Add aggregated RBAC for VolumeSnapshots#1364
Add aggregated RBAC for VolumeSnapshots#1364RoniKishner wants to merge 1 commit intokubernetes-csi:masterfrom
Conversation
Assisted-by: Cursor Signed-off-by: Roni Kishner <rkishner@redhat.com>
|
|
|
Welcome @RoniKishner! |
|
Hi @RoniKishner. Thanks for your PR. I'm waiting for a kubernetes-csi member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: RoniKishner The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
What type of PR is this?
/kind api-change
What this PR does / why we need it:
This PR adds aggregated ClusterRoles (snapshot-admin, snapshot-edit, snapshot-view) that automatically extend the built-in Kubernetes admin, edit, and view roles with permissions for VolumeSnapshot resources.
Non-admin users can GET/list PVCs but cannot access VolumeSnapshots, even when they have admin, edit, or view roles in a namespace. This is because PVC permissions are built into Kubernetes core, while VolumeSnapshot (as a CRD) requires explicit aggregated RBAC rules
Non-admin users can GET/list PVCs but cannot access VolumeSnapshots, even when they have admin, edit, or view roles in a namespace. This is because PVC permissions are built into Kubernetes core, while VolumeSnapshot (as a CRD) requires explicit aggregated RBAC rules. Since VolumeSnapshots are created from PVCs and used to restore PVCs, users who can manage PVCs should have equivalent access to VolumeSnapshots.
Does this PR introduce a user-facing change?: