The 2.0.0 Helm chart for ASCP is not able to create secrets as it does not create the secretprovidersyncing-role ClusterRole and secretprovidersyncing-rolebinding ClusterRoleBinding as a dependency #516
              
                Unanswered
              
          
                  
                    
                      Muskan-Agrawal07
                    
                  
                
                  asked this question in
                Q&A
              
            Replies: 2 comments
-
| 
         Have you, by any chance, checked your resource quotas?  | 
  
Beta Was this translation helpful? Give feedback.
                  
                    0 replies
                  
                
            -
| 
         I'm not aware of any regression between v1 and v2 that could have caused this. Have you checked your resource quotas as mentioned above? I'm going to move this to a discussion.  | 
  
Beta Was this translation helpful? Give feedback.
                  
                    0 replies
                  
                
            
  
    Sign up for free
    to join this conversation on GitHub.
    Already have an account?
    Sign in to comment
  
        
    
Uh oh!
There was an error while loading. Please reload this page.
-
Describe the bug
The 2.0.0 Helm chart for ASCP is not able to create secrets as it does not create the secretprovidersyncing-role ClusterRole and secretprovidersyncing-rolebinding ClusterRoleBinding as a dependency
To Reproduce
Steps to reproduce the behavior:
As a workaround, I am installing the secrets-store-csi-driver separately and that creates the role and role binding.
Do you also notice this bug when using a different secrets store provider (Vault/Azure/GCP...)? Yes/No
If yes, the issue is likely with the k8s Secrets Store CSI driver, not the AWS provider. Open an issue in that repo.
Expected behavior
ASCP helm chart to create the secretprovidersyncing role and role binding
Environment:
EKS: v1.33
ASCP Helm chart: secrets-store-csi-driver-provider-aws-2.0.
Additional context
Add any other context about the problem here.
I have tried using
--set syncSecret.enabled=truefor the helm chart, that doesn't work for me.helm install -n kube-system csi-secrets-store secrets-store-csi-driver/secrets-store-csi-driver --set syncSecret.enabled=true
Beta Was this translation helpful? Give feedback.
All reactions