You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 8, 2024. It is now read-only.
So based on above example, the gatekeeper, is going to know that service is allowed to use default policy and {{ name }} policy - which is recognized/translated as real name of the service in the end.
This gonna be a killer feature that makes policy handling much easier and will not require policy reloads.
The text was updated successfully, but these errors were encountered:
And Gatekeeper will attempt to use the task name as the role. However, you still need to make sure the role exists in Vault before launching the task. Unlike policies, trying to create a token with an unknown role will result in an error - meaning the operator still has to do some work before a new task is launched.
Hi,
First of all, thank you for the project.
Idea is to not to maintain the gatekeeper
secret/gatekeeper
whenever new micro-service is being created. And make the defaults like this:
So based on above example, the gatekeeper, is going to know that service is allowed to use default policy and
{{ name }}
policy - which is recognized/translated as real name of the service in the end.This gonna be a killer feature that makes policy handling much easier and will not require policy reloads.
The text was updated successfully, but these errors were encountered: