(helm/v2-alpha): disable cluster wide rbac resource creation#5505
(helm/v2-alpha): disable cluster wide rbac resource creation#5505Allex1 wants to merge 1 commit intokubernetes-sigs:masterfrom
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Allex1 The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Welcome @Allex1! |
|
Hi @Allex1. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
791f3d7 to
b667c2c
Compare
b667c2c to
499e20c
Compare
| # should be restricted to a single namespace or when cluster-wide | ||
| # permissions are managed externally. | ||
| enabled: true | ||
|
|
There was a problem hiding this comment.
We have either :
## Helper RBAC roles for managing custom resources
##
rbacHelpers:
# Install convenience admin/editor/viewer roles for CRDs
enable: false
So, should we have rbac:
Then, insde helpers and default for example instead?
How that would work when the solution is scaffold with the namespaced flag and the RBAC are not cluster scopes? How the Helm Chart would be in this case?
There was a problem hiding this comment.
@camilamacedo86 I could reuse the rbacHelpers.enabled for the main clusterrole/crb if that's what you're asking. The problem right now is that you can only generate helm charts only for cluster admins.
There was a problem hiding this comment.
I see I am think in a way to make it generic enough and address this need.
Could you give me 1 to 2 weeks? I will push that and you can help us to know if that is a good approach. Your collab is very required and welcome btw.
| # Set to false to skip cluster-scoped RBAC, useful when the operator | ||
| # should be restricted to a single namespace or when cluster-wide | ||
| # permissions are managed externally. | ||
| enabled: true |
There was a problem hiding this comment.
Here for example we have no cluster scope rules since this sample is namespaced scope.
See; https://book.kubebuilder.io/migration/namespace-scoped.html
There was a problem hiding this comment.
ok, that could be useful but what I'm trying to achieve is having generated helm charts templates for clickhouse-operator that can work for both cluster admins and name-spaced users.
camilamacedo86
left a comment
There was a problem hiding this comment.
Thanks for raising this — I think we need think through a few design questions before we decide:
a) What’s the best scaffolding approach to support both namespaced and cluster-scoped solutions?
b) We have RBAC helper, so what’s the cleanest way to model/parameterize them in values.yaml?
c) Does it actually make sense to expose this in values at all? Should this be a decision made by the consumer rather than the project authors?
|
@camilamacedo86 to answer your questions: a) I'm fine either way: we could reuse the |
Addresses #5504