we need to create role/binding in rgw namespace, but give access to the service account which is part of namespace of elastic Change-Id: I17961315db7453246c45849cb731a818781531ce Signed-off-by: Alexey Odinokov <aodinokov@mirantis.com>
16 lines
950 B
YAML
16 lines
950 B
YAML
---
|
|
helm-toolkit:
|
|
- |
|
|
Corrected helm-toolkit.snippets.kubernetes_pod_rbac_serviceaccount to
|
|
cover the case when service account must have access to endpoint in
|
|
different namespace. In that case Role/Binding are getting created
|
|
in that endpoint namespace, but now rolebinding will be point to
|
|
the service account in the original namespace, which is $.Release.Namespace.
|
|
This was tested with elasticsearch chart where
|
|
s3.clients.local-rgw-elasticsearch.settings.endpoint was pointing to
|
|
another namespace. With whose changes job-s3-user was able to detect
|
|
availability of that enpoint. Before changes init container had this error in the logs:
|
|
Resolving dependency Service rook-ceph-rgw-default in namespace ceph failed: endpoints "rook-ceph-rgw-default" is forbidden: User
|
|
"system:serviceaccount:osh-infra:elasticsearch-s3-user" cannot get resource "endpoints" in API group "" in the namespace "ceph"
|
|
...
|