Fix ClusterRole for web-check (#4599)

As reported in #4259 linkerd check run from linkerd's web cconsole is
broken as the underlying RBAC Role cannot access the apiregistration.k8s.io API Group.

With this commit the RBAC Role is fixed allowing read-only access to the API Group
apiregistration.k8s.io.

Fixes #4259

Signed-off-by: alex.berger@nexiot.ch <alex.berger@nexiot.ch>
This commit is contained in:
Alexander Berger 2020-06-15 19:21:00 +02:00 committed by GitHub
parent 99a9f1c2c2
commit b509742c7d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
36 changed files with 108 additions and 0 deletions

View File

@ -69,6 +69,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -235,6 +235,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -288,6 +288,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -288,6 +288,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -288,6 +288,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding

View File

@ -276,6 +276,9 @@ rules:
- apiGroups: ["linkerd.io"]
resources: ["serviceprofiles"]
verbs: ["list"]
- apiGroups: ["apiregistration.k8s.io"]
resources: ["apiservices"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding