-
Notifications
You must be signed in to change notification settings - Fork 360
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add user-facing role definitions for Envoy Gateway and Gateway API #4532
base: main
Are you sure you want to change the base?
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #4532 +/- ##
==========================================
- Coverage 65.72% 65.45% -0.27%
==========================================
Files 211 211
Lines 31669 31858 +189
==========================================
+ Hits 20813 20854 +41
- Misses 9656 9759 +103
- Partials 1200 1245 +45 ☔ View full report in Codecov by Sentry. |
@evankanderson Thanks for adding this. The |
Updated, sorry for the delay! |
0997956
to
2c9a80b
Compare
Signed-off-by: Evan Anderson <[email protected]>
Signed-off-by: Evan Anderson <[email protected]>
Signed-off-by: Evan Anderson <[email protected]>
2c9a80b
to
5468f84
Compare
... and fixed whatever happened with merges and DCO that made the DCO-bot mad. |
This pull request has been automatically marked as stale because it has not had activity in the last 30 days. Please feel free to give a status update now, ping for review, when it's ready. Thank you for your contributions! |
thanks for adding this @evankanderson , should we instead generate |
I recall I asked you why EG didn't use |
I'm happy to add those as well, but the aggregated ClusterRoles are handy for smaller clusters where users may be directly assigned the |
thinking out loud, we may still be able to achieve your use case of
|
What type of PR is this?
feat: Add admin/edit/view namespaced rolebindings for gateway.networking.k8s.io and gateway.envoyproxy.io resources
What this PR does / why we need it:
Adds cluster roles which aggregate to the built-in user-facing cluster roles to allow users with namespace-level
admin
,edit
, orview
permissions to view the appropriate Gateway API resources.Which issue(s) this PR fixes:
I didn't open an issue, but with the default helm chart install and
view
on a namespace, I get the following error:Release Notes: Yes