@@ -263,6 +263,33 @@ subjects:
263
263
---
264
264
apiVersion : rbac.authorization.k8s.io/v1
265
265
kind : ClusterRole
266
+ metadata :
267
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-venafi-connection-reader
268
+ labels :
269
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
270
+ rules :
271
+ - apiGroups : ["jetstack.io"]
272
+ resources :
273
+ - venaficonnections
274
+ verbs : ["get", "list", "watch"]
275
+ ---
276
+ apiVersion : rbac.authorization.k8s.io/v1
277
+ kind : ClusterRoleBinding
278
+ metadata :
279
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-venafi-connection-reader
280
+ labels :
281
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
282
+ roleRef :
283
+ kind : ClusterRole
284
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-venafi-connection-reader
285
+ apiGroup : rbac.authorization.k8s.io
286
+ subjects :
287
+ - kind : ServiceAccount
288
+ name : {{ include "venafi-kubernetes-agent.serviceAccountName" . }}
289
+ namespace : {{ .Release.Namespace }}
290
+ ---
291
+ apiVersion : rbac.authorization.k8s.io/v1
292
+ kind : ClusterRole
266
293
metadata :
267
294
name : {{ include "venafi-kubernetes-agent.fullname" . }}-venafi-enhanced-reader
268
295
labels :
@@ -315,3 +342,116 @@ subjects:
315
342
- kind : ServiceAccount
316
343
name : {{ include "venafi-kubernetes-agent.serviceAccountName" . }}
317
344
namespace : {{ .Release.Namespace }}
345
+ ---
346
+ apiVersion : rbac.authorization.k8s.io/v1
347
+ kind : ClusterRole
348
+ metadata :
349
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-step-reader
350
+ labels :
351
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
352
+ rules :
353
+ - apiGroups : ["certmanager.step.sm"]
354
+ resources :
355
+ - stepissuers
356
+ - stepclusterissuers
357
+ verbs : ["get", "list", "watch"]
358
+ ---
359
+ apiVersion : rbac.authorization.k8s.io/v1
360
+ kind : ClusterRoleBinding
361
+ metadata :
362
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-step-reader
363
+ labels :
364
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
365
+ roleRef :
366
+ kind : ClusterRole
367
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-step-reader
368
+ apiGroup : rbac.authorization.k8s.io
369
+ subjects :
370
+ - kind : ServiceAccount
371
+ name : {{ include "venafi-kubernetes-agent.serviceAccountName" . }}
372
+ namespace : {{ .Release.Namespace }}
373
+ ---
374
+ apiVersion : rbac.authorization.k8s.io/v1
375
+ kind : ClusterRole
376
+ metadata :
377
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-cloudflare-reader
378
+ labels :
379
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
380
+ rules :
381
+ - apiGroups : ["cert-manager.k8s.cloudflare.com"]
382
+ resources :
383
+ - originissuers
384
+ - clusteroriginissuers
385
+ verbs : ["get", "list", "watch"]
386
+ ---
387
+ apiVersion : rbac.authorization.k8s.io/v1
388
+ kind : ClusterRoleBinding
389
+ metadata :
390
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-cloudflare-reader
391
+ labels :
392
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
393
+ roleRef :
394
+ kind : ClusterRole
395
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-cloudflare-reader
396
+ apiGroup : rbac.authorization.k8s.io
397
+ subjects :
398
+ - kind : ServiceAccount
399
+ name : {{ include "venafi-kubernetes-agent.serviceAccountName" . }}
400
+ namespace : {{ .Release.Namespace }}
401
+ ---
402
+ apiVersion : rbac.authorization.k8s.io/v1
403
+ kind : ClusterRole
404
+ metadata :
405
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-freeipa-reader
406
+ labels :
407
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
408
+ rules :
409
+ - apiGroups : ["certmanager.freeipa.org"]
410
+ resources :
411
+ - issuers
412
+ - clusterissuers
413
+ verbs : ["get", "list", "watch"]
414
+ ---
415
+ apiVersion : rbac.authorization.k8s.io/v1
416
+ kind : ClusterRoleBinding
417
+ metadata :
418
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-freeipa-reader
419
+ labels :
420
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
421
+ roleRef :
422
+ kind : ClusterRole
423
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-freeipa-reader
424
+ apiGroup : rbac.authorization.k8s.io
425
+ subjects :
426
+ - kind : ServiceAccount
427
+ name : {{ include "venafi-kubernetes-agent.serviceAccountName" . }}
428
+ namespace : {{ .Release.Namespace }}
429
+ ---
430
+ apiVersion : rbac.authorization.k8s.io/v1
431
+ kind : ClusterRole
432
+ metadata :
433
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-keyfactor-reader
434
+ labels :
435
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
436
+ rules :
437
+ - apiGroups : ["ejbca-issuer.keyfactor.com"]
438
+ resources :
439
+ - issuers
440
+ - clusterissuers
441
+ verbs : ["get", "list", "watch"]
442
+ ---
443
+ apiVersion : rbac.authorization.k8s.io/v1
444
+ kind : ClusterRoleBinding
445
+ metadata :
446
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-keyfactor-reader
447
+ labels :
448
+ {{- include "venafi-kubernetes-agent.labels" . | nindent 4 }}
449
+ roleRef :
450
+ kind : ClusterRole
451
+ name : {{ include "venafi-kubernetes-agent.fullname" . }}-keyfactor-reader
452
+ apiGroup : rbac.authorization.k8s.io
453
+ subjects :
454
+ - kind : ServiceAccount
455
+ name : {{ include "venafi-kubernetes-agent.serviceAccountName" . }}
456
+ namespace : {{ .Release.Namespace }}
457
+
0 commit comments