Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update RBAC doc #2618

Merged
merged 1 commit into from
Mar 7, 2017
Merged

Update RBAC doc #2618

merged 1 commit into from
Mar 7, 2017

Conversation

liggitt
Copy link
Member

@liggitt liggitt commented Feb 25, 2017

  • Adds TOC to RBAC page
  • Adds information about role auto-reconciliation
  • Adds all default roles and rolebindings (and categorizes them)
  • Adds forward-looking statements about Kubelet username authorization

Preview at https://deploy-preview-2618--kubernetes-io-master-staging.netlify.com/docs/admin/authorization/rbac/


This change is Reviewable

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Feb 25, 2017
@liggitt
Copy link
Member Author

liggitt commented Feb 25, 2017

cc @kubernetes/sig-auth-misc

<td><b>system:nodes</b> group</td>
<td>Allows access to resources required by the kubelet component, <b>including read access to secrets, and write access to pods</b>.
In the future, read access to secrets and write access to pods will be restricted to objects scheduled to the node.
To maintain permissions in the future, Kubelets must identify themselves with a username in the form <b>system:node:&lt;node-name&gt;</b>.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You keying based on group or only based on name?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

both, probably? will update.

don't already have even when the RBAC authorizer it disabled__. If "user-1"
does not have the ability to read secrets in "namespace-a", they cannot create
a binding that would grant that permission to themselves or any other user.
The RBAC API inherently prevents users from escalating privileges by editing roles or role bindings.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems like you should describe the permission we use to allow binding an escalating role.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do, later. hoist it into the summary?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do, later. hoist it into the summary?

Yeah. The summary is no longer accurate.

@deads2k
Copy link
Contributor

deads2k commented Feb 27, 2017

lgtm otherwise

@chenopis
Copy link
Contributor

chenopis commented Mar 6, 2017

@liggitt @deads2k Is the ready to be merged?

@liggitt
Copy link
Member Author

liggitt commented Mar 6, 2017

I'm working on addressing the few comments. Will push an update tonight

@chenopis
Copy link
Contributor

chenopis commented Mar 6, 2017

@liggitt Great, thanks!

@liggitt
Copy link
Member Author

liggitt commented Mar 7, 2017

@deads2k comments addressed, PTAL

@deads2k
Copy link
Contributor

deads2k commented Mar 7, 2017

lgtm

@chenopis chenopis merged commit d7e5371 into kubernetes:release-1.6 Mar 7, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants