54 lines
1.4 KiB
YAML
54 lines
1.4 KiB
YAML
{{ if eq .Values.jenkins.namespace "" }}
|
|
{{- /*
|
|
# This is a special case when .Values.jenkins.namespace is equal to empty
|
|
# string which leads to WATCH_NAMESPACE env of jenkins-operator to be set to
|
|
# empty string and leads to operator actually watching all namespaces. In this
|
|
# case we need to create clusterrole and clusterrolebinding instead of role and
|
|
# rolebinding
|
|
*/ -}}
|
|
---
|
|
kind: ClusterRoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: jenkins-operator
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: jenkins-operator
|
|
namespace: {{ .Release.Namespace }}
|
|
roleRef:
|
|
kind: ClusterRole
|
|
name: jenkins-operator
|
|
apiGroup: rbac.authorization.k8s.io
|
|
{{ else }}
|
|
---
|
|
kind: RoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: jenkins-operator
|
|
namespace: {{ .Release.Namespace }}
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: jenkins-operator
|
|
namespace: {{ .Release.Namespace }}
|
|
roleRef:
|
|
kind: Role
|
|
name: jenkins-operator
|
|
apiGroup: rbac.authorization.k8s.io
|
|
{{ if ne .Release.Namespace .Values.jenkins.namespace }}
|
|
---
|
|
kind: RoleBinding
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
metadata:
|
|
name: jenkins-operator
|
|
namespace: {{ .Values.jenkins.namespace }}
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: jenkins-operator
|
|
namespace: {{ .Release.Namespace }}
|
|
roleRef:
|
|
kind: Role
|
|
name: jenkins-operator
|
|
apiGroup: rbac.authorization.k8s.io
|
|
{{ end }}
|
|
{{ end }}
|