Skip to content

Conversation

@yo-ga
Copy link
Contributor

@yo-ga yo-ga commented Jun 8, 2025

Root cause

Kubernetes Namespace is a cluster-scoped resource, not a namespaced one.
As such, it cannot be managed via Role, which only applies to namespaced resources.
To perform operations on Namespace (e.g., get, list), you must use a ClusterRole with a ClusterRoleBinding.
Using a Role alone will not grant any permission on namespaces—including read/search access.

Issue list

Fixes #862
Fixes #893

@yo-ga yo-ga marked this pull request as ready for review June 8, 2025 14:19
@msafwankarim msafwankarim merged commit 93936d1 into stakater:master Jul 11, 2025
12 checks passed
pratikbin pushed a commit to NodeOps-app/Reloader that referenced this pull request Nov 13, 2025
Ignore namespaceSelector when not watch globally
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

3 participants