k8s.io/test-infra@v0.0.0-20240520184403-27c6b4c223d8/config/prow/cluster/kubernetes-external-secrets_rbac.yaml (about) 1 --- 2 # Source: kubernetes-external-secrets/templates/rbac.yaml 3 apiVersion: rbac.authorization.k8s.io/v1 4 kind: ClusterRole 5 metadata: 6 name: kubernetes-external-secrets 7 labels: 8 app.kubernetes.io/name: kubernetes-external-secrets 9 rules: 10 - apiGroups: [""] 11 resources: ["secrets"] 12 verbs: ["create", "update", "get"] 13 - apiGroups: [""] 14 resources: ["namespaces"] 15 verbs: ["get", "watch", "list"] 16 - apiGroups: ["apiextensions.k8s.io"] 17 resources: ["customresourcedefinitions"] 18 resourceNames: ["externalsecrets.kubernetes-client.io"] 19 verbs: ["get", "update"] 20 - apiGroups: ["kubernetes-client.io"] 21 resources: ["externalsecrets"] 22 verbs: ["get", "watch", "list"] 23 - apiGroups: ["kubernetes-client.io"] 24 resources: ["externalsecrets/status"] 25 verbs: ["get", "update"] 26 --- 27 # Source: kubernetes-external-secrets/templates/rbac.yaml 28 apiVersion: rbac.authorization.k8s.io/v1 29 kind: ClusterRoleBinding 30 metadata: 31 name: kubernetes-external-secrets 32 labels: 33 app.kubernetes.io/name: kubernetes-external-secrets 34 roleRef: 35 apiGroup: rbac.authorization.k8s.io 36 kind: ClusterRole 37 name: kubernetes-external-secrets 38 subjects: 39 - name: kubernetes-external-secrets-sa 40 namespace: "default" 41 kind: ServiceAccount 42 --- 43 # Source: kubernetes-external-secrets/templates/rbac.yaml 44 apiVersion: rbac.authorization.k8s.io/v1 45 kind: ClusterRoleBinding 46 metadata: 47 name: kubernetes-external-secrets-auth 48 labels: 49 app.kubernetes.io/name: kubernetes-external-secrets 50 roleRef: 51 apiGroup: rbac.authorization.k8s.io 52 kind: ClusterRole 53 name: system:auth-delegator 54 subjects: 55 - name: kubernetes-external-secrets-sa 56 namespace: "default" 57 kind: ServiceAccount