You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For security reason, we would like to restrict access for the sidecar service-account to get only one named secret with the resourceNames option.
See the following role:
Poorly, the sidecar is using the list_namespaced_secret function here. So it will result in a forbidden response from K8S-API.
Error from server (Forbidden): secrets is forbidden: User "system:serviceaccount:default:sidecar" cannot list resource "secrets" in API group "" in the namespace "default"
We suggest adding functionality to fetch/get only one secret from K8S-API using read_namespaced_secret.
The text was updated successfully, but these errors were encountered:
For security reason, we would like to restrict access for the sidecar service-account to get only one named secret with the
resourceNames
option.See the following role:
Poorly, the sidecar is using the list_namespaced_secret function here. So it will result in a forbidden response from K8S-API.
We suggest adding functionality to fetch/get only one secret from K8S-API using read_namespaced_secret.
The text was updated successfully, but these errors were encountered: