The registry-token-refresher deployment needs a service account to refresh tokens for ECR (and other externally provided registry services, I presume).
The SA should get bound (ClusterRoleBinding) to a role that has permission to list namespaces, like this:
rules:
- apiGroups: [""]
resources: ["namespaces"]
verbs: ["list"]
and the ServiceAccount needs to be linked to the pod in the registry-token-refresher deployment's pod template.spec, like:
spec:
template:
spec:
serviceAccount: deis-registry-token-refresher
That ServiceAccount needs to be created as well, since registry-token-refresher evidently didn't need any SA until RBAC in k8s 1.9
@bit-herder found this
The registry-token-refresher deployment needs a service account to refresh tokens for ECR (and other externally provided registry services, I presume).
The SA should get bound (ClusterRoleBinding) to a role that has permission to list namespaces, like this:
and the ServiceAccount needs to be linked to the pod in the
registry-token-refresherdeployment's podtemplate.spec, like:That ServiceAccount needs to be created as well, since registry-token-refresher evidently didn't need any SA until RBAC in k8s 1.9
@bit-herder found this