Skip to content

Commit ba3afde

Browse files
committed
remove option to configure specific secret names
1 parent 78e949e commit ba3afde

File tree

3 files changed

+5
-15
lines changed

3 files changed

+5
-15
lines changed

helm/aws-load-balancer-controller/README.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -234,5 +234,4 @@ The default values set by the application itself can be confirmed [here](https:/
234234
| `serviceMonitor.enabled` | Specifies whether a service monitor should be created, requires the ServiceMonitor CRD to be installed | `false` |
235235
| `serviceMonitor.additionalLabels` | Labels to add to the service account | `{}` |
236236
| `serviceMonitor.interval` | Prometheus scrape interval | `1m` |
237-
| `clusterSecretsPermissions.allowAllSecrets` | If `true`, controller has access to all secrets in the cluster. | `false` |
238-
| `clusterSecretsPermissions.secretNames` | Names of the specific secret resources controller should have access to for OIDC feature | `[]` |
237+
| `clusterSecretsPermissions.allowAllSecrets` | If `true`, controller has access to all secrets in the cluster. | `false` |

helm/aws-load-balancer-controller/templates/rbac.yaml

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -63,14 +63,6 @@ rules:
6363
- apiGroups: [""]
6464
resources: [secrets]
6565
verbs: [get, list, watch]
66-
{{- else if .Values.clusterSecretsPermissions.secretNames }}
67-
- apiGroups: [""]
68-
resources: [secrets]
69-
{{- with .Values.clusterSecretsPermissions.secretNames }}
70-
resourceNames:
71-
{{- toYaml . | nindent 4 }}
72-
{{- end }}
73-
verbs: [get, list, watch]
7466
{{- end }}
7567
- apiGroups: ["elbv2.k8s.aws", "", "extensions", "networking.k8s.io"]
7668
resources: [targetgroupbindings/status, pods/status, services/status, ingresses/status]

helm/aws-load-balancer-controller/values.yaml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -268,11 +268,10 @@ serviceMonitor:
268268
interval: 1m
269269

270270
# clusterSecretsPermissions lets you configure RBAC permissions for secret resources
271-
# This is required only if you use the OIDC feature, and we recommend specifying specific
272-
# secret names instead of allowing all secrets.
271+
# Access to secrets resource is required only if you use the OIDC feature, and instead of
272+
# enabling access to all secrets, we recommend configuring namespaced role/rolebinding.
273+
# This option is for backwards compatibility only, and will potentially be deprecated in future.
273274
clusterSecretsPermissions:
274275
# allowAllSecrets allows the controller to access all secrets in the cluster.
275276
# This is to get backwards compatible behavior, but *NOT* recommended for security reasons
276-
allowAllSecrets: false
277-
# secretNames specifies the names of the secret resources the controller should have access to
278-
secretNames: []
277+
allowAllSecrets: false

0 commit comments

Comments
 (0)