blob: 7c272aecdae4927c2b7ccf8b6abd382af8d86478 [file] [log] [blame]
Sylvain Desbureaux45348812020-05-19 17:46:54 +02001{{/*
2# Copyright © 2020 Orange
3#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15*/}}
16
17{{- $dot := . -}}
18{{- range $role_type := $dot.Values.roles }}
Sylvain Desbureaux6f4e8c02021-04-19 15:26:15 +020019{{/* retrieve the names for generic roles */}}
20{{ $name := printf "%s-%s" (include "common.release" $dot) $role_type }}
21{{- if not (has $role_type $dot.Values.defaultRoles) }}
22{{ $name = include "common.fullname" (dict "suffix" $role_type "dot" $dot ) }}
23{{- end }}
Sylvain Desbureaux45348812020-05-19 17:46:54 +020024---
25apiVersion: rbac.authorization.k8s.io/v1
26# This cluster role binding allows anyone in the "manager" group to read secrets in any namespace.
27kind: RoleBinding
28metadata:
Sylvain Desbureaux6f4e8c02021-04-19 15:26:15 +020029 name: {{ include "common.fullname" (dict "suffix" $role_type "dot" $dot ) }}
Sylvain Desbureaux45348812020-05-19 17:46:54 +020030 namespace: {{ include "common.namespace" $dot }}
31subjects:
32- kind: ServiceAccount
Sylvain Desbureaux6f4e8c02021-04-19 15:26:15 +020033 name: {{ include "common.fullname" (dict "suffix" $role_type "dot" $dot ) }}
Sylvain Desbureaux45348812020-05-19 17:46:54 +020034roleRef:
35 kind: Role
Sylvain Desbureaux6f4e8c02021-04-19 15:26:15 +020036 name: {{ $name }}
Sylvain Desbureaux45348812020-05-19 17:46:54 +020037 apiGroup: rbac.authorization.k8s.io
38{{- end }}
Sylvain Desbureaux6f4e8c02021-04-19 15:26:15 +020039