You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the solution you'd like
[A clear and concise description of what you want to happen.]
Use case: As a regular namespace user I would like to track the binding between a pod and SecretProviderClass (SecretProviderClassPodStatus). Access to the status resource currently requires cluster-admin role or custom RBAC. I think secrets-store-csi-driver should by default allow view access to aggregates cluster roles: view, edit, admin and cluster-reader.
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Aggregated cluster roles for SecretProviderClass were added in #836, but I don't understand why this wasn't fixed for SecretProviderClassPodStatus at the same time....
Environment:
Secrets Store CSI Driver version: (use the image tag): N/A
Kubernetes version: (use kubectl version): N/A
The text was updated successfully, but these errors were encountered:
Describe the solution you'd like
[A clear and concise description of what you want to happen.]
Use case: As a regular namespace user I would like to track the binding between a pod and
SecretProviderClass
(SecretProviderClassPodStatus
). Access to the status resource currently requires cluster-admin role or custom RBAC. I think secrets-store-csi-driver should by default allow view access to aggregates cluster roles: view, edit, admin and cluster-reader.Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Aggregated cluster roles for
SecretProviderClass
were added in #836, but I don't understand why this wasn't fixed forSecretProviderClassPodStatus
at the same time....Environment:
kubectl version
): N/AThe text was updated successfully, but these errors were encountered: