Skip to content
This repository has been archived by the owner on Nov 1, 2022. It is now read-only.

Cope gracefully when we can't get resources (in a namespace) #1217

Closed
squaremo opened this issue Jul 9, 2018 · 1 comment
Closed

Cope gracefully when we can't get resources (in a namespace) #1217

squaremo opened this issue Jul 9, 2018 · 1 comment
Labels
enhancement help wanted UX In pursuit of a delightful user experience

Comments

@squaremo
Copy link
Member

squaremo commented Jul 9, 2018

It's desirable to be able to deploy fluxd with permissions restricted to certain namespaces or resources (usually namespaces, since this is a lost easier than alternatives).

At present though, unless you also tell it to only scan certain namespaces with --k8s-namespace-whitelist, it will respond to most API calls with an error, having failed to scan for workloads in a namespace for which it doesn't have permissions.

It'd be better to simply elide resources that we don't have the permissions to get (if we can tell).

@dholbach dholbach added the UX In pursuit of a delightful user experience label Sep 28, 2018
@nmaupu
Copy link

nmaupu commented Jun 12, 2020

Any news on that ? I am still getting bunch of error logs (e.g. cannot get resource \"customresourcedefinitions\" in API group \"apiextensions.k8s.io\" at the cluster scope) when attempting to restrict flux to a specific namespace.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement help wanted UX In pursuit of a delightful user experience
Projects
None yet
Development

No branches or pull requests

4 participants