mirror of
https://github.com/kubeshark/kubeshark.git
synced 2025-08-30 16:23:27 +00:00
🛂 Add a new Role
and RoleBinding
resources to have write access for our own Secret
resource (#1416)
* include role and rolebinding to write secrets With this, the kubeshark service-account have rights to update the value of the secrets of the same namespace where kubeshark was deployed. This was necessary to keep the value of the license updated Signed-off-by: Luiz Oliveira <ziuloliveira@gmail.com> * Update helm-chart/templates/02-cluster-role.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> * Update helm-chart/templates/03-cluster-role-binding.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> * Update helm-chart/templates/03-cluster-role-binding.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> * Update helm-chart/templates/03-cluster-role-binding.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> * Update helm-chart/templates/02-cluster-role.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> --------- Signed-off-by: Luiz Oliveira <ziuloliveira@gmail.com> Co-authored-by: M. Mert Yildiran <me@mertyildiran.com>
This commit is contained in:
parent
1ccaa03fb2
commit
64aae06fe5
@ -24,3 +24,28 @@ rules:
|
|||||||
- list
|
- list
|
||||||
- get
|
- get
|
||||||
- watch
|
- watch
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
{{- include "kubeshark.labels" . | nindent 4 }}
|
||||||
|
annotations:
|
||||||
|
{{- if .Values.tap.annotations }}
|
||||||
|
{{- toYaml .Values.tap.annotations | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
name: kubeshark-self-secrets-role
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- "v1"
|
||||||
|
- ""
|
||||||
|
resourceNames:
|
||||||
|
- kubeshark-secret
|
||||||
|
resources:
|
||||||
|
- secrets
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- watch
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
@ -18,3 +18,23 @@ subjects:
|
|||||||
- kind: ServiceAccount
|
- kind: ServiceAccount
|
||||||
name: {{ include "kubeshark.serviceAccountName" . }}
|
name: {{ include "kubeshark.serviceAccountName" . }}
|
||||||
namespace: {{ .Release.Namespace }}
|
namespace: {{ .Release.Namespace }}
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
name: kubeshark-self-secrets-role-binding
|
||||||
|
labels:
|
||||||
|
{{- include "kubeshark.labels" . | nindent 4 }}
|
||||||
|
annotations:
|
||||||
|
{{- if .Values.tap.annotations }}
|
||||||
|
{{- toYaml .Values.tap.annotations | nindent 4 }}
|
||||||
|
{{- end }}
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: {{ include "kubeshark.serviceAccountName" . }}
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
roleRef:
|
||||||
|
kind: Role
|
||||||
|
name: kubeshark-self-secrets-role
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
Loading…
Reference in New Issue
Block a user