Skip to content
This repository has been archived by the owner on Aug 25, 2021. It is now read-only.

If enablePodSecurityPolicies is set to false, ClusterRole fails validation #173

Closed
skj-dev opened this issue May 23, 2019 · 4 comments
Closed

Comments

@skj-dev
Copy link
Contributor

skj-dev commented May 23, 2019

The default value of enablePodSecurityPolicies is false. That value is placed above the rules: section in server-clusterrole.yaml, which causes a broken ClusterRole resource to be described because the rules: section is mandatory.

The chart kicks out with:

Error: validation failed: error validating "": error validating data: ValidationError(ClusterRole): missing required field "rules" in io.k8s.api.rbac.v1.ClusterRole

unless enablePodSecurityPolicies is set to true.

@EDGsheryl
Copy link

EDGsheryl commented May 26, 2019

I have encountered the same situation. It seems like that helm-v2.14.0 caused this problem.

when I revert my helm to v2.13.0, the helm works.

I supposed that rules: should be set null but I failed. So I downgraded my helm =A=.....

@adilyse
Copy link
Contributor

adilyse commented May 31, 2019

Hi, thanks for reporting this issue! Since this appears to be related to the Helm version issue also reported in #178, I'm going to close so there isn't a duplicate. Please feel free to track the status of the issue there.

@adilyse adilyse closed this as completed May 31, 2019
@diegopaludo
Copy link

Hi,
I have encountered the same situation. :(
I solved it by upgrading to version v2.14.1 of helm

@dignajar
Copy link

dignajar commented Jun 18, 2019

Perfect, thanks!

For users with Mac OS and installed via Helm via Brew.

brew upgrade kubernetes-helm
helm init --service-account tiller --upgrade

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants