-
Notifications
You must be signed in to change notification settings - Fork 233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: update CRDs for BoundServiceAccountToken
triggerAuth provider
#701
base: main
Are you sure you want to change the base?
Conversation
9a06a5d
to
923b1d2
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As default, KEDA doesn't have permission in the RBAC to create these tokens (and not granting it as default is worth IMHO), but maybe we could add an option to include the required permissions if users enable them (requiring explicit activation to include the required extra RBAC)
Signed-off-by: Max Cao <[email protected]>
The array allows users to supply KEDA with the names and namespaces of service accounts that they would like the keda-operator to request tokens from. These service account tokens are then used in turn for the boundServiceAccountToken trigger source Signed-off-by: Max Cao <[email protected]>
923b1d2
to
bac167e
Compare
Added a helm value of I'm sort of new to writing helm charts, so please let me know if a restructure or renaming is needed here. |
@@ -146,4 +146,51 @@ subjects: | |||
- kind: ServiceAccount | |||
name: {{ (.Values.serviceAccount.operator).name | default .Values.serviceAccount.name }} | |||
namespace: {{ .Release.Namespace }} | |||
{{- if .Values.serviceAccountTokenCreationRoles }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am not sure minimal-rbac.yaml is the correct place for this
@jkremser could you please suggest the best approach here?
Updates CRDs to support
BoundServiceAccountToken
trigger auth provider/source. Also adds a helm value of type array calledserviceAccountTokenCreationRoles
which allows you to add objects ofname
andnamespace
corresponding to service accounts in the cluster that you'd like thekeda-operator
to be able to request service account tokens from.Checklist
Related to kedacore/keda#6272