There is no way to manage the new ACL features and they are currently redundant as it's not tied in to any part of the codebase
Determine which features belong to which groups and map this to Kubernetes RBAC so when a user logs in, they can only see what they are allowed to, and only do what their Kubernetes access gives them
There is no way to manage the new ACL features and they are currently redundant as it's not tied in to any part of the codebase
Determine which features belong to which groups and map this to Kubernetes RBAC so when a user logs in, they can only see what they are allowed to, and only do what their Kubernetes access gives them