{{- if .Values.serviceAccount.controller.create }} apiVersion: v1 kind: ServiceAccount metadata: name: {{ include "aws-efs-csi-driver.serviceAccountName" . }} labels: app.kubernetes.io/name: {{ include "aws-efs-csi-driver.name" . }} {{- with .Values.serviceAccount.controller.annotations }} annotations: {{- toYaml . | nindent 4 }} {{- end }} {{- end }} --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: efs-csi-external-provisioner-role labels: app.kubernetes.io/name: {{ include "aws-efs-csi-driver.name" . }} rules: - apiGroups: [""] resources: ["persistentvolumes"] verbs: ["get", "list", "watch", "create", "delete"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["get", "list", "watch", "update"] - apiGroups: ["storage.k8s.io"] resources: ["storageclasses"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["events"] verbs: ["list", "watch", "create"] - apiGroups: ["storage.k8s.io"] resources: ["csinodes"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["nodes"] verbs: ["get", "list", "watch"] - apiGroups: ["coordination.k8s.io"] resources: ["leases"] verbs: ["get", "watch", "list", "delete", "update", "create"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: efs-csi-provisioner-binding labels: app.kubernetes.io/name: {{ include "aws-efs-csi-driver.name" . }} subjects: - kind: ServiceAccount name: {{ include "aws-efs-csi-driver.serviceAccountName" . }} namespace: {{ .Release.Namespace }} roleRef: kind: ClusterRole name: efs-csi-external-provisioner-role apiGroup: rbac.authorization.k8s.io