sass1997

Results 12 comments of sass1997

I do have the same issue here. Are you also having istio activated?

As far as I've read the documentation: > As a security enhancement, the argocd-repo-server Deployment uses its own Service Account instead of default. > > If you have a custom...

I will try to debug and let you know with the correct Rolebinding which is needed to start this pod

I can confirm it's definitely missing special rights for this service account. I granted now everything for this service account and now the argocd-repo-server is starting. I'm now digging into...

``` kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: namespace: argocd name: argocd-repo-server rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: argocd-repo-server namespace: argocd subjects: -...

+1. I was using until now an ugly hack to retrieve the roles via the data sources and then templating the CRD and using the kubectl terraform provider to apply...

Update: It seems that this stuff isn't working anymore. @eliaoggian I can see in your logs that you have added keycloak via generic oidc on rancher side. Any reasons for...