-
Notifications
You must be signed in to change notification settings - Fork 4.8k
advanced router role #11715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
advanced router role #11715
Conversation
| Name: PrivilegedRouterRoleName, | ||
| }, | ||
| Rules: []authorizationapi.PolicyRule{ | ||
| authorizationapi.NewRule("list", "watch").Groups(kapiGroup).Resources("endpoints").RuleOrDie(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you only need this one. A user can have multiple roles, so this is what you need in addition to the existing router role.
| MasterRoleName = "system:master" | ||
| NodeRoleName = "system:node" | ||
| NodeProxierRoleName = "system:node-proxier" | ||
| PrivilegedRouterRoleName = "system:privileged-router" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How many router flavors do we have? Seems like we might want to name this specifically for F5, so that if you need to "list privileged-fobbers" next, we don't need any new bindings.
ae3f4c4 to
588da94
Compare
|
@deads2k @smarterclayton PTAL. Will get the docs PR rolling meanwhile. cc @knobunc |
|
Would the existing |
|
I agree with @liggitt. This is what I was trying to get at yesterday afternoon on IRC before my PC crashed. I was trying to work out if it was better to grant two roles to the F5 router, than make one super-role. Personally, I like the two because it makes it clear that the F5 has extra privs. |
|
+1 for granting system:router (for router-related perms) and system:sdn-reader (for SDN-related perms) |
I think we've all agreed on two, we're just deciding if |
To elaborate, I can envision a router that may want to mutate some resource. I'm hard pressed to come up with a use-case for a "reader" role having mutation privileges. |
Sure... we wouldn't add write permissions to the reader role. I don't know enough about how the SDN objects interact to know if subdividing write access to just some of them is valuable, or if we had a router that needed SDN write permissions, we would just grant the |
|
I am tempted to kill this one and just use SDNReaderRoleName that already exists. The only thing extra over there is the egressnetworkpolicies, harmless to read I think. |
|
This is what will go in for the docs then (we do not need another role here): |
Follow up to #11528