fix(helm): support webapp serviceAccount annotations for IRSA#3429
fix(helm): support webapp serviceAccount annotations for IRSA#3429
Conversation
|
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Repository UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (3)
✅ Files skipped from review due to trivial changes (1)
🚧 Files skipped from review as they are similar to previous changes (1)
📜 Recent review details⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (29)
🧰 Additional context used📓 Path-based instructions (1)**/*.{js,ts,jsx,tsx,json,md,yaml,yml}📄 CodeRabbit inference engine (AGENTS.md)
Files:
🧠 Learnings (4)📓 Common learnings📚 Learning: 2025-06-25T13:20:17.174ZApplied to files:
📚 Learning: 2025-06-25T14:14:11.965ZApplied to files:
📚 Learning: 2025-06-25T13:18:04.827ZApplied to files:
WalkthroughUpdates Helm chart metadata version to 4.0.6. Adds new Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes 🚥 Pre-merge checks | ✅ 5✅ Passed checks (5 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
🧭 Helm Chart Prerelease PublishedVersion: Install: helm upgrade --install trigger \
oci://ghcr.io/triggerdotdev/charts/trigger \
--version "4.0.6-pr3429.f4a5d2a"
|
…e is empty Previously the name helpers fell back to "default", causing the token-syncer RoleBinding to bind secret permissions to the namespace's default ServiceAccount - silently elevating any workload using it. Applied to both webapp and supervisor helpers.
|
ready |
Mirrors the existing
supervisor.serviceAccountpattern onto webapp so operators can annotate the SA (IRSAeks.amazonaws.com/role-arn, Workload Identity, etc.) or bring their own SA. Without this,webapp.serviceAccount.annotationsisn't exposed and operators have to patch the SA out-of-band.Three pieces, same as supervisor:
webapp.serviceAccount.createtoggle on the SA blockwebapp.serviceAccount.annotations+namevaluestrigger-v4.webappServiceAccountNamehelper, used by the SA, the token-syncer RoleBinding subject, and the Deployment'sserviceAccountNameRole + RoleBinding are left unguarded (matching supervisor's shape where
rbac.createis a separate toggle fromserviceAccount.create) - BYO-SA users take on the responsibility of ensuring the SA they supply has the permissions the RoleBinding grants.Verified with
helm templateagainst default values, an IRSA annotation override, andcreate: falsewith a custom name.