Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CU-86c0fwhr0 - feat: allow not creating rbac at all #334

Merged
merged 1 commit into from
Sep 30, 2024

Conversation

nirbenator
Copy link
Contributor

@nirbenator nirbenator commented Sep 24, 2024

Motivation

Some accounts have security policies that require teams to validate changes in Kubernetes RBAC. By not creating RBAC, the Helm chart will avoid generating any cluster roles or bindings. However, modifying RBAC places full responsibility on the account for managing permission errors, which can lead to unexpected behavior. This approach is not recommended and should be used with caution.

@nirbenator
Copy link
Contributor Author

nirbenator commented Sep 30, 2024

Opened a new task on ClickUp!
Go check it out and add some info: CU-86c0fwhr0

@komodor-github-warden komodor-github-warden bot changed the title feat: allow not creating rbac at all CU-86c0fwhr0 - feat: allow not creating rbac at all Sep 30, 2024
@nirbenator
Copy link
Contributor Author

@nirbenator nirbenator merged commit 15a6645 into master Sep 30, 2024
2 checks passed
@nirbenator nirbenator deleted the allow-disabling-roles-creating branch September 30, 2024 08:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants