Skip to content

Commit

Permalink
Further limit cluster-wide read-write permissions
Browse files Browse the repository at this point in the history
Signed-off-by: Jason Hall <jasonhall@redhat.com>
  • Loading branch information
imjasonh authored and tekton-robot committed Mar 16, 2021
1 parent 967a654 commit 02f5f42
Showing 1 changed file with 6 additions and 8 deletions.
14 changes: 6 additions & 8 deletions config/200-clusterrole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,19 +50,17 @@ metadata:
app.kubernetes.io/instance: default
app.kubernetes.io/part-of: tekton-pipelines
rules:
# Read-write access to create Pods, K8s Events and PVCs (for Workspaces)
- apiGroups: [""]
resources: ["pods", "pods/log", "events", "configmaps", "persistentvolumeclaims", "limitranges"]
resources: ["pods", "pods/log", "events", "persistentvolumeclaims"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
# Read-only access to these.
- apiGroups: [""]
resources: ["secrets", "serviceaccounts"]
resources: ["configmaps", "limitranges", "secrets", "serviceaccounts"]
verbs: ["get", "list", "watch"]
# Unclear if this access is actually required. Simply a hold-over from the previous
# incarnation of the controller's ClusterRole.
# Read-write access to StatefulSets for Affinity Assistant.
- apiGroups: ["apps"]
resources: ["deployments", "statefulsets"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
- apiGroups: ["apps"]
resources: ["deployments/finalizers"]
resources: ["statefulsets"]
verbs: ["get", "list", "create", "update", "delete", "patch", "watch"]
---
kind: ClusterRole
Expand Down

0 comments on commit 02f5f42

Please sign in to comment.