HOTFIX 81a73994

in "namespace mode", the controller still needs cluster wide permissions
to monitor all namespaces.
parent 81a73994
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
labels:
app.kubernetes.io/name: {{ template "viking-controller.name" . }}
helm.sh/chart: {{ template "viking-controller.chart" . }}
app.kubernetes.io/managed-by: {{ .Release.Service }}
app.kubernetes.io/instance: {{ .Release.Name }}
name: viking.uplex.de:{{ template "viking-controller.fullname" . }}
rules:
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- list
- watch
{{ if not .Values.vikingController.namespace }}
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
...@@ -16,4 +15,3 @@ roleRef: ...@@ -16,4 +15,3 @@ roleRef:
kind: ClusterRole kind: ClusterRole
name: viking.uplex.de:{{ template "viking-controller.fullname" . }} name: viking.uplex.de:{{ template "viking-controller.fullname" . }}
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
{{- end }}
...@@ -18,7 +18,6 @@ rules: ...@@ -18,7 +18,6 @@ rules:
- services - services
- endpoints - endpoints
- secrets - secrets
- namespaces
verbs: verbs:
- get - get
- list - list
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment