mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-27 05:27:21 +00:00
Fix bootstrap roles to allow list/watch secrets/configmaps from nodes
This commit is contained in:
parent
f344c5c062
commit
b2500d41e9
@ -126,7 +126,7 @@ func NodeRules() []rbac.PolicyRule {
|
|||||||
// Needed for imagepullsecrets, rbd/ceph and secret volumes, and secrets in envs
|
// Needed for imagepullsecrets, rbd/ceph and secret volumes, and secrets in envs
|
||||||
// Needed for configmap volume and envs
|
// Needed for configmap volume and envs
|
||||||
// Use the Node authorization mode to limit a node to get secrets/configmaps referenced by pods bound to itself.
|
// Use the Node authorization mode to limit a node to get secrets/configmaps referenced by pods bound to itself.
|
||||||
rbac.NewRule("get").Groups(legacyGroup).Resources("secrets", "configmaps").RuleOrDie(),
|
rbac.NewRule("get", "list", "watch").Groups(legacyGroup).Resources("secrets", "configmaps").RuleOrDie(),
|
||||||
// Needed for persistent volumes
|
// Needed for persistent volumes
|
||||||
// Use the Node authorization mode to limit a node to get pv/pvc objects referenced by pods bound to itself.
|
// Use the Node authorization mode to limit a node to get pv/pvc objects referenced by pods bound to itself.
|
||||||
rbac.NewRule("get").Groups(legacyGroup).Resources("persistentvolumeclaims", "persistentvolumes").RuleOrDie(),
|
rbac.NewRule("get").Groups(legacyGroup).Resources("persistentvolumeclaims", "persistentvolumes").RuleOrDie(),
|
||||||
|
@ -1112,6 +1112,8 @@ items:
|
|||||||
- secrets
|
- secrets
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
|
Loading…
Reference in New Issue
Block a user