mirror of
https://github.com/kubeshark/kubeshark.git
synced 2025-08-30 16:23:27 +00:00
🛂 Add a new Role
and RoleBinding
resources to have write access for our own Secret
resource (#1416)
* include role and rolebinding to write secrets With this, the kubeshark service-account have rights to update the value of the secrets of the same namespace where kubeshark was deployed. This was necessary to keep the value of the license updated Signed-off-by: Luiz Oliveira <ziuloliveira@gmail.com> * Update helm-chart/templates/02-cluster-role.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> * Update helm-chart/templates/03-cluster-role-binding.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> * Update helm-chart/templates/03-cluster-role-binding.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> * Update helm-chart/templates/03-cluster-role-binding.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> * Update helm-chart/templates/02-cluster-role.yaml Co-authored-by: M. Mert Yildiran <me@mertyildiran.com> --------- Signed-off-by: Luiz Oliveira <ziuloliveira@gmail.com> Co-authored-by: M. Mert Yildiran <me@mertyildiran.com>
This commit is contained in:
parent
1ccaa03fb2
commit
64aae06fe5
@ -24,3 +24,28 @@ rules:
|
||||
- list
|
||||
- get
|
||||
- watch
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
labels:
|
||||
{{- include "kubeshark.labels" . | nindent 4 }}
|
||||
annotations:
|
||||
{{- if .Values.tap.annotations }}
|
||||
{{- toYaml .Values.tap.annotations | nindent 4 }}
|
||||
{{- end }}
|
||||
name: kubeshark-self-secrets-role
|
||||
namespace: {{ .Release.Namespace }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- "v1"
|
||||
- ""
|
||||
resourceNames:
|
||||
- kubeshark-secret
|
||||
resources:
|
||||
- secrets
|
||||
verbs:
|
||||
- get
|
||||
- watch
|
||||
- update
|
||||
- patch
|
||||
|
@ -18,3 +18,23 @@ subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ include "kubeshark.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: kubeshark-self-secrets-role-binding
|
||||
labels:
|
||||
{{- include "kubeshark.labels" . | nindent 4 }}
|
||||
annotations:
|
||||
{{- if .Values.tap.annotations }}
|
||||
{{- toYaml .Values.tap.annotations | nindent 4 }}
|
||||
{{- end }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ include "kubeshark.serviceAccountName" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
roleRef:
|
||||
kind: Role
|
||||
name: kubeshark-self-secrets-role
|
||||
apiGroup: rbac.authorization.k8s.io
|
Loading…
Reference in New Issue
Block a user