Skip to content

Commit ea2d84d

Browse files
phiscogbartolinisxd
authored
docs: explaining webhooks configuration RBAC needs (cloudnative-pg#204)
A new sub-section was added into the RBAC section of the Security documentation of the Operator explaining how the operator injects the self-signed CA for the webhooks Co-authored-by: Gabriele Bartolini <gabriele.bartolini@enterprisedb.com> Co-authored-by: Jonathan Gonzalez V <jonathan.gonzalez@enterprisedb.com>
1 parent d092e9d commit ea2d84d

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

docs/src/security.md

+10
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,16 @@ namespaced resources.
120120
failover/switchover operations in an automated way (by assigning, for example,
121121
the correct end-point of a service to the proper primary PostgreSQL instance).
122122

123+
`validatingwebhookconfigurations` and `mutatingwebhookconfigurations`
124+
: The operator injects its self-signed webhook CA into both webhook
125+
configurations, which are needed to validate and mutate all the resources it
126+
manages. For more details, please see the
127+
[Kubernetes documentation](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/).
128+
129+
To see all the permissions required by the operator, you can run `kubectl
130+
describe clusterrole cnpg-manager`.
131+
132+
123133
### Pod Security Policies
124134

125135
A [Pod Security Policy](https://kubernetes.io/docs/concepts/policy/pod-security-policy/)

0 commit comments

Comments
 (0)