-
Notifications
You must be signed in to change notification settings - Fork 297
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
helm: additional cluster roles for secretproviderclasses #836
helm: additional cluster roles for secretproviderclasses #836
Conversation
Welcome @anapsix! |
Hi @anapsix. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
98bf1f1
to
cae278f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@anapsix Thank you for the PR.
Please update the yamls in the manifest_staging/ folder, where we host the staging charts and deployment yamls. All the yaml changes will then be promoted into the released charts folder (charts/
) with the next release.
/retitle helm: additional cluster roles for secretproviderclasses |
I believe I did @aramase. Please clarify if I should remove changes to manifest templates in |
that's right! the changes are only made in |
Adding Admin and Viewer cluster roles, aggregaring to default "admin" and "view" ClusterRoles.
cae278f
to
e359b31
Compare
Roger that, @aramase. Thanks for the clarification. Done. |
/ok-to-test |
I think this is good but we'd probably also want to add something for the /lgtm |
@tam7t, added the new ClusterRoles to the |
Also, should I add the manifests to run kubectl get clusterrole/secretproviderclasses-admin-role
assert_success
run kubectl get clusterrole/secretproviderclasses-viewer-role
assert_success |
Thanks! And yeah adding a case for |
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: anapsix, aramase The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/label tide/merge-method-squash |
eh.. too late, @tam7t .. sorry I didn't make in time before the merge |
Adding simple tests to verify the new aggregation roles are applied
* adding naive tests as folllow-up to #836 Adding simple tests to verify the new aggregation roles are applied * remove extra manifests, install new roles in e2e-deploy-manifest
What this PR does / why we need it:
At the moment, there are no ClusterRoles created for SecretProviderClasses resources with aggregation to view and admin default roles. This prevents ClusterRole/admin and ClusterRole/view from accessing SecretProviderClasses resources.
Which issue(s) this PR fixes:
Fixes #835