tower 0.9.1 — read cluster Secret directly for capacity (RBAC scoped to argocd ns)

This commit is contained in:
git_admin
2026-04-26 20:49:08 +03:00
parent 6150e88ee2
commit 38cccf89bc
2 changed files with 33 additions and 1 deletions

View File

@@ -29,6 +29,38 @@ rules:
- apiGroups: ['metrics.k8s.io']
resources: ['nodes']
verbs: ['get', 'list']
# Read ArgoCD's cluster Secrets (the registered customer-cluster
# creds) so Tower can build cross-cluster API clients for capacity
# queries. Scoped to a single Role+RoleBinding in the argocd ns —
# cluster-scoped Secret access would be over-broad.
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: {{ .Release.Name }}-tower-cluster-secrets
namespace: argocd
labels:
{{- include "tower.labels" . | nindent 4 }}
rules:
- apiGroups: ['']
resources: ['secrets']
verbs: ['get', 'list']
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ .Release.Name }}-tower-cluster-secrets
namespace: argocd
labels:
{{- include "tower.labels" . | nindent 4 }}
subjects:
- kind: ServiceAccount
name: tower
namespace: {{ .Release.Namespace }}
roleRef:
kind: Role
name: {{ .Release.Name }}-tower-cluster-secrets
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@@ -4,7 +4,7 @@ backend:
enabled: true
image:
repository: docker.io/odoosky/tower
tag: "0.9.0"
tag: "0.9.1"
pullPolicy: IfNotPresent # IfNotPresent because the image is in
# containerd's k8s.io namespace already
# (lab1 single-server). Replace with