{{- if .Values.serviceAccount.jivaOperator.create -}} apiVersion: v1 kind: ServiceAccount metadata: name: {{ .Values.serviceAccount.jivaOperator.name }} labels: {{- include "jiva.common.metaLabels" . | nindent 4 }} {{- with .Values.serviceAccount.annotations }} annotations: {{- toYaml . | nindent 4 }} {{- end }} {{- end }} {{- if .Values.rbac.create }} --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: jiva-operator rules: - apiGroups: - "" resources: - pods - services - services/finalizers - endpoints - persistentvolumes - persistentvolumeclaims - events - configmaps - secrets verbs: - '*' - apiGroups: - apps resources: - deployments - daemonsets - replicasets - statefulsets verbs: - '*' - apiGroups: - monitoring.coreos.com resources: - servicemonitors verbs: - get - create - apiGroups: - apps resourceNames: - jiva-operator resources: - deployments/finalizers verbs: - update - apiGroups: - "" resources: - nodes verbs: - get - list - watch - apiGroups: - apps resources: - replicasets verbs: - get - apiGroups: - policy resources: - poddisruptionbudgets verbs: - '*' - apiGroups: - openebs.io resources: - '*' verbs: - '*' --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: openebs-jiva-operator {{- with .Values.serviceAccount.annotations }} annotations: {{ toYaml . | nindent 4 }} {{- end }} labels: {{- include "jiva.common.metaLabels" . | nindent 4 }} subjects: - kind: ServiceAccount name: {{ .Values.serviceAccount.jivaOperator.name }} namespace: {{ .Release.Namespace }} roleRef: kind: ClusterRole name: jiva-operator apiGroup: rbac.authorization.k8s.io {{- end }}