File tree Expand file tree Collapse file tree 2 files changed +5
-0
lines changed Expand file tree Collapse file tree 2 files changed +5
-0
lines changed Original file line number Diff line number Diff line change 15
15
{{- with .Values.rbac.impersonationResourceNames }}
16
16
resourceNames : {{ . | toJson }}
17
17
{{- end }}
18
+ {{- if .Values.rbac.viewSecretsEnabled }}
18
19
# Access to enterprise entitlement
19
20
- apiGroups : [""]
20
21
resources : [ "secrets" ]
26
27
{{- with (or .Values.rbac.viewSecretsResourceNames .Values.rbac.viewSecrets) }}
27
28
resourceNames : {{ . | toJson }}
28
29
{{- end }}
30
+ {{- end }}
29
31
30
32
# The service account needs to read namespaces to know where it can query
31
33
- apiGroups : [ "" ]
Original file line number Diff line number Diff line change 63
63
impersonationResourceNames : []
64
64
# -- Limit the type of principal that can be impersonated
65
65
impersonationResources : ["users", "groups"]
66
+ # -- Specifies whether the service account should have cluster-wide view access to secrets.
67
+ # If enabled, the secrets permitted to read can be limited by name with `viewSecretsResourceNames`.
68
+ viewSecretsEnabled : true
66
69
# -- If non-empty, this limits the secrets that can be accessed by
67
70
# the service account to the specified ones, e.g. `['weave-gitops-enterprise-credentials']`
68
71
viewSecretsResourceNames : ["cluster-user-auth", "oidc-auth"]
You can’t perform that action at this time.
0 commit comments