-
Story
-
Resolution: Done
-
Normal
-
None
-
None
-
None
To give the new job access to modifying secrets, we'll need to create an RBAC role, this might be a starting point:
kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: <role-name> namespace: <namespace> rules: - apiGroups: [""] resources: - secrets verbs: - 'delete' - 'create' - 'patch' - 'get' --- kind: ServiceAccount apiVersion: v1 metadata: name: <service-account> namespace: <namespace> --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1beta1 metadata: name: <role-binding> namespace: <namespace> subjects: - kind: ServiceAccount name: <service-account> namespace: <namespace> roleRef: kind: Role name: <role-name> apiGroup: ""
- is depended on by
-
OSPRH-9309 Fernet key rotation - operator implementation
-
- Closed
-