chart: Add rbac.allowGrantingKubernetesContainerModePermissions

This commit is contained in:
Yusuke Kuoka
2022-07-10 02:56:45 +00:00
parent 11cb9b7882
commit 7e4b6ebd6d
6 changed files with 134 additions and 1 deletions

View File

@@ -283,4 +283,28 @@ rules:
- create
- delete
- get
{{- end }}
{{- end }}
{{- if .Values.rbac.allowGrantingKubernetesContainerModePermissions }}
- apiGroups:
- ""
resources:
- pods/exec
verbs:
- create
- get
- apiGroups:
- ""
resources:
- pods/log
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- secrets
verbs:
- create
- delete
{{- end }}

View File

@@ -71,6 +71,13 @@ runner:
statusUpdateHook:
enabled: false
rbac:
# # This allows ARC to dynamically create a ServiceAccount and a Role for each Runner pod that uses "kubernetes" container mode,
# # by extending ARC's manager role to have the same permissions required by the pod runs the runner agent in "kubernetes" container mode.
# # Without this, Kubernetes blocks ARC to create the role to prevent a priviledge escalation.
# # See https://github.com/actions-runner-controller/actions-runner-controller/pull/1268/files#r917327010
# allowGrantingKubernetesContainerModePermissions: true
serviceAccount:
# Specifies whether a service account should be created
create: true