apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: {} labels: name: sealed-secrets-service-proxier name: sealed-secrets-service-proxier namespace: kube-system rules: - apiGroups: - "" resourceNames: - sealed-secrets-controller resources: - services verbs: - get - apiGroups: - "" resourceNames: - 'http:sealed-secrets-controller:' - sealed-secrets-controller resources: - services/proxy verbs: - create - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: {} labels: name: sealed-secrets-key-admin name: sealed-secrets-key-admin namespace: kube-system rules: - apiGroups: - "" resources: - secrets verbs: - create - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: {} labels: name: sealed-secrets-controller name: sealed-secrets-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: secrets-unsealer subjects: - kind: ServiceAccount name: sealed-secrets-controller namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: {} labels: name: secrets-unsealer name: secrets-unsealer rules: - apiGroups: - bitnami.com resources: - sealedsecrets verbs: - get - list - watch - apiGroups: - bitnami.com resources: - sealedsecrets/status verbs: - update - apiGroups: - "" resources: - secrets verbs: - get - list - create - update - delete - apiGroups: - "" resources: - events verbs: - create - patch --- apiVersion: v1 kind: ServiceAccount metadata: annotations: {} labels: name: sealed-secrets-controller name: sealed-secrets-controller namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: {} labels: name: sealed-secrets-service-proxier name: sealed-secrets-service-proxier namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: sealed-secrets-service-proxier subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: {} labels: name: sealed-secrets-controller name: sealed-secrets-controller namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: sealed-secrets-key-admin subjects: - kind: ServiceAccount name: sealed-secrets-controller namespace: kube-system