1765e62acb
Using this readonly ServiceAccount enables plugins to use a Kubernetes client with different permissions than the Sonobuoy ServiceAccount, which has full permissions on the cluster. This ServiceAccount enables get/list/watch on all resource types in all API groups. The reason the secret is used to mount the service account token because there is not a way to specify a service account from just a container spec [1]. Sonobuoy doesn't provide access to the pod spec for plugins, so we are limited to the container spec. [1] https://github.com/kubernetes/kubernetes/issues/66020 Change-Id: I69aeaaedf1fb7672f7167c83b220cf6abb890cb5 |
||
---|---|---|
artifactory | ||
mini-mirror | ||
ranger | ||
ranger-agent | ||
shaker | ||
sonobuoy | ||
tools/gate | ||
.gitignore | ||
.gitreview | ||
.zuul.yaml | ||
CONTRIBUTING.rst | ||
LICENSE | ||
Makefile | ||
README.rst |
README.rst
Openstack-Helm-Addons
Mission
The goal of OpenStack-Helm-Addons is to provide charts for services to enhance or provide additional features for the charts in OpenStack-Helm.
For more information, please refer to the OpenStack-Helm repository.
Communication
- Join us on Slack - #openstack-helm
- Join us on IRC: #openstack-helm on freenode
- Community IRC Meetings: [Every Tuesday @ 3PM UTC], #openstack-meeting-5 on freenode
- Meeting Agenda Items: Agenda
Launchpad
Bugs and blueprints are tracked via OpenStack-Helm's Launchpad. Any bugs or blueprints filed in the OpenStack-Helm-Addons Launchpad will be closed and requests will be made to file them in the appropriate location.