Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: use cluster role for access to secrets #48

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

JasonLiuPHR
Copy link

@JasonLiuPHR JasonLiuPHR commented Feb 11, 2025

When using checkUpstream with authSecretName the controller errors spits out an error with
pkg/mod/k8s.io/[email protected]/tools/cache/reflector.go:232: failed to list *v1.Secret: secrets is forbidden: User "system:serviceaccount:harbor-container-webhook:harbor-container-webhook" cannot list resource "secrets" in API group "" at the cluster scope

This addresses it by granting cluster wide secret access to the service account.

Fixes #33

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Cluster scope access needed for secrets when checkUpstream is true
1 participant