kubermatic / dashboard

Dashboard For The Kubermatic Kubernetes Platform
https://www.kubermatic.com
Other
42 stars 62 forks source link

KKP Admin not able to manage RBAC assignment and Project assignment #6753

Closed toschneck closed 2 months ago

toschneck commented 3 months ago

What happened?

As KKP Admin, I would like to controll every setting of any user cluster, even if I'm not Part of the project. Currently I can't add a new RBAC Binding, when my account doesn't belong to the Project, even if I'm KKP super admin: Cluster 'dev-k8s01-nun' in Project 'sinapse-dev' 2024-07-12 11-07-50

If try to workaround and add my-self to the project as admin, I can't do it, as this is not allowed (what is not correct in my opinion) User Settings in Project 'sinapse-dev' 2024-07-12 11-11-38

Expected behavior

As KKP Admin I should have full rights on the platform and allowed to do:

How to reproduce the issue?

Login as KKP Admin, choose an Project where you are not Member of it and try

How is your environment configured?

Provide your KKP manifest here (if applicable)

See https://github.com/kubermatic/demo-infra/tree/main/kubermatic

```yaml # paste manifest here ```

What cloud provider are you running on?

doesn't matter

What operating system are you running in your user cluster?

doesn't matter

Additional information

toschneck commented 3 months ago

/label customer-request

judge-red commented 3 months ago

I've brought this up as a bug with Kubermatic almost 1.5 years ago, but unfortunately the result of internal discussions communicated to me was "KKP Admins should be only allowed for displaying all resources and interactions like editing/creating/removing should not be possible". They acknowledged that this isn't currently true either, as KKP admins can take several CRUD actions in projects. Thus this was created: https://github.com/kubermatic/docs/issues/1362

I still disagree with that view, thus I would very much like to see this issue here adressed instead.

But the problem is more complicated, here's another example:

In general, the KKP admin privileges on the dashboard feel random and often wrong.

csengerszabo commented 3 months ago

/label sig/cluster-management /label sig/api /label sig/ui

csengerszabo commented 3 months ago

/kind feature

csengerszabo commented 3 months ago

/remove-label sig/cluster-management

csengerszabo commented 3 months ago

/assign @ahmadhamzh

ahmadhamzh commented 3 months ago

/transfer-issue dashboard