You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,4 +8,13 @@
8
8
* fix(helm): CRDs now correspond to correct values for the `command-issuer`.
9
9
* fix(helm): Signer Helm Chart now includes a `secureMetrics` value to enable/disable sidecar RBAC container for further protection of the `/metrics` endpoint.
10
10
* fix(signer): Signer now returns CA chain bytes instead of appending to the leaf certificate.
11
-
* fix(role): Removed permissions for `configmaps` resource types for the `leader-election-role` role.
11
+
* fix(role): Removed permissions for `configmaps` resource types for the `leader-election-role` role.
12
+
13
+
# v1.0.5
14
+
15
+
## Features
16
+
* feat(controller): Implement Kubernetes `client-go` REST client for Secret/ConfigMap retrieval to bypass `controller-runtime` caching system. This enables the reconciler to retrieve Secret and ConfigMap resources at the namespace scope with only namespace-level permissions.
17
+
18
+
## Fixes
19
+
* fix(helm): Add configuration flag to configure chart to either grant cluster-scoped or namespace-scoped access to Secret and ConfigMap API
20
+
* fix(controller): Add logic to read secret from reconciler namespace or Issuer namespace depending on Helm configuration.
# --set image.pullPolicy=Never # Only required if using a local image
30
36
```
31
37
32
-
Modifications can be made by overriding the default values in the `values.yaml` file with the `--set` flag. For example, to override the `replicaCount` value, run the following command:
33
-
```bash
38
+
Modifications can be made by overriding the default values in the `values.yaml` file with the `--set` flag. For example, to override the `secretConfig.useClusterRoleForSecretAccess` to configure the chart to use a cluster role for secret access, run the following command:
Modifications can also be made by modifying the `values.yaml` file directly. For example, to override the `replicaCount` value, modify the `replicaCount` value in the `values.yaml` file:
50
+
Modifications can also be made by modifying the `values.yaml` file directly. For example, to override the `secretConfig.useClusterRoleForSecretAccess` value to configure the chart to use a cluster role for secret access, modify the `secretConfig.useClusterRoleForSecretAccess` value in the `values.yaml` file by creating an override file:
39
51
```yaml
40
52
cat <<EOF > override.yaml
41
-
replicaCount: 2
53
+
secretConfig:
54
+
useClusterRoleForSecretAccess: true
42
55
EOF
43
56
```
44
57
Then, use the `-f` flag to specify the `values.yaml` file:
|`crd.create`| Specifies if CRDs will be created |`true`|
78
+
|`crd.annotations`| Annotations to add to the CRD |`{}`|
79
+
|`serviceAccount.create`| Specifies if a service account should be created |`true`|
80
+
|`serviceAccount.annotations`| Annotations to add to the service account |`{}`|
81
+
|`serviceAccount.name`| Name of the service account to use |`""` (uses the fullname template if `create` is true) |
82
+
|`podAnnotations`| Annotations for the pod |`{}`|
83
+
|`podSecurityContext.runAsNonRoot`| Run pod as non-root |`true`|
84
+
|`securityContext`| Security context for the pod |`{}` (with commented out options) |
85
+
|`resources`| CPU/Memory resource requests/limits |`{}` (with commented out options) |
86
+
|`nodeSelector`| Node labels for pod assignment |`{}`|
87
+
|`tolerations`| Tolerations for pod assignment |`[]`|
88
+
|`secureMetrics.enabled`| Whether to enable and configure the kube-rbac-proxy sidecar for authorized and authenticated use of the /metrics endpoint by Prometheus. |`false`|
89
+
|`secretConfig.useClusterRoleForSecretAccess`| Specifies if the ServiceAccount should be granted access to the Secret resource using a ClusterRole |`false`|
Authentication to the Command platform is done using basic authentication. The credentials must be provided as a Kubernetes `kubernetes.io/basic-auth` secret. These credentials should be for a user with "Certificate Enrollment: Enroll CSR" and "API: Read" permissions in Command.
86
+
If the Helm chart was deployed with the `--set "secretConfig.useClusterRoleForSecretAccess=true"` flag, the secret must be created in the same namespace as any Issuer resources deployed. Otherwise, the secret must be created in the same namespace as the controller.
86
87
87
88
Create a `kubernetes.io/basic-auth` secret with the Keyfactor Command username and password:
0 commit comments