Skip to content

Commit 1578581

Browse files
committed
docs: Mention additional secret-operator permission
1 parent 1d34322 commit 1578581

File tree

1 file changed

+29
-3
lines changed

1 file changed

+29
-3
lines changed

modules/ROOT/partials/release-notes/release-25.11.adoc

Lines changed: 29 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -584,11 +584,37 @@ See the xref:secret-operator:secretclass.adoc#ca-rotation[SecretClass] and xref:
584584
The resources are automatically converted by the operator.
585585
** The operator now deploys the CRDs for SecretClass and TrustStore by itself instead of relying on the Helm chart.
586586
This enables the operator to automatically rotate and update the TLS certificate (`caBundle`) used for the conversion webhook.
587-
To enable this mechanism, the operator needs additional permissions.
588-
These permissions are automatically granted when using the Helm Chart, but need to be manually set if other deployment mechanisms are used.
589-
The maintenance of CRDs (and default custom resources) can be disabled via Helm:
587+
To enable this mechanism, the operator needs the following additional permissions:
590588
+
591589
--
590+
[source,yaml]
591+
----
592+
apiVersion: rbac.authorization.k8s.io/v1
593+
kind: ClusterRole
594+
metadata:
595+
name: ...
596+
rules:
597+
- apiGroups:
598+
- apiextensions.k8s.io
599+
resources:
600+
- customresourcedefinitions
601+
verbs:
602+
- create
603+
- patch
604+
- apiGroups:
605+
- secrets.stackable.tech
606+
resources:
607+
- secretclasses
608+
- truststores
609+
verbs:
610+
- create
611+
- patch
612+
----
613+
614+
These permissions are automatically granted when using the Helm Chart, but need to be manually set if other deployment mechanisms are used.
615+
616+
The maintenance of CRDs (and default custom resources) can be disabled via Helm:
617+
592618
[source,yaml]
593619
----
594620
maintenance:

0 commit comments

Comments
 (0)