Files
dsk-devops-toolchains/helm/openebs/charts/nfs-provisioner/templates/clusterrolebinding.yaml
2024-01-03 17:29:11 +09:00

44 lines
1.3 KiB
YAML

---
# Bind the Service Account with the Role Privileges.
{{- if .Values.rbac.create }}
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: {{ include "nfsProvisioner.fullname" . }}
{{- with .Values.nfsProvisioner.annotations }}
annotations: {{ toYaml . | nindent 4 }}
{{- end }}
labels:
{{- include "nfsProvisioner.labels" . | nindent 4 }}
roleRef:
kind: ClusterRole
name: {{ include "nfsProvisioner.fullname" . }}
apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
name: {{ include "nfsProvisioner.serviceAccountName" . }}
namespace: {{ .Release.Namespace }}
{{- if .Values.rbac.pspEnabled }}
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ include "nfsProvisioner.fullname" . }}-psp
{{- with .Values.nfsProvisioner.annotations }}
annotations: {{ toYaml . | nindent 4 }}
{{- end }}
labels:
{{- include "nfsProvisioner.labels" . | nindent 4 }}
roleRef:
kind: ClusterRole
name: {{ include "nfsProvisioner.fullname" . }}-psp
apiGroup: rbac.authorization.k8s.io
subjects:
# Authorize specific service accounts:
- kind: ServiceAccount
name: {{ include "nfsProvisioner.serviceAccountName" . }}
namespace: {{ .Release.Namespace }}
{{- end }}
{{- end }}