KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices.
.helm-template-output.yaml: (object: <no namespace>/argocd-image-updater rbac.authorization.k8s.io/v1, Kind=RoleBinding) binding to "argocd-image-updater" role that has [get list watch] access to [secrets] (check: access-to-secrets, remediation: Where possible, remove get, list and watch access to secret objects in the cluster.)
System info:
Describe the bug kube-linter allows ignoring specific violations via annotation: https://docs.kubelinter.io/#/configuring-kubelinter?id=ignoring-violations-for-specific-cases This does not work for
access-to-secrets
in a role binding.To Reproduce Steps to reproduce the behavior:
ignore-check.kube-linter.io/access-to-secrets
kube-linter lint .helm-template-output.yaml
Sample YAML input
Expected behavior The error should be suppressed.
Screenshots
-
Additional context