11{{- if not (eq .Values.enabled "plumbing") }}
22{{/* This is always defined as we always unseal the cluster with an imperative job */}}
3+ {{- if $.Values.clusterGroup.imperative.serviceAccountCreate -}}
34---
45apiVersion : rbac.authorization.k8s.io/v1
56kind : ClusterRoleBinding
67metadata :
7- name : {{ $.Values.clusterGroup.imperative.namespace }}-cluster-admin- rolebinding
8+ name : {{ $.Values.clusterGroup.imperative.namespace }}-cluster-rolebinding
89roleRef :
910 apiGroup : rbac.authorization.k8s.io
1011 kind : ClusterRole
@@ -17,7 +18,7 @@ subjects:
1718apiVersion : rbac.authorization.k8s.io/v1
1819kind : RoleBinding
1920metadata :
20- name : {{ $.Values.clusterGroup.imperative.namespace }}-admin- rolebinding
21+ name : {{ $.Values.clusterGroup.imperative.namespace }}-rolebinding
2122 namespace : {{ $.Values.clusterGroup.imperative.namespace }}
2223roleRef :
2324 apiGroup : rbac.authorization.k8s.io
@@ -28,3 +29,19 @@ subjects:
2829 name : {{ $.Values.clusterGroup.imperative.serviceAccountName }}
2930 namespace : {{ $.Values.clusterGroup.imperative.namespace }}
3031{{- end }}
32+ {{- if $.Values.clusterGroup.imperative.adminServiceAccountCreate }}
33+ ---
34+ apiVersion : rbac.authorization.k8s.io/v1
35+ kind : ClusterRoleBinding
36+ metadata :
37+ name : {{ $.Values.clusterGroup.imperative.namespace }}-admin-clusterrolebinding
38+ roleRef :
39+ apiGroup : rbac.authorization.k8s.io
40+ kind : ClusterRole
41+ name : {{ $.Values.clusterGroup.imperative.adminClusterRoleName }}
42+ subjects :
43+ - kind : ServiceAccount
44+ name : {{ $.Values.clusterGroup.imperative.adminServiceAccountName }}
45+ namespace : {{ $.Values.clusterGroup.imperative.namespace }}
46+ {{- end }}
47+ {{- end }}
0 commit comments