HOTFIX 81a73994

in "namespace mode", the controller still needs cluster wide permissions
to monitor all namespaces.
parent 81a73994
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
labels:
app.kubernetes.io/name: {{ template "viking-controller.name" . }}
helm.sh/chart: {{ template "viking-controller.chart" . }}
app.kubernetes.io/managed-by: {{ .Release.Service }}
app.kubernetes.io/instance: {{ .Release.Name }}
name: viking.uplex.de:{{ template "viking-controller.fullname" . }}
rules:
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- list
- watch
{{ if not .Values.vikingController.namespace }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
......@@ -16,4 +15,3 @@ roleRef:
kind: ClusterRole
name: viking.uplex.de:{{ template "viking-controller.fullname" . }}
apiGroup: rbac.authorization.k8s.io
{{- end }}
......@@ -18,7 +18,6 @@ rules:
- services
- endpoints
- secrets
- namespaces
verbs:
- get
- list
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment