Skip to content

Commit 20e6971

Browse files
authored
Change ClusterRole to allow access to ingresses
Impersonating the controller's service account (`kubectl proxy --port=8080 --as system:serviceaccount:kube-system:kubernetes-pfsense-controller`) I have requested the same resources and while it's accessing `/apis/extensions/v1beta1/ingresses` just fine, I get a 403 when accessing `/apis/networking.k8s.io/v1beta1/ingresses`. With this change, it resolves fine!
1 parent c020e76 commit 20e6971

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

deploy/rbac.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ rules:
3131
- patch
3232
- apiGroups:
3333
- extensions
34+
- networking.k8s.io
3435
resources:
3536
- ingresses
3637
verbs:

0 commit comments

Comments
 (0)