cert-manager-webhook-example/deploy/example-webhook/templates/rbac.yaml
Patrik Cyvoct 756bd769eb
Update example to lastest versions
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2020-11-14 14:00:17 +01:00

131 lines
4.1 KiB
YAML

apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ include "example-webhook.fullname" . }}
labels:
app: {{ include "example-webhook.name" . }}
chart: {{ include "example-webhook.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
---
# Uncomment if secrets are read from the webhook
## Grant the webhook permission to read the secrets containing the credentials
#apiVersion: rbac.authorization.k8s.io/v1
#kind: Role
#metadata:
# name: {{ include "example-webhook.fullname" . }}:secrets-reader
# namespace: {{ .Release.Namespace }}
# labels:
# app: {{ include "example-webhook.name" . }}
# chart: {{ include "example-webhook.chart" . }}
# release: {{ .Release.Name }}
# heritage: {{ .Release.Service }}
#rules:
# - apiGroups:
# - ''
# resources:
# - 'secrets'
# verbs:
# - 'get'
#---
## Grant the webhook permission to read the secrets containing the credentials
#apiVersion: rbac.authorization.k8s.io/v1
#kind: RoleBinding
#metadata:
# name: {{ include "example-webhook.fullname" . }}:secrets-reader
# namespace: {{ .Release.Namespace }}
# labels:
# app: {{ include "example-webhook.name" . }}
# chart: {{ include "example-webhook.chart" . }}
# release: {{ .Release.Name }}
# heritage: {{ .Release.Service }}
#roleRef:
# apiGroup: rbac.authorization.k8s.io
# kind: Role
# name: {{ include "example-webhook.fullname" . }}:secrets-reader
#subjects:
# - apiGroup: ""
# kind: ServiceAccount
# name: {{ include "example-webhook.fullname" . }}
# namespace: {{ .Release.Namespace }}
#---
# Grant the webhook permission to read the ConfigMap containing the Kubernetes
# apiserver's requestheader-ca-certificate.
# This ConfigMap is automatically created by the Kubernetes apiserver.
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ include "example-webhook.fullname" . }}:webhook-authentication-reader
namespace: kube-system
labels:
app: {{ include "example-webhook.name" . }}
chart: {{ include "example-webhook.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: extension-apiserver-authentication-reader
subjects:
- apiGroup: ""
kind: ServiceAccount
name: {{ include "example-webhook.fullname" . }}
namespace: {{ .Release.Namespace }}
---
# apiserver gets the auth-delegator role to delegate auth decisions to
# the core apiserver
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ include "example-webhook.fullname" . }}:auth-delegator
labels:
app: {{ include "example-webhook.name" . }}
chart: {{ include "example-webhook.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:auth-delegator
subjects:
- apiGroup: ""
kind: ServiceAccount
name: {{ include "example-webhook.fullname" . }}
namespace: {{ .Release.Namespace }}
---
# Grant cert-manager permission to validate using our apiserver
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: {{ include "example-webhook.fullname" . }}:domain-solver
labels:
app: {{ include "example-webhook.name" . }}
chart: {{ include "example-webhook.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
rules:
- apiGroups:
- {{ .Values.groupName }}
resources:
- '*'
verbs:
- 'create'
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ include "example-webhook.fullname" . }}:domain-solver
labels:
app: {{ include "example-webhook.name" . }}
chart: {{ include "example-webhook.chart" . }}
release: {{ .Release.Name }}
heritage: {{ .Release.Service }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: {{ include "example-webhook.fullname" . }}:domain-solver
subjects:
- apiGroup: ""
kind: ServiceAccount
name: {{ .Values.certManager.serviceAccountName }}
namespace: {{ .Values.certManager.namespace }}