Merge pull request #81199 from liggitt/narrow-aggregation-permissions

Use the escalate verb for clusterroleaggregator rather than cluster-admin permissions
This commit is contained in:
Kubernetes Prow Robot 2019-08-13 19:36:37 -07:00 committed by GitHub
commit 77c9e98198
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 10 additions and 10 deletions

View File

@ -85,9 +85,8 @@ func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding)
addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{
ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "clusterrole-aggregation-controller"},
Rules: []rbacv1.PolicyRule{
// this controller must have full permissions to allow it to mutate any role in any way
rbacv1helpers.NewRule("*").Groups("*").Resources("*").RuleOrDie(),
rbacv1helpers.NewRule("*").URLs("*").RuleOrDie(),
// this controller must have full permissions on clusterroles to allow it to mutate them in any way
rbacv1helpers.NewRule("escalate", "get", "list", "watch", "update", "patch").Groups(rbacGroup).Resources("clusterroles").RuleOrDie(),
},
})
addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{

View File

@ -119,15 +119,16 @@ items:
name: system:controller:clusterrole-aggregation-controller
rules:
- apiGroups:
- '*'
- rbac.authorization.k8s.io
resources:
- '*'
- clusterroles
verbs:
- '*'
- nonResourceURLs:
- '*'
verbs:
- '*'
- escalate
- get
- list
- patch
- update
- watch
- apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata: