original - https://github.com/sighupio/permission-manager
this guide refer to installing the permission manager on a running cluster
- Create the Namespace
kubectl create namespace permission-manager
- Create a secret with this content and update acordingly
---
apiVersion: v1
kind: Secret
metadata:
name: permission-manager
namespace: permission-manager
type: Opaque
stringData:
PORT: "4000" # port where server is exposed
CLUSTER_NAME: "my-cluster" # name of the cluster to use in the generated kubeconfig file
CONTROL_PLANE_ADDRESS: "https://172.17.0.3:6443" # full address of the control plane to use in the generated kubeconfig file
BASIC_AUTH_PASSWORD: "changeMe" # password used by basic auth (username is `admin`)
- Then apply:
kubectl apply -f https://github.com/billyen2012/permission-manager/releases/download/v1.0.0-custom-build/crd.yml
kubectl apply -f https://github.com/billyen2012/permission-manager/releases/download/v1.0.0-custom-build/seed.yml
kubectl apply -f https://github.com/billyen2012/permission-manager/releases/download/v1.0.0-custom-build/deploy.yml
the username is admin
the password is mounted as a secret BASIC_AUTH_PASSWORD
kubectl port-forward svc/permission-manager 4000 --namespace permission-manager
the application can now be accessed by http://localhost:4000
07/11/2022
- fix certificaiton and token bug
- update to assign token through
Secret
with typekubernetes.io/service-account-token
07/13/2022
- enhance frontend ui