Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[kyverno] check if v1.13.0 breaking chances affects us #843

Open
jkleinlercher opened this issue Nov 12, 2024 · 1 comment
Open

[kyverno] check if v1.13.0 breaking chances affects us #843

jkleinlercher opened this issue Nov 12, 2024 · 1 comment
Labels
area:security Related to security brick
Milestone

Comments

@jkleinlercher
Copy link
Contributor

See https://github.com/kyverno/kyverno/releases/tag/v1.13.0

especially the wildcard view role removal … does that mean that https://github.com/suxess-it/kubriX/blob/main/platform-apps/charts/kyverno/templates/policy-kargo-project-name-validation-apps-in-any-ns.yaml does not work anymore because kyverno cannot read kargo projects and argocd anymore?

@jkleinlercher jkleinlercher added the area:security Related to security brick label Nov 12, 2024
@phac008
Copy link
Contributor

phac008 commented Nov 25, 2024

uibklab issue since update to v1.13.x

admission webhook "validate-policy.kyverno.svc" denied the request: path: spec.rules[0].generate..: system:serviceaccount:kyverno:kyverno-admission-controller requires permissions get for resource rbac.authorization.k8s.io/v1/RoleBinding in namespace kubevirt

https://github.com/suxess-it/kubriX/blob/main/platform-apps/charts/kyverno/templates/policy-kubevirt-rolebinding.yaml

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area:security Related to security brick
Projects
Status: No status
Development

No branches or pull requests

2 participants