37
37
- apiGroups : ["helm.fluxcd.io"]
38
38
resources : ["helmreleases"]
39
39
verbs : ["get", "list", "watch", "create", "update", "patch", "delete"]
40
-
40
+ - apiGroups : ["bitnami.com"]
41
+ resources : ["sealedsecrets"]
42
+ verbs : ["get", "list", "watch", "create", "update", "patch", "delete"]
41
43
42
44
---
43
45
@@ -54,3 +56,33 @@ roleRef:
54
56
apiGroup : rbac.authorization.k8s.io
55
57
kind : Role
56
58
name : deployment-admin
59
+
60
+ ---
61
+
62
+ kind : ClusterRole
63
+ apiVersion : rbac.authorization.k8s.io/v1
64
+ metadata :
65
+ name : sealed-secrets-access
66
+ rules :
67
+ - apiGroups : [""]
68
+ resources : ["services"]
69
+ verbs : ["get"]
70
+ resourceNames : ["sealed-secrets-controller"]
71
+ - apiGroups : ["bitnami.com"]
72
+ resources : ["sealedsecrets"]
73
+ verbs : ["get", "list", "watch", "create", "update", "patch", "delete"]
74
+
75
+ ---
76
+
77
+ kind : ClusterRoleBinding
78
+ apiVersion : rbac.authorization.k8s.io/v1
79
+ metadata :
80
+ name : sealed-secrets-access-choose-native-plants
81
+ subjects :
82
+ - kind : ServiceAccount
83
+ name : deployment-admin
84
+ namespace : choose-native-plants
85
+ roleRef :
86
+ apiGroup : rbac.authorization.k8s.io
87
+ kind : ClusterRole
88
+ name : sealed-secrets-access
0 commit comments