Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable RBAC in Travis-CI Minikube cluster and fix APIServer ConfigMap/Secret Role APIGroup #47

Merged
merged 2 commits into from
Jul 12, 2018

Conversation

xmudrii
Copy link
Owner

@xmudrii xmudrii commented Jul 12, 2018

The etcdproxy-manage-certs Role which ensures the EtcdProxyController ServiceAccount can get and write to ConfigMaps and Secrets in the APIServer namespace, has specified APIGroup v1, which is incorrect, as roles for resources in the Core API should not specify any APIGroup.

That caused controller to misbehave when deployed in-cluster once we merged #35.

The E2E tests in Travis-CI have not caught this issue, as RBAC is disabled by default in Minikube. This PR also enables RBAC. In order to enable RBAC, we have to make default ServiceAccount a cluster-admin or otherwise the kube-dns fails.

Relevant issue kubernetes/minikube#1722

@xmudrii xmudrii added the ready-for-review Indicates that a Pull Request is ready for review. label Jul 12, 2018
@xmudrii xmudrii added this to the Milestone 2 milestone Jul 12, 2018
@xmudrii xmudrii merged commit 86b39dd into master Jul 12, 2018
@xmudrii xmudrii deleted the rbac-fix branch July 12, 2018 15:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ready-for-review Indicates that a Pull Request is ready for review.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants