Skip to content

Commit 8dca36c

Browse files
authored
Add aggregate role (#133)
* feat: add aggregate-to-xx roles non cluster-admin user can't create/update/delete cloneset/statefulset object, according to [kubernetes aggregated clusterrole](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles), add clusterroles. Signed-off-by: j4ckstraw <[email protected]>
1 parent 79e725c commit 8dca36c

File tree

2 files changed

+112
-1
lines changed

2 files changed

+112
-1
lines changed

versions/kruise/1.8.0/Chart.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
apiVersion: v1
22
name: kruise
33
description: Helm chart for kruise components
4-
version: 1.8.0
4+
version: 1.8.1
55
appVersion: 1.8.0
66
kubeVersion: ">= 1.18.0-0"
77
icon: https://openkruise.io/img/openkruise-logo-bg.jpg

versions/kruise/1.8.0/templates/rbac_role.yaml

+111
Original file line numberDiff line numberDiff line change
@@ -951,3 +951,114 @@ subjects:
951951
- kind: ServiceAccount
952952
name: kruise-daemon
953953
namespace: {{ .Values.installation.namespace }}
954+
---
955+
kind: ClusterRole
956+
apiVersion: rbac.authorization.k8s.io/v1
957+
metadata:
958+
name: aggregate-kruise-view
959+
labels:
960+
# Add these permissions to the "view" default role.
961+
rbac.authorization.k8s.io/aggregate-to-view: "true"
962+
rules:
963+
- apiGroups: ["apps.kruise.io"]
964+
resources:
965+
- advancedcronjobs
966+
- advancedcronjobs/status
967+
- broadcastjobs
968+
- broadcastjobs/status
969+
- clonesets
970+
- clonesets/scale
971+
- clonesets/status
972+
- containerrecreaterequests
973+
- containerrecreaterequests/status
974+
- daemonsets
975+
- daemonsets/status
976+
- imagelistpulljobs
977+
- imagelistpulljobs/status
978+
- imagepulljobs
979+
- imagepulljobs/status
980+
- nodeimages
981+
- nodeimages/status
982+
- nodepodprobes
983+
- nodepodprobes/status
984+
- persistentpodstates
985+
- persistentpodstates/status
986+
- podprobemarkers
987+
- podprobemarkers/status
988+
- sidecarsets
989+
- sidecarsets/status
990+
- statefulsets
991+
- statefulsets/scale
992+
- statefulsets/status
993+
- uniteddeployments
994+
- uniteddeployments/scale
995+
- uniteddeployments/status
996+
- workloadspreads
997+
- workloadspreads/status
998+
verbs:
999+
- get
1000+
- list
1001+
- watch
1002+
---
1003+
kind: ClusterRole
1004+
apiVersion: rbac.authorization.k8s.io/v1
1005+
metadata:
1006+
name: aggregate-kruise-edit
1007+
labels:
1008+
# Add these permissions to the "admin" and "edit" default roles.
1009+
rbac.authorization.k8s.io/aggregate-to-edit: "true"
1010+
rules:
1011+
- apiGroups: ["apps.kruise.io"]
1012+
resources:
1013+
- advancedcronjobs
1014+
- broadcastjobs
1015+
- clonesets
1016+
- clonesets/scale
1017+
- containerrecreaterequests
1018+
- daemonsets
1019+
- imagelistpulljobs
1020+
- imagepulljobs
1021+
- nodeimages
1022+
- nodepodprobes
1023+
- persistentpodstates
1024+
- podprobemarkers
1025+
- sidecarsets
1026+
- statefulsets
1027+
- statefulsets/scale
1028+
- uniteddeployments
1029+
- uniteddeployments/scale
1030+
- workloadspreads
1031+
verbs:
1032+
- create
1033+
- delete
1034+
- deletecollection
1035+
- patch
1036+
- update
1037+
---
1038+
kind: ClusterRole
1039+
apiVersion: rbac.authorization.k8s.io/v1
1040+
metadata:
1041+
name: aggregate-kruise-admin
1042+
labels:
1043+
# Add these permissions to the "admin" default roles.
1044+
rbac.authorization.k8s.io/aggregate-to-admin: "true"
1045+
rules:
1046+
- apiGroups: ["apps.kruise.io"]
1047+
resources:
1048+
- resourcedistributions/status
1049+
verbs:
1050+
- get
1051+
- list
1052+
- watch
1053+
- apiGroups: ["apps.kruise.io"]
1054+
resources:
1055+
- resourcedistributions
1056+
verbs:
1057+
- get
1058+
- list
1059+
- watch
1060+
- create
1061+
- delete
1062+
- deletecollection
1063+
- patch
1064+
- update

0 commit comments

Comments
 (0)