deploy/templates/clusterrole.yaml (82 lines of code) (raw):
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
name: appconfig-manager-role
rules:
- apiGroups:
- azconfig.io
resources:
- azureappconfigurationproviders
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- azconfig.io
resources:
- azureappconfigurationproviders/finalizers
verbs:
- update
- apiGroups:
- azconfig.io
resources:
- azureappconfigurationproviders/status
verbs:
- get
- patch
- update
- apiGroups:
- ""
resources:
- configmaps
verbs:
- create
- get
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- secrets
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
{{- if .Values.workloadIdentity.enabled }}
- apiGroups:
- ""
resources:
- serviceaccounts
verbs:
- get
- apiGroups:
- ""
resources:
- serviceaccounts/token
verbs:
- create
{{- end }}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: appconfig-manager-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: appconfig-manager-role
subjects:
- kind: ServiceAccount
name: {{ include "az-appconfig-k8s-provider.serviceAccountName" . }}
namespace: {{ .Release.Namespace }}