{{- if and (hasKey .Values "tls") (hasKey .Values.tls "enabled") .Values.tls.enabled }} # This role binding allows the router to access secrets in the openshift-ingress namespace apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: {{ template "landing.name" . }}-router-tls labels: app: {{ template "landing.name" . }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: ServiceAccount name: router namespace: openshift-ingress # Create a role for our service account to copy secrets to openshift-ingress namespace --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: {{ template "landing.name" . }}-cert-sync labels: app: {{ template "landing.name" . }} rules: - apiGroups: [""] resources: ["secrets"] verbs: ["get", "create", "update", "patch"] # Allow access to secrets in both namespaces resourceNames: ["{{ .Values.tls.secretName }}"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: {{ template "landing.name" . }}-cert-sync labels: app: {{ template "landing.name" . }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: {{ template "landing.name" . }}-cert-sync subjects: - kind: ServiceAccount name: {{ .Values.serviceAccount.name }} namespace: {{ .Release.Namespace }} {{- end }}