3737- apiGroups : ["helm.fluxcd.io"]
3838 resources : ["helmreleases"]
3939 verbs : ["get", "list", "watch", "create", "update", "patch", "delete"]
40-
40+ - apiGroups : ["bitnami.com"]
41+ resources : ["sealedsecrets"]
42+ verbs : ["get", "list", "watch", "create", "update", "patch", "delete"]
4143
4244---
4345
@@ -54,3 +56,33 @@ roleRef:
5456 apiGroup : rbac.authorization.k8s.io
5557 kind : Role
5658 name : deployment-admin
59+
60+ ---
61+
62+ kind : ClusterRole
63+ apiVersion : rbac.authorization.k8s.io/v1
64+ metadata :
65+ name : sealed-secrets-access
66+ rules :
67+ - apiGroups : [""]
68+ resources : ["services"]
69+ verbs : ["get"]
70+ resourceNames : ["sealed-secrets-controller"]
71+ - apiGroups : ["bitnami.com"]
72+ resources : ["sealedsecrets"]
73+ verbs : ["get", "list", "watch", "create", "update", "patch", "delete"]
74+
75+ ---
76+
77+ kind : ClusterRoleBinding
78+ apiVersion : rbac.authorization.k8s.io/v1
79+ metadata :
80+ name : sealed-secrets-access-choose-native-plants
81+ subjects :
82+ - kind : ServiceAccount
83+ name : deployment-admin
84+ namespace : choose-native-plants
85+ roleRef :
86+ apiGroup : rbac.authorization.k8s.io
87+ kind : ClusterRole
88+ name : sealed-secrets-access
0 commit comments