. - "deletecollection"
  67. - apiGroups:
  68. - "generators.external-secrets.io"
  69. resources:
  70. - "acraccesstokens"
  71. - "clustergenerators"
  72. - "ecrauthorizationtokens"
  73. - "fakes"
  74. - "gcraccesstokens"
  75. - "githubaccesstokens"
  76. - "quayaccesstokens"
  77. - "passwords"
  78. - "stssessiontokens"
  79. - "uuids"
  80. - "vaultdynamicsecrets"
  81. - "webhooks"
  82. - "grafanas"
  83. verbs:
  84. - "get"
  85. - "list"
  86. - "watch"
  87. - apiGroups:
  88. - ""
  89. resources:
  90. - "serviceaccounts"
  91. - "namespaces"
  92. verbs:
  93. - "get"
  94. - "list"
  95. - "watch"
  96. - apiGroups:
  97. - ""
  98. resources:
  99. - "configmaps"
  100. verbs:
  101. - "get"
  102. - "list"
  103. - "watch"
  104. - apiGroups:
  105. - ""
  106. resources:
  107. - "secrets"
  108. verbs:
  109. - "get"
  110. - "list"
  111. - "watch"
  112. - "create"
  113. - "update"
  114. - "delete"
  115. - "patch"
  116. - apiGroups:
  117. - ""
  118. resources:
  119. - "serviceaccounts/token"
  120. verbs:
  121. - "create"
  122. - apiGroups:
  123. - ""
  124. resources:
  125. - "events"
  126. verbs:
  127. - "create"
  128. - "patch"
  129. - apiGroups:
  130. - "external-secrets.io"
  131. resources:
  132. - "externalsecrets"
  133. verbs:
  134. - "create"
  135. - "update"
  136. - "delete"
  137. - apiGroups:
  138. - "external-secrets.io"
  139. resources:
  140. - "pushsecrets"
  141. verbs:
  142. - "create"
  143. - "update"
  144. - "delete"
  145. ---
  146. apiVersion: rbac.authorization.k8s.io/v1
  147. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  148. kind: Role
  149. {{- else }}
  150. kind: ClusterRole
  151. {{- end }}
  152. metadata:
  153. name: {{ include "external-secrets.fullname" . }}-view
  154. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  155. namespace: {{ .Values.scopedNamespace | quote }}
  156. {{- end }}
  157. labels:
  158. {{- include "external-secrets.labels" . | nindent 4 }}
  159. rbac.authorization.k8s.io/aggregate-to-view: "true"
  160. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  161. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  162. rules:
  163. - apiGroups:
  164. - "external-secrets.io"
  165. resources:
  166. - "externalsecrets"
  167. - "secretstores"
  168. - "clustersecretstores"
  169. - "pushsecrets"
  170. - "clusterpushsecrets"
  171. verbs:
  172. - "get"
  173. - "watch"
  174. - "list"
  175. - apiGroups:
  176. - "generators.external-secrets.io"
  177. resources:
  178. - "acraccesstokens"
  179. - "clustergenerators"
  180. - "ecrauthorizationtokens"
  181. - "fakes"
  182. - "gcraccesstokens"
  183. - "githubaccesstokens"
  184. - "quayaccesstokens"
  185. - "passwords"
  186. - "vaultdynamicsecrets"
  187. - "webhooks"
  188. - "grafanas"
  189. - "generatorstates"
  190. verbs:
  191. - "get"
  192. - "watch"
  193. - "list"
  194. ---
  195. apiVersion: rbac.authorization.k8s.io/v1
  196. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  197. kind: Role
  198. {{- else }}
  199. kind: ClusterRole
  200. {{- end }}
  201. metadata:
  202. name: {{ include "external-secrets.fullname" . }}-edit
  203. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  204. namespace: {{ .Values.scopedNamespace | quote }}
  205. {{- end }}
  206. labels:
  207. {{- include "external-secrets.labels" . | nindent 4 }}
  208. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  209. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  210. rules:
  211. - apiGroups:
  212. - "external-secrets.io"
  213. resources:
  214. - "externalsecrets"
  215. - "secretstores"
  216. - "clustersecretstores"
  217. - "pushsecrets"
  218. - "clusterpushsecrets"
  219. verbs:
  220. - "create"
  221. - "delete"
  222. - "deletecollection"
  223. - "patch"
  224. - "update"
  225. - apiGroups:
  226. - "generators.external-secrets.io"
  227. resources:
  228. - "acraccesstokens"
  229. - "clustergenerators"
  230. - "ecrauthorizationtokens"
  231. - "fakes"
  232. - "gcraccesstokens"
  233. - "githubaccesstokens"
  234. - "quayaccesstokens"
  235. - "passwords"
  236. - "vaultdynamicsecrets"
  237. - "webhooks"
  238. - "grafanas"
  239. - "generatorstates"
  240. verbs:
  241. - "create"
  242. - "delete"
  243. - "deletecollection"
  244. - "patch"
  245. - "update"
  246. ---
  247. apiVersion: rbac.authorization.k8s.io/v1
  248. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  249. kind: RoleBinding
  250. {{- else }}
  251. kind: ClusterRoleBinding
  252. {{- end }}
  253. metadata:
  254. name: {{ include "external-secrets.fullname" . }}-controller
  255. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  256. namespace: {{ .Values.scopedNamespace | quote }}
  257. {{- end }}
  258. labels:
  259. {{- include "external-secrets.labels" . | nindent 4 }}
  260. roleRef:
  261. apiGroup: rbac.authorization.k8s.io
  262. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  263. kind: Role
  264. {{- else }}
  265. kind: ClusterRole
  266. {{- end }}
  267. name: {{ include "external-secrets.fullname" . }}-controller
  268. subjects:
  269. - name: {{ include "external-secrets.serviceAccountName" . }}
  270. namespace: {{ template "external-secrets.namespace" . }}
  271. kind: ServiceAccount
  272. ---
  273. apiVersion: rbac.authorization.k8s.io/v1
  274. kind: Role
  275. metadata:
  276. name: {{ include "external-secrets.fullname" . }}-leaderelection
  277. namespace: {{ template "external-secrets.namespace" . }}
  278. labels:
  279. {{- include "external-secrets.labels" . | nindent 4 }}
  280. rules:
  281. - apiGroups:
  282. - ""
  283. resources:
  284. - "configmaps"
  285. resourceNames:
  286. - "external-secrets-controller"
  287. verbs:
  288. - "get"
  289. - "update"
  290. - "patch"
  291. - apiGroups:
  292. - ""
  293. resources:
  294. - "configmaps"
  295. verbs:
  296. - "create"
  297. - apiGroups:
  298. - "coordination.k8s.io"
  299. resources:
  300. - "leases"
  301. verbs:
  302. - "get"
  303. - "create"
  304. - "update"
  305. - "patch"
  306. ---
  307. apiVersion: rbac.authorization.k8s.io/v1
  308. kind: RoleBinding
  309. metadata:
  310. name: {{ include "external-secrets.fullname" . }}-leaderelection
  311. namespace: {{ template "external-secrets.namespace" . }}
  312. labels:
  313. {{- include "external-secrets.labels" . | nindent 4 }}
  314. roleRef:
  315. apiGroup: rbac.authorization.k8s.io
  316. kind: Role
  317. name: {{ include "external-secrets.fullname" . }}-leaderelection
  318. subjects:
  319. - kind: ServiceAccount
  320. name: {{ include "external-secrets.serviceAccountName" . }}
  321. namespace: {{ template "external-secrets.namespace" . }}
  322. {{- if .Values.rbac.servicebindings.create }}
  323. ---
  324. apiVersion: rbac.authorization.k8s.io/v1
  325. kind: ClusterRole
  326. metadata:
  327. name: {{ include "external-secrets.fullname" . }}-servicebindings
  328. labels:
  329. servicebinding.io/controller: "true"
  330. {{- include "external-secrets.labels" . | nindent 4 }}
  331. rules:
  332. - apiGroups:
  333. - "external-secrets.io"
  334. resources:
  335. - "externalsecrets"
  336. - "pushsecrets"
  337. verbs:
  338. - "get"
  339. - "list"
  340. - "watch"
  341. {{- end }}
  342. {{- end }}