You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
While the ClusterRole is set up properly, the standard Role doesn't have permissions to access the CRD. Thus setting rbac.clusterRole: "false" results in permission errors:
E0313 00:46:07.142403 1 reflector.go:123] pkg/mod/k8s.io/[email protected]/tools/cache/reflector.go:96: Failed to list *v1alpha1.BasicAuth: basicauths.secretgenerator.mittwald.de is forbidden: User "system:serviceaccount:defaultkubernetes-secret-generator" cannot list resource "basicauths" in API group "secretgenerator.mittwald.de" in the namespace "default"
There has not been any activity to this issue in the last 30 days. It will automatically be closed after 7 more days. Remove the stale label to prevent this.
Describe the bug
While the ClusterRole is set up properly, the standard Role doesn't have permissions to access the CRD. Thus setting
rbac.clusterRole: "false"
results in permission errors:To Reproduce
helm install kubernetes-secret-generator mittwald/kubernetes-secret-generator --set rbac.clusterRole='"false"'
Expected behavior
I expect it to work when
clusterRole
is not enabled.Environment:
Additional context
Awesome chart 🥂
The text was updated successfully, but these errors were encountered: