You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Support for external service accounts has also been added. Users can now utilize an external service account; for this, follow the multi-user installation details relevant to external service accounts.
43
+
# Setting SERVICE_ACCOUNT_NAME and ANNOTATIONS is optional for multi-user installations, available from release version 2.1.x.
41
44
export ANNOTATIONS="<Role annotation for service account>"# Example: eks.amazonaws.com/role-arn: arn:aws:iam::000000000000:role/jfrog-operator-role
Once operator is in running state, configure `artifactoryUrl`, `refreshTime`, `namespaceSelector`, and `secretMetadata` in [secretrotator.yaml](https://github.com/jfrog/jfrog-registry-operator/blob/master/charts/jfrog-registry-operator/examples/secretrotator.yaml)
51
+
### For multi-user installations, if multiple service accounts need to be created:
52
+
```
53
+
# In a multi-user scenario, please create all service accounts using the role ARN as an annotation via the Helm chart. This will also update the ClusterRole to grant the necessary permissions to each specific service account.
54
+
55
+
# Create a custom-values.yaml file with service account details and then install operator.
Important Note: After this, you can use the service account name and namespace in custom resources. You may install multiple custom resources with different service account details.
65
+
66
+
Example:
67
+
serviceAccount:
68
+
name: "sample-service-account"
69
+
namespace: "<NAMESPACE>"
70
+
```
71
+
72
+
Once operator is in running state, configure `artifactoryUrl`, `refreshTime`, `namespaceSelector`, `serviceAccount`, `generatedSecrets`, and `secretMetadata` in [secretrotator.yaml](https://github.com/jfrog/jfrog-registry-operator/blob/master/charts/jfrog-registry-operator/examples/secretrotator.yaml)
49
73
50
74
Sample Manifest:
51
75
@@ -63,12 +87,20 @@ spec:
63
87
matchLabels:
64
88
kubernetes.io/metadata.name: jfrog-operator
65
89
generatedSecrets:
66
-
- secretName: token-imagepull-secret
67
-
secretType: docker
68
-
- secretName: token-generic-secret
69
-
secretType: generic
90
+
- secretName: token-imagepull-secret
91
+
secretType: docker
92
+
# - secretName: token-generic-secret
93
+
# secretType: generic
70
94
artifactoryUrl: "artifactory.example.com"
71
-
refreshTime: 1m
95
+
refreshTime: 30m
96
+
# serviceAccount: # The default name and namespace will be the operator’s service account name and namespace
// RefreshInterval The time in which the controller should reconcile its objects and recheck namespaces for labels.
66
+
// Each target user's ServiceAccount, restricting access to only the specified service accounts and ensuring the role is limited to the jfrog operator service account.
Copy file name to clipboardExpand all lines: charts/jfrog-registry-operator/CHANGELOG.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,17 @@
1
1
# JFrog Secret Rotator Operator Chart Changelog
2
2
All changes to this chart will be documented in this file.
3
3
4
-
## [2.0.0] - May 19, 2025
4
+
## [2.1.0] - May 27, 2025
5
+
* Added support for `exchangedServiceAccounts`. Using this, multiple service accounts can be created, which can later be used in `serviceAccount.name` and `serviceAccount.namespace` in the custom resource
6
+
* Added permissions for `serviceaccounts` and `serviceaccounts/token` for the target service accounts.
7
+
* Removed support for operator-specific service account annotations support. Users can now create custom service accounts or use `exchangedServiceAccounts`.
8
+
* The operator's service account requires an optional ARN annotation. If the user does not configure any service account, they will need to update the annotation using `serviceAccount.annotations`
9
+
* Removed default labels from the deployment. Customers can now pass the required labels to avoid any duplication with Kustomize. [GH-32](https://github.com/jfrog/jfrog-registry-operator/issues/32)
10
+
11
+
## [2.0.0] - May 15, 2025
5
12
*** Important Changes ***
6
13
* In the custom resource, the introduced `spec.generatedSecrets` configuration typically involves specifying: `secretName` – the name of the Secret to be generated, and `secretType` – the type of Secret to generate (e.g., Docker, Generic)
7
-
* Scope: Scope can be anything (Optional)
14
+
* Scope: Scope can be anything (Optional)
8
15
* Note: Currently spec.secretName is supported but going forward this will be deprecated soon.
Copy file name to clipboardExpand all lines: charts/jfrog-registry-operator/examples/secretrotator.yaml
+6-4Lines changed: 6 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -10,12 +10,12 @@ spec:
10
10
namespaceSelector:
11
11
matchLabels:
12
12
kubernetes.io/metadata.name: jfrog-operator
13
-
secretName: token-secret
13
+
#secretName: token-secret
14
14
generatedSecrets:
15
15
- secretName: token-imagepull-secret
16
16
secretType: docker
17
-
- secretName: token-generic-secret
18
-
secretType: generic
17
+
#- secretName: token-generic-secret
18
+
# secretType: generic
19
19
artifactoryUrl: ""
20
20
refreshTime: 30m
21
21
secretMetadata:
@@ -30,4 +30,6 @@ spec:
30
30
## NOTE: You can provide either a pair of cert.pem and key.pem, or ca.pem, or all three: cert.pem, key.pem, and ca.pem. But make sure that key needs to same as cert.pem, key.pem, and ca.pem in secret
31
31
certificateSecretName:
32
32
insecureSkipVerify: false
33
-
33
+
# serviceAccount: # The default name and namespace will be the operator’s service account name and namespace
0 commit comments