{{- if and .Values.rbac.enabled .Values.certController.enabled (not .Values.webhook.cert.certManager.enabled) -}} {{ $fullName := include "mariadb-operator.fullname" . }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ $fullName }}-cert-controller rules: - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: {{ $fullName }}-cert-controller rules: - apiGroups: - admissionregistration.k8s.io resources: - validatingwebhookconfigurations - mutatingwebhookconfigurations verbs: - get - list - update - patch - watch - apiGroups: - "" resources: - secrets verbs: - create - list - patch - watch - apiGroups: - "" resources: - endpoints - endpoints/restricted verbs: - get - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ $fullName }}-cert-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: {{ $fullName }}-cert-controller subjects: - kind: ServiceAccount name: {{ include "mariadb-operator-cert-controller.serviceAccountName" . }}-cert-controller namespace: {{ .Release.Namespace }} --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: {{ $fullName }}-cert-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: {{ $fullName }}-cert-controller subjects: - kind: ServiceAccount name: {{ include "mariadb-operator-cert-controller.serviceAccountName" . }}-cert-controller namespace: {{ .Release.Namespace }} {{- end }}