Open andrey-gava opened 3 years ago
I was in need to create access rights for user to read resources in only one specific namespace. So I created ClusterRole:
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: template-namespaced-resources___readonly rules: - apiGroups: - '*' resources: - configmaps - endpoints - persistentvolumeclaims - pods - pods/log - pods/portforward - podtemplates - replicationcontrollers - resourcequotas - secrets - services - events - daemonsets - deployments - replicasets - ingresses - networkpolicies - poddisruptionbudgets - statefulsets - tlsstores - middlewares verbs: - get - list - watch
Despite granted access rights works, and user can read needed resources, the grunted rights not shown in UI poperly.
Its same for v1.6 and 1.7.1-rc1
Hi @andrey-gava Can you check if the bus is still present on the latest version? (v1.8.0 actually)
v1.8.0
Thank you so much for your contribution ⭐
I was in need to create access rights for user to read resources in only one specific namespace. So I created ClusterRole:
Despite granted access rights works, and user can read needed resources, the grunted rights not shown in UI poperly.
Its same for v1.6 and 1.7.1-rc1