Skip to content

Commit

Permalink
Merge pull request #7 from mercedes-benz/fix_rbac
Browse files Browse the repository at this point in the history
fix: garm-server is not able to create runner namespace
  • Loading branch information
bavarianbidi committed Dec 11, 2023
2 parents 962d3dc + aed0f1b commit d756101
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 8 deletions.
6 changes: 3 additions & 3 deletions hack/local-development/kubernetes/clusterrole-binding.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@ apiVersion: rbac.authorization.k8s.io/v1
# This cluster role binding allows anyone in the "manager" group to read secrets in any namespace.
kind: RoleBinding
metadata:
name: garm-server
name: garm-provider-k8s
namespace: runner
subjects:
- kind: ServiceAccount
namespace: garm-server
name: garm-server
roleRef:
kind: Role
name: garm-server
kind: ClusterRole
name: garm-provider-k8s
apiGroup: rbac.authorization.k8s.io
10 changes: 5 additions & 5 deletions hack/local-development/kubernetes/clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
# SPDX-License-Identifier: MIT

apiVersion: rbac.authorization.k8s.io/v1
kind: Role
kind: ClusterRole
metadata:
name: garm-server
namespace: runner
name: garm-provider-k8s
rules:
- apiGroups: [""]
resources: ["namespaces"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
- apiGroups: [""]
resources: ["pods"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]

0 comments on commit d756101

Please sign in to comment.