charts/csi-secrets-store-provider-azure/templates/role.yaml (49 lines of code) (raw):

{{- if and .Values.rbac.pspEnabled (.Capabilities.APIVersions.Has "policy/v1beta1/PodSecurityPolicy") }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ template "sscdpa.psp.fullname" . }} namespace: {{ .Release.Namespace }} {{ include "sscdpa.labels" . | indent 2 }} rules: - apiGroups: [ 'policy' ] resources: [ 'podsecuritypolicies' ] verbs: [ 'use' ] resourceNames: - {{ template "sscdpa.psp.fullname" . }} {{- end }} --- {{- if .Values.enableArcExtension }} {{- if and .Values.Azure.Identity.isEnabled .Values.arc.enableMonitoring }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: arc-extension-identity-role namespace: {{ .Release.Namespace }} labels: {{ include "sscdpa.arc.labels" . | indent 4 }} rules: - apiGroups: [ 'clusterconfig.azure.com' ] resources: [ 'azureclusteridentityrequests' ] verbs: [ 'get', 'create' ] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: arc-telegraf-role rules: - apiGroups: [""] resources: - pods verbs: ["get", "list", "watch"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: arc-geneva-role rules: - apiGroups: [""] resources: ["pods", "namespaces"] verbs: ["get", "watch", "list"] {{- end }} {{- end }}