HoustonPutman commented on issue #488:
URL: https://github.com/apache/solr-operator/issues/488#issuecomment-1378939662

   > However, it may be that the operator runs in a different namespace than 
each solr cluster, and that the operator pod does not have rights to read 
secrets in other name spaces
   
   So we have the operator read secrets for various things. This ^ is only true 
for loading in secrets as a volume mount. Going through the API server we can 
read anything as we have the RBAC permissions to read them.
   
   The way I see this going, much like the other configMap/Secrets we read and 
pass to the SolrCloud pods, we will likely need to hash the security.json file 
and use that in the small bash command that we run when deciding whether to 
upload it or not.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to