linkerd2/pkg/profiles
Andrew Seigner ec5a0ca8d9
Authorization-aware control-plane components (#2349)
The control-plane components relied on a `--single-namespace` param,
passed from `linkerd install` into each individual component, to
determine which namespaces they were authorized to access, and whether
to support ServiceProfiles. This command-line flag was redundant given
the authorization rules encoded in the parent `linkerd install` output,
via [Cluster]Role[Binding]s.

Modify the control-plane components to query Kubernetes at startup to
determine which namespaces they are authorized to access, and whether
ServiceProfile support is available. This allows removal of the
`--single-namespace` flag on the components.

Also update `bin/test-cleanup` to cleanup the ServiceProfile CRD.

TODO:
- Remove `--single-namespace` flag on `linkerd install`, part of #2164

Signed-off-by: Andrew Seigner <siggy@buoyant.io>
2019-02-26 11:54:52 -08:00
..
openapi.go Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
openapi_test.go Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
profiles.go Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
profiles_test.go lint: Enable scopelint (#2364) 2019-02-24 08:59:51 -08:00
proto.go Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
proto_test.go Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
tap.go Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
tap_test.go Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00
template.go Read service profiles from client or server namespace instead of control namespace (#2200) 2019-02-07 14:51:43 -08:00
test_helper.go Authorization-aware control-plane components (#2349) 2019-02-26 11:54:52 -08:00