Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: change external secrets namespace to secret-infra #301

Merged
merged 1 commit into from
Sep 10, 2021
Merged

fix: change external secrets namespace to secret-infra #301

merged 1 commit into from
Sep 10, 2021

Conversation

ankitm123
Copy link
Member

@ankitm123 ankitm123 commented Sep 9, 2021

Signed-off-by: ankitm123 [email protected]

Description

External secrets does not work with IRSA because the pod cannot assume the iam role attached to the service account.
The reason is that in the the assume role policy document the namespace of the external secrets service account is set to jx namespace, but the it's in secret-infra account

Special notes for the reviewer(s)

Which issue this PR fixes

fixes #293

Copy link
Contributor

@babadofar babadofar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This works for me :)

@rawlingsj rawlingsj merged commit a7a3780 into jenkins-x:master Sep 10, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Policy for access to secrets manager is not added to tekton bot
3 participants