Remove resourceNames in integration secrets

* Solves #1524
* We remove resourceName due to the following:
  Note: You cannot restrict create or deletecollection requests by resourceName.
  For create, this limitation is because the object name is not known at authorization time.
* Fix typo in azure-registry cronjob
Signed-off-by: Edvin Norling <edvin.norling@xenit.se>
This commit is contained in:
Edvin Norling
2021-06-16 13:56:43 +02:00
parent 5de83f015a
commit f748114dfa
3 changed files with 5 additions and 5 deletions

View File

@ -110,8 +110,8 @@ rules:
- update - update
- patch - patch
# Lock this down to the specific Secret name (Optional) # Lock this down to the specific Secret name (Optional)
resourceNames: #resourceNames:
- $(KUBE_SECRET) # templated from kustomize vars referencing ConfigMap, also see kustomizeconfig.yaml # - $(KUBE_SECRET) # templated from kustomize vars referencing ConfigMap, also see kustomizeconfig.yaml
--- ---
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1

View File

@ -102,8 +102,8 @@ rules:
- update - update
- patch - patch
# # Lock this down to the specific Secret name (Optional) # # Lock this down to the specific Secret name (Optional)
resourceNames: #resourceNames:
- $(KUBE_SECRET) # templated from kustomize vars referencing ConfigMap, also see kustomizeconfig.yaml #- $(KUBE_SECRET) # templated from kustomize vars referencing ConfigMap, also see kustomizeconfig.yaml
--- ---
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1

View File

@ -49,7 +49,7 @@ spec:
apply-secret() { apply-secret() {
/kbin/kubectl create secret docker-registry "${1}" \ /kbin/kubectl create secret docker-registry "${1}" \
--docker-passwrod="${2}" \ --docker-password="${2}" \
--docker-username="${3}" \ --docker-username="${3}" \
--docker-server="${4}" \ --docker-server="${4}" \
--dry-run=client -o=yaml \ --dry-run=client -o=yaml \