Is your improvement request related to a problem? Please describe.
Now, we always use the super user kubeconfig to use kbcli, BUT, in most cases, users may only have permissions for a certain namespace, for example, sealos, we should test kbcli use this kind kubeconfig.
The role should have authorization to access KubeBlocks cluster-level resources, such as CRD:
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
namespace: default
name: read-crd-role
rules:
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
verbs:
- get
- list
- watch
If this is a new function, please describe the motivation and goals.
A clear and concise description of why you want to happen, link the design doc if possible
Describe the solution you'd like
A clear and concise description of what you want to happen.
Describe alternatives you've considered
A clear and concise description of any alternative solutions or fuctions you've considered.
Additional context
Add any other context or screenshots about the improvement request here.
Is your improvement request related to a problem? Please describe.
Now, we always use the super user kubeconfig to use kbcli, BUT, in most cases, users may only have permissions for a certain namespace, for example, sealos, we should test kbcli use this kind kubeconfig.
The role should have authorization to access KubeBlocks cluster-level resources, such as CRD:
Get all cluster-level resource:
If this is a new function, please describe the motivation and goals. A clear and concise description of why you want to happen, link the design doc if possible
Describe the solution you'd like A clear and concise description of what you want to happen.
Describe alternatives you've considered A clear and concise description of any alternative solutions or fuctions you've considered.
Additional context Add any other context or screenshots about the improvement request here.