rbac.yaml 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294
  1. {{- if .Values.rbac.create -}}
  2. apiVersion: rbac.authorization.k8s.io/v1
  3. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  4. kind: Role
  5. {{- else }}
  6. kind: ClusterRole
  7. {{- end }}
  8. metadata:
  9. name: {{ include "external-secrets.fullname" . }}-controller
  10. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  11. namespace: {{ .Values.scopedNamespace | quote }}
  12. {{- end }}
  13. labels:
  14. {{- include "external-secrets.labels" . | nindent 4 }}
  15. rules:
  16. - apiGroups:
  17. - "external-secrets.io"
  18. resources:
  19. - "secretstores"
  20. - "clustersecretstores"
  21. - "externalsecrets"
  22. - "clusterexternalsecrets"
  23. - "pushsecrets"
  24. verbs:
  25. - "get"
  26. - "list"
  27. - "watch"
  28. - apiGroups:
  29. - "external-secrets.io"
  30. resources:
  31. - "externalsecrets"
  32. - "externalsecrets/status"
  33. - "externalsecrets/finalizers"
  34. - "secretstores"
  35. - "secretstores/status"
  36. - "secretstores/finalizers"
  37. - "clustersecretstores"
  38. - "clustersecretstores/status"
  39. - "clustersecretstores/finalizers"
  40. - "clusterexternalsecrets"
  41. - "clusterexternalsecrets/status"
  42. - "clusterexternalsecrets/finalizers"
  43. - "pushsecrets"
  44. - "pushsecrets/status"
  45. - "pushsecrets/finalizers"
  46. verbs:
  47. - "update"
  48. - "patch"
  49. - apiGroups:
  50. - "generators.external-secrets.io"
  51. resources:
  52. - "acraccesstokens"
  53. - "ecrauthorizationtokens"
  54. - "fakes"
  55. - "gcraccesstokens"
  56. - "passwords"
  57. - "vaultdynamicsecrets"
  58. verbs:
  59. - "get"
  60. - "list"
  61. - "watch"
  62. - apiGroups:
  63. - ""
  64. resources:
  65. - "serviceaccounts"
  66. - "namespaces"
  67. verbs:
  68. - "get"
  69. - "list"
  70. - "watch"
  71. - apiGroups:
  72. - ""
  73. resources:
  74. - "configmaps"
  75. verbs:
  76. - "get"
  77. - "list"
  78. - "watch"
  79. - apiGroups:
  80. - ""
  81. resources:
  82. - "secrets"
  83. verbs:
  84. - "get"
  85. - "list"
  86. - "watch"
  87. - "create"
  88. - "update"
  89. - "delete"
  90. - "patch"
  91. - apiGroups:
  92. - ""
  93. resources:
  94. - "serviceaccounts/token"
  95. verbs:
  96. - "create"
  97. - apiGroups:
  98. - ""
  99. resources:
  100. - "events"
  101. verbs:
  102. - "create"
  103. - "patch"
  104. - apiGroups:
  105. - "external-secrets.io"
  106. resources:
  107. - "externalsecrets"
  108. verbs:
  109. - "create"
  110. - "update"
  111. - "delete"
  112. ---
  113. apiVersion: rbac.authorization.k8s.io/v1
  114. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  115. kind: Role
  116. {{- else }}
  117. kind: ClusterRole
  118. {{- end }}
  119. metadata:
  120. name: {{ include "external-secrets.fullname" . }}-view
  121. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  122. namespace: {{ .Values.scopedNamespace | quote }}
  123. {{- end }}
  124. labels:
  125. {{- include "external-secrets.labels" . | nindent 4 }}
  126. rbac.authorization.k8s.io/aggregate-to-view: "true"
  127. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  128. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  129. rules:
  130. - apiGroups:
  131. - "external-secrets.io"
  132. resources:
  133. - "externalsecrets"
  134. - "secretstores"
  135. - "clustersecretstores"
  136. - "pushsecrets"
  137. verbs:
  138. - "get"
  139. - "watch"
  140. - "list"
  141. - apiGroups:
  142. - "generators.external-secrets.io"
  143. resources:
  144. - "acraccesstokens"
  145. - "ecrauthorizationtokens"
  146. - "fakes"
  147. - "gcraccesstokens"
  148. - "passwords"
  149. - "vaultdynamicsecrets"
  150. verbs:
  151. - "get"
  152. - "watch"
  153. - "list"
  154. ---
  155. apiVersion: rbac.authorization.k8s.io/v1
  156. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  157. kind: Role
  158. {{- else }}
  159. kind: ClusterRole
  160. {{- end }}
  161. metadata:
  162. name: {{ include "external-secrets.fullname" . }}-edit
  163. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  164. namespace: {{ .Values.scopedNamespace | quote }}
  165. {{- end }}
  166. labels:
  167. {{- include "external-secrets.labels" . | nindent 4 }}
  168. rbac.authorization.k8s.io/aggregate-to-edit: "true"
  169. rbac.authorization.k8s.io/aggregate-to-admin: "true"
  170. rules:
  171. - apiGroups:
  172. - "external-secrets.io"
  173. resources:
  174. - "externalsecrets"
  175. - "secretstores"
  176. - "clustersecretstores"
  177. - "pushsecrets"
  178. verbs:
  179. - "create"
  180. - "delete"
  181. - "deletecollection"
  182. - "patch"
  183. - "update"
  184. - apiGroups:
  185. - "generators.external-secrets.io"
  186. resources:
  187. - "acraccesstokens"
  188. - "ecrauthorizationtokens"
  189. - "fakes"
  190. - "gcraccesstokens"
  191. - "passwords"
  192. - "vaultdynamicsecrets"
  193. verbs:
  194. - "create"
  195. - "delete"
  196. - "deletecollection"
  197. - "patch"
  198. - "update"
  199. ---
  200. apiVersion: rbac.authorization.k8s.io/v1
  201. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  202. kind: RoleBinding
  203. {{- else }}
  204. kind: ClusterRoleBinding
  205. {{- end }}
  206. metadata:
  207. name: {{ include "external-secrets.fullname" . }}-controller
  208. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  209. namespace: {{ .Values.scopedNamespace | quote }}
  210. {{- end }}
  211. labels:
  212. {{- include "external-secrets.labels" . | nindent 4 }}
  213. roleRef:
  214. apiGroup: rbac.authorization.k8s.io
  215. {{- if and .Values.scopedNamespace .Values.scopedRBAC }}
  216. kind: Role
  217. {{- else }}
  218. kind: ClusterRole
  219. {{- end }}
  220. name: {{ include "external-secrets.fullname" . }}-controller
  221. subjects:
  222. - name: {{ include "external-secrets.serviceAccountName" . }}
  223. namespace: {{ .Release.Namespace | quote }}
  224. kind: ServiceAccount
  225. ---
  226. apiVersion: rbac.authorization.k8s.io/v1
  227. kind: Role
  228. metadata:
  229. name: {{ include "external-secrets.fullname" . }}-leaderelection
  230. namespace: {{ .Release.Namespace | quote }}
  231. labels:
  232. {{- include "external-secrets.labels" . | nindent 4 }}
  233. rules:
  234. - apiGroups:
  235. - ""
  236. resources:
  237. - "configmaps"
  238. resourceNames:
  239. - "external-secrets-controller"
  240. verbs:
  241. - "get"
  242. - "update"
  243. - "patch"
  244. - apiGroups:
  245. - ""
  246. resources:
  247. - "configmaps"
  248. verbs:
  249. - "create"
  250. - apiGroups:
  251. - "coordination.k8s.io"
  252. resources:
  253. - "leases"
  254. verbs:
  255. - "get"
  256. - "create"
  257. - "update"
  258. - "patch"
  259. ---
  260. apiVersion: rbac.authorization.k8s.io/v1
  261. kind: RoleBinding
  262. metadata:
  263. name: {{ include "external-secrets.fullname" . }}-leaderelection
  264. namespace: {{ .Release.Namespace | quote }}
  265. labels:
  266. {{- include "external-secrets.labels" . | nindent 4 }}
  267. roleRef:
  268. apiGroup: rbac.authorization.k8s.io
  269. kind: Role
  270. name: {{ include "external-secrets.fullname" . }}-leaderelection
  271. subjects:
  272. - kind: ServiceAccount
  273. name: {{ include "external-secrets.serviceAccountName" . }}
  274. namespace: {{ .Release.Namespace | quote }}
  275. {{- if .Values.rbac.servicebindings.create }}
  276. ---
  277. apiVersion: rbac.authorization.k8s.io/v1
  278. kind: ClusterRole
  279. metadata:
  280. name: {{ include "external-secrets.fullname" . }}-servicebindings
  281. labels:
  282. servicebinding.io/controller: "true"
  283. {{- include "external-secrets.labels" . | nindent 4 }}
  284. rules:
  285. - apiGroups:
  286. - "external-secrets.io"
  287. resources:
  288. - "externalsecrets"
  289. verbs:
  290. - "get"
  291. - "list"
  292. - "watch"
  293. {{- end }}
  294. {{- end }}