Skip to content

Commit f563330

Browse files
committed
Fix rbac.yaml
The "escalate" permission needs to be added to (Cluster)Role not (Cluster)RoleBinding. Users might also need the "bind" permission. See https://v1-13.docs.kubernetes.io/docs/reference/access-authn-authz/rbac/#privilege-escalation-prevention-and-bootstrapping Signed-off-by: David Xia <[email protected]>
1 parent 7b1fe70 commit f563330

File tree

1 file changed

+12
-10
lines changed

1 file changed

+12
-10
lines changed

deploy/10-rbac.yml

+12-10
Original file line numberDiff line numberDiff line change
@@ -17,19 +17,21 @@ rules:
1717
"clusterrbacsyncconfigs"
1818
]
1919
verbs: ["get", "list", "watch"]
20+
# "bind" and "escalate" are not supported until Kubernetes 1.12. When deploying to
21+
# versions >= 1.12, you can comment out the '*' configs, which provide cluster-admin and
22+
# just use the configuration here.
23+
#
24+
# This is ignored prior to 1.12.
25+
#
26+
# See https://kubernetes.io/docs/reference/access-authn-authz/rbac/#privilege-escalation-prevention-and-bootstrapping for details.
27+
# - apiGroups: ["rbac.authorization.k8s.io"]
28+
# resources: ["clusterroles", "roles"]
29+
# verbs: ["bind", "escalate"]
2030
- apiGroups: ["rbac.authorization.k8s.io"]
2131
resources: ["clusterrolebindings", "rolebindings"]
2232
verbs: [
23-
"get", "list", "watch", "create", "update", "patch", "delete",
24-
25-
# "escalate" is not supported until Kuberenetes 1.12. When deploying to
26-
# 1.12, you can comment out the '*' configs, which privde cluster-admin and
27-
# just use the confuration called out here.
28-
#
29-
# This is ignored prior to 1.12.
30-
#
31-
# See https://kubernetes.io/docs/reference/access-authn-authz/rbac/#privilege-escalation-prevention-and-bootstrapping for details.
32-
"escalate"]
33+
"get", "list", "watch", "create", "update", "patch", "delete"
34+
]
3335
- apiGroups: [""]
3436
resources: ["events"]
3537
verbs: ["get", "list", "watch", "create", "update", "patch"]

0 commit comments

Comments
 (0)