-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🚀Add Configurable RBAC Support #491
🚀Add Configurable RBAC Support #491
Conversation
7022fd9
to
7fdb7c1
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @domino-sbr1,
All in all, looks great! I have left a few minor comments to address.
Please add a change log entry, we use changie
:
$ changie new --kind ENHANCEMENTS --custom "PR=491" --body '`Helm Chart`: Add the ability to configure the creation of the RBAC role and role binding.'
Thanks!
7fdb7c1
to
5971e87
Compare
5971e87
to
a8e1cbc
Compare
a8e1cbc
to
b090994
Compare
Hi @arybolovlev, it's already done, I added new log entry |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @domino-sbr1!
Thank you for this improvement! All looks good! 🚀
Description
This pull request introduces configurable Role-Based Access Control (RBAC) support to the HCP Terraform Operator.
The following changes have been made:
values.yaml
file to enable or disable the creation of RBAC resources.Motivation
The addition of configurable RBAC support allows users to have more control over the security and permissions of the HCP Terraform Operator. This is particularly useful for environments with strict security requirements or custom RBAC policies.
Usage Example
To enable/disable RBAC creation, set the
rbac.create
value totrue
orfalse
in yourvalues.yaml
file:References
Community Note