mirror of
https://github.com/Infisical/infisical.git
synced 2026-01-09 15:38:03 -05:00
rbac fix
This commit is contained in:
@@ -13,9 +13,9 @@ type: application
|
|||||||
# This is the chart version. This version number should be incremented each time you make changes
|
# This is the chart version. This version number should be incremented each time you make changes
|
||||||
# to the chart and its templates, including the app version.
|
# to the chart and its templates, including the app version.
|
||||||
# Versions are expected to follow Semantic Versioning (https://semver.org/)
|
# Versions are expected to follow Semantic Versioning (https://semver.org/)
|
||||||
version: v0.10.2
|
version: v0.10.3
|
||||||
# This is the version number of the application being deployed. This version number should be
|
# This is the version number of the application being deployed. This version number should be
|
||||||
# incremented each time you make changes to the application. Versions are not expected to
|
# incremented each time you make changes to the application. Versions are not expected to
|
||||||
# follow Semantic Versioning. They should reflect the version the application is using.
|
# follow Semantic Versioning. They should reflect the version the application is using.
|
||||||
# It is recommended to use it with quotes.
|
# It is recommended to use it with quotes.
|
||||||
appVersion: "v0.10.2"
|
appVersion: "v0.10.3"
|
||||||
|
|||||||
@@ -1,49 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-admin-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicaldynamicsecrets
|
|
||||||
verbs:
|
|
||||||
- '*'
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicaldynamicsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-admin-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-admin-role'
|
|
||||||
@@ -1,55 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-editor-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicaldynamicsecrets
|
|
||||||
verbs:
|
|
||||||
- create
|
|
||||||
- delete
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- patch
|
|
||||||
- update
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicaldynamicsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-editor-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-editor-role'
|
|
||||||
@@ -1,51 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-viewer-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicaldynamicsecrets
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicaldynamicsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-viewer-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicaldynamicsecret-viewer-role'
|
|
||||||
@@ -1,49 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-admin-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalpushsecretsecrets
|
|
||||||
verbs:
|
|
||||||
- '*'
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalpushsecretsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-admin-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-admin-role'
|
|
||||||
@@ -1,55 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-editor-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalpushsecretsecrets
|
|
||||||
verbs:
|
|
||||||
- create
|
|
||||||
- delete
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- patch
|
|
||||||
- update
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalpushsecretsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-editor-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-editor-role'
|
|
||||||
@@ -1,51 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-viewer-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalpushsecretsecrets
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalpushsecretsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-viewer-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicalpushsecretsecret-viewer-role'
|
|
||||||
@@ -1,49 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalsecret-admin-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalsecrets
|
|
||||||
verbs:
|
|
||||||
- '*'
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalsecret-admin-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicalsecret-admin-role'
|
|
||||||
@@ -1,55 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalsecret-editor-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalsecrets
|
|
||||||
verbs:
|
|
||||||
- create
|
|
||||||
- delete
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- patch
|
|
||||||
- update
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalsecret-editor-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicalsecret-editor-role'
|
|
||||||
@@ -1,51 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalsecret-viewer-role
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalsecrets
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- secrets.infisical.com
|
|
||||||
resources:
|
|
||||||
- infisicalsecrets/status
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: RoleBinding
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
{{- end }}
|
|
||||||
metadata:
|
|
||||||
name: {{ include "secrets-operator.fullname" . }}-infisicalsecret-viewer-rolebinding
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
namespace: {{ .Values.scopedNamespace | quote }}
|
|
||||||
{{- end }}
|
|
||||||
labels:
|
|
||||||
|
|
||||||
{{- include "secrets-operator.labels" . | nindent 4 }}
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
{{- if and .Values.scopedNamespace .Values.scopedRBAC }}
|
|
||||||
kind: Role
|
|
||||||
{{- else }}
|
|
||||||
kind: ClusterRole
|
|
||||||
{{- end }}
|
|
||||||
name: '{{ include "secrets-operator.fullname" . }}-infisicalsecret-viewer-role'
|
|
||||||
@@ -12,7 +12,7 @@ controllerManager:
|
|||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
image:
|
image:
|
||||||
repository: infisical/kubernetes-operator
|
repository: infisical/kubernetes-operator
|
||||||
tag: v0.10.2
|
tag: v0.10.3
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
cpu: 500m
|
cpu: 500m
|
||||||
|
|||||||
@@ -24,7 +24,7 @@ resources:
|
|||||||
controller: true
|
controller: true
|
||||||
domain: infisical.com
|
domain: infisical.com
|
||||||
group: secrets
|
group: secrets
|
||||||
kind: InfisicalPushSecretSecret
|
kind: InfisicalPushSecret
|
||||||
path: github.com/Infisical/infisical/k8-operator/api/v1alpha1
|
path: github.com/Infisical/infisical/k8-operator/api/v1alpha1
|
||||||
version: v1alpha1
|
version: v1alpha1
|
||||||
- api:
|
- api:
|
||||||
|
|||||||
@@ -16,7 +16,7 @@ type InfisicalPushSecretDestination struct {
|
|||||||
ProjectID string `json:"projectId"`
|
ProjectID string `json:"projectId"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type InfisicalPushSecretSecretSource struct {
|
type InfisicalPushSecretSource struct {
|
||||||
// The name of the Kubernetes Secret
|
// The name of the Kubernetes Secret
|
||||||
// +kubebuilder:validation:Required
|
// +kubebuilder:validation:Required
|
||||||
SecretName string `json:"secretName"`
|
SecretName string `json:"secretName"`
|
||||||
@@ -48,7 +48,7 @@ type SecretPushGenerator struct {
|
|||||||
|
|
||||||
type SecretPush struct {
|
type SecretPush struct {
|
||||||
// +kubebuilder:validation:Optional
|
// +kubebuilder:validation:Optional
|
||||||
Secret *InfisicalPushSecretSecretSource `json:"secret,omitempty"`
|
Secret *InfisicalPushSecretSource `json:"secret,omitempty"`
|
||||||
// +kubebuilder:validation:Optional
|
// +kubebuilder:validation:Optional
|
||||||
Generators []SecretPushGenerator `json:"generators,omitempty"`
|
Generators []SecretPushGenerator `json:"generators,omitempty"`
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,13 +22,13 @@ resources:
|
|||||||
# default, aiding admins in cluster management. Those roles are
|
# default, aiding admins in cluster management. Those roles are
|
||||||
# not used by the k8-operator itself. You can comment the following lines
|
# not used by the k8-operator itself. You can comment the following lines
|
||||||
# if you do not want those helpers be installed with your Project.
|
# if you do not want those helpers be installed with your Project.
|
||||||
- infisicaldynamicsecret_admin_role.yaml
|
# - infisicaldynamicsecret_admin_role.yaml
|
||||||
- infisicaldynamicsecret_editor_role.yaml
|
# - infisicaldynamicsecret_editor_role.yaml
|
||||||
- infisicaldynamicsecret_viewer_role.yaml
|
# - infisicaldynamicsecret_viewer_role.yaml
|
||||||
- infisicalpushsecretsecret_admin_role.yaml
|
# - infisicalpushsecret_admin_role.yaml
|
||||||
- infisicalpushsecretsecret_editor_role.yaml
|
# - infisicalpushsecret_editor_role.yaml
|
||||||
- infisicalpushsecretsecret_viewer_role.yaml
|
# - infisicalpushsecret_viewer_role.yaml
|
||||||
- infisicalsecret_admin_role.yaml
|
# - infisicalsecret_admin_role.yaml
|
||||||
- infisicalsecret_editor_role.yaml
|
# - infisicalsecret_editor_role.yaml
|
||||||
- infisicalsecret_viewer_role.yaml
|
# - infisicalsecret_viewer_role.yaml
|
||||||
|
|
||||||
|
|||||||
@@ -42,7 +42,7 @@ import (
|
|||||||
"github.com/go-logr/logr"
|
"github.com/go-logr/logr"
|
||||||
)
|
)
|
||||||
|
|
||||||
// InfisicalPushSecretReconciler reconciles a InfisicalPushSecretSecret object
|
// InfisicalPushSecretReconciler reconciles a InfisicalPushSecret object
|
||||||
type InfisicalPushSecretReconciler struct {
|
type InfisicalPushSecretReconciler struct {
|
||||||
client.Client
|
client.Client
|
||||||
BaseLogger logr.Logger
|
BaseLogger logr.Logger
|
||||||
|
|||||||
@@ -30,7 +30,7 @@ import (
|
|||||||
secretsv1alpha1 "github.com/Infisical/infisical/k8-operator/api/v1alpha1"
|
secretsv1alpha1 "github.com/Infisical/infisical/k8-operator/api/v1alpha1"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = Describe("InfisicalPushSecretSecret Controller", func() {
|
var _ = Describe("InfisicalPushSecret Controller", func() {
|
||||||
Context("When reconciling a resource", func() {
|
Context("When reconciling a resource", func() {
|
||||||
const resourceName = "test-resource"
|
const resourceName = "test-resource"
|
||||||
|
|
||||||
@@ -40,11 +40,11 @@ var _ = Describe("InfisicalPushSecretSecret Controller", func() {
|
|||||||
Name: resourceName,
|
Name: resourceName,
|
||||||
Namespace: "default", // TODO(user):Modify as needed
|
Namespace: "default", // TODO(user):Modify as needed
|
||||||
}
|
}
|
||||||
infisicalpushsecretsecret := &secretsv1alpha1.InfisicalPushSecret{}
|
infisicalpushsecret := &secretsv1alpha1.InfisicalPushSecret{}
|
||||||
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
By("creating the custom resource for the Kind InfisicalPushSecretSecret")
|
By("creating the custom resource for the Kind InfisicalPushSecret")
|
||||||
err := k8sClient.Get(ctx, typeNamespacedName, infisicalpushsecretsecret)
|
err := k8sClient.Get(ctx, typeNamespacedName, infisicalpushsecret)
|
||||||
if err != nil && errors.IsNotFound(err) {
|
if err != nil && errors.IsNotFound(err) {
|
||||||
resource := &secretsv1alpha1.InfisicalPushSecret{
|
resource := &secretsv1alpha1.InfisicalPushSecret{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
@@ -63,7 +63,7 @@ var _ = Describe("InfisicalPushSecretSecret Controller", func() {
|
|||||||
err := k8sClient.Get(ctx, typeNamespacedName, resource)
|
err := k8sClient.Get(ctx, typeNamespacedName, resource)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
By("Cleanup the specific resource instance InfisicalPushSecretSecret")
|
By("Cleanup the specific resource instance InfisicalPushSecret")
|
||||||
Expect(k8sClient.Delete(ctx, resource)).To(Succeed())
|
Expect(k8sClient.Delete(ctx, resource)).To(Succeed())
|
||||||
})
|
})
|
||||||
It("should successfully reconcile the resource", func() {
|
It("should successfully reconcile the resource", func() {
|
||||||
|
|||||||
Reference in New Issue
Block a user