Closed glenndehaan closed 1 year ago
Hey @glenndehaan,
thanks for submitting the issue! I will take a look now and will update this issue as soon as I have the solution ready!
So I did find somewhat of a solution. I created the following manifests to allow the service account to read the configmaps and secrets:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: node-red-role
rules:
- apiGroups: [""]
resources: ["configmaps", "secrets"]
verbs: ["get", "watch", "list"]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: node-red-rolebinding
roleRef:
kind: ClusterRole
name: node-red-role
apiGroup: rbac.authorization.k8s.io
subjects:
- kind: ServiceAccount
name: node-red
namespace: node-red
Maybe there can be an option to enable a basic RBAC manifest
Hey @glenndehaan,
release v0.25.0
should fix the issue!
Thanks for creating the issue.
@dirien Thank you for your help. I can indeed confirm that version v0.25.0
fixes the forbidden issue
What happened?
When enabling the sidecar the following error pops up:
How can we reproduce this?
Below is an example of my values.yaml:
Helm Chart version
Search
Code of Conduct
Additional context
No response