71 lines
2.3 KiB
YAML
71 lines
2.3 KiB
YAML
# Source: cert-manager/templates/cainjector-rbac.yaml
|
|
# leader election rules
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: cert-manager-cainjector:leaderelection
|
|
namespace: kube-system
|
|
labels:
|
|
app: cainjector
|
|
app.kubernetes.io/name: cainjector
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "cainjector"
|
|
app.kubernetes.io/version: "v1.9.1"
|
|
rules:
|
|
# Used for leader election by the controller
|
|
# cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
|
|
# see cmd/cainjector/start.go#L113
|
|
# cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller
|
|
# see cmd/cainjector/start.go#L137
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resources: ["leases"]
|
|
resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"]
|
|
verbs: ["get", "update", "patch"]
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resources: ["leases"]
|
|
verbs: ["create"]
|
|
---
|
|
# Source: cert-manager/templates/rbac.yaml
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: cert-manager:leaderelection
|
|
namespace: kube-system
|
|
labels:
|
|
app: cert-manager
|
|
app.kubernetes.io/name: cert-manager
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "controller"
|
|
app.kubernetes.io/version: "v1.9.1"
|
|
rules:
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resources: ["leases"]
|
|
resourceNames: ["cert-manager-controller"]
|
|
verbs: ["get", "update", "patch"]
|
|
- apiGroups: ["coordination.k8s.io"]
|
|
resources: ["leases"]
|
|
verbs: ["create"]
|
|
---
|
|
# Source: cert-manager/templates/webhook-rbac.yaml
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: Role
|
|
metadata:
|
|
name: cert-manager-webhook:dynamic-serving
|
|
namespace: cert-manager
|
|
labels:
|
|
app: webhook
|
|
app.kubernetes.io/name: webhook
|
|
app.kubernetes.io/instance: cert-manager
|
|
app.kubernetes.io/component: "webhook"
|
|
app.kubernetes.io/version: "v1.9.1"
|
|
rules:
|
|
- apiGroups: [""]
|
|
resources: ["secrets"]
|
|
resourceNames:
|
|
- 'cert-manager-webhook-ca'
|
|
verbs: ["get", "list", "watch", "update"]
|
|
# It's not possible to grant CREATE permission on a single resourceName.
|
|
- apiGroups: [""]
|
|
resources: ["secrets"]
|
|
verbs: ["create"]
|