Replies: 6 comments 5 replies
-
@DanielAntos90, I think your link is broken. But I am guessing you are referring to #4203. I have created PR which will fix your issue + many others: #4666. Are you able to drop your thoughts on this PR? |
Beta Was this translation helpful? Give feedback.
-
As I described in PR, in our setup, developers do not have permission to access Kubernetes Secrets due to security policies. The restriction on Weave GitOps side prevents developers from observing or managing (e.g., pausing reconciliation) Kustomization and HelmRelease objects. Removing the restriction on accessing Secrets will allow Weave GitOps to display the required objects while still enforcing security policies. Currently, this is a blocker for us—we are unable to test your latest release. We need to build it with these adjustments on our side to proceed. We have been using this change for almost a year without any issues, and it has worked seamlessly in our setup. |
Beta Was this translation helpful? Give feedback.
-
@erikgb |
Beta Was this translation helpful? Give feedback.
-
By the way, I just run your latest changes from the main branch on Kubernetes 1.29.x without any issues. 🙂 |
Beta Was this translation helpful? Give feedback.
-
The following PR #4697 is very much a concept, but I thought something like this could cater to user's needs. We just have to determine how best to lock it down. |
Beta Was this translation helpful? Give feedback.
-
Today, I confirmed that RBAC permissions for secrets (get) are required for Helm releases. Without these permissions, you are unable to observe the objects deployed by Helm." Would it be possible to modify the behavior so that Helm releases can be observed without requiring RBAC permissions for secrets? |
Beta Was this translation helpful? Give feedback.
-
Hi @casibbald i, I would like to start discussion about this PR
Beta Was this translation helpful? Give feedback.
All reactions