charts/csi-secrets-store-provider-azure/templates/rolebinding.yaml (67 lines of code) (raw):
{{- if and .Values.rbac.pspEnabled (.Capabilities.APIVersions.Has "policy/v1beta1/PodSecurityPolicy") }}
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ template "sscdpa.fullname" . }}
namespace: {{ .Release.Namespace }}
{{ include "sscdpa.labels" . | indent 2 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: {{ template "sscdpa.psp.fullname" . }}
subjects:
- kind: ServiceAccount
name: csi-secrets-store-provider-azure
namespace: {{ .Release.Namespace }}
{{- end }}
---
{{- if .Values.enableArcExtension }}
{{- if and .Values.Azure.Identity.isEnabled .Values.arc.enableMonitoring }}
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: arc-extension-identity-role-binding
namespace: {{ .Release.Namespace }}
labels:
{{ include "sscdpa.arc.labels" . | indent 4 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: arc-extension-identity-role
subjects:
- kind: ServiceAccount
name: csi-secrets-store-provider-azure
namespace: {{ .Release.Namespace }}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: arc-telegraf-role-binding
namespace: {{ .Release.Namespace }}
labels:
{{ include "sscdpa.arc.labels" . | indent 4 }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: arc-telegraf-role
subjects:
- kind: ServiceAccount
name: csi-secrets-store-provider-azure
namespace: {{ .Release.Namespace }}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: arc-geneva-role-binding
labels:
{{ include "sscdpa.arc.labels" . | indent 4 }}
roleRef:
kind: ClusterRole
name: arc-geneva-role
apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
name: csi-secrets-store-provider-azure
namespace: {{ .Release.Namespace }}
{{- end }}
{{- end }}