Merge pull request #52654 from liggitt/pdb-permissions
Automatic merge from submit-queue (batch tested with PRs 53263, 52967, 53262, 52654, 53187). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. Add pod disruption budgets to admin/edit/view roles Closes #50767 cc @kubernetes/sig-auth-pr-reviews @kubernetes/sig-node-pr-reviews ```release-note RBAC: The default `admin` and `edit` roles now include read/write permissions and the `view` role includes read permissions on `poddisruptionbudget.policy` resources. ```
This commit is contained in:
		@@ -189,6 +189,8 @@ func ClusterRoles() []rbac.ClusterRole {
 | 
				
			|||||||
					"deployments", "deployments/scale", "deployments/rollback", "ingresses",
 | 
										"deployments", "deployments/scale", "deployments/rollback", "ingresses",
 | 
				
			||||||
					"replicasets", "replicasets/scale", "replicationcontrollers/scale").RuleOrDie(),
 | 
										"replicasets", "replicasets/scale", "replicationcontrollers/scale").RuleOrDie(),
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									rbac.NewRule(ReadWrite...).Groups(policyGroup).Resources("poddisruptionbudgets").RuleOrDie(),
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				// additional admin powers
 | 
									// additional admin powers
 | 
				
			||||||
				rbac.NewRule("create").Groups(authorizationGroup).Resources("localsubjectaccessreviews").RuleOrDie(),
 | 
									rbac.NewRule("create").Groups(authorizationGroup).Resources("localsubjectaccessreviews").RuleOrDie(),
 | 
				
			||||||
				rbac.NewRule(ReadWrite...).Groups(rbacGroup).Resources("roles", "rolebindings").RuleOrDie(),
 | 
									rbac.NewRule(ReadWrite...).Groups(rbacGroup).Resources("roles", "rolebindings").RuleOrDie(),
 | 
				
			||||||
@@ -220,6 +222,8 @@ func ClusterRoles() []rbac.ClusterRole {
 | 
				
			|||||||
				rbac.NewRule(ReadWrite...).Groups(extensionsGroup).Resources("daemonsets",
 | 
									rbac.NewRule(ReadWrite...).Groups(extensionsGroup).Resources("daemonsets",
 | 
				
			||||||
					"deployments", "deployments/scale", "deployments/rollback", "ingresses",
 | 
										"deployments", "deployments/scale", "deployments/rollback", "ingresses",
 | 
				
			||||||
					"replicasets", "replicasets/scale", "replicationcontrollers/scale").RuleOrDie(),
 | 
										"replicasets", "replicasets/scale", "replicationcontrollers/scale").RuleOrDie(),
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									rbac.NewRule(ReadWrite...).Groups(policyGroup).Resources("poddisruptionbudgets").RuleOrDie(),
 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -243,6 +247,8 @@ func ClusterRoles() []rbac.ClusterRole {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
				rbac.NewRule(Read...).Groups(extensionsGroup).Resources("daemonsets", "deployments", "deployments/scale",
 | 
									rbac.NewRule(Read...).Groups(extensionsGroup).Resources("daemonsets", "deployments", "deployments/scale",
 | 
				
			||||||
					"ingresses", "replicasets", "replicasets/scale", "replicationcontrollers/scale").RuleOrDie(),
 | 
										"ingresses", "replicasets", "replicasets/scale", "replicationcontrollers/scale").RuleOrDie(),
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									rbac.NewRule(Read...).Groups(policyGroup).Resources("poddisruptionbudgets").RuleOrDie(),
 | 
				
			||||||
			},
 | 
								},
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -141,6 +141,19 @@ items:
 | 
				
			|||||||
    - patch
 | 
					    - patch
 | 
				
			||||||
    - update
 | 
					    - update
 | 
				
			||||||
    - watch
 | 
					    - watch
 | 
				
			||||||
 | 
					  - apiGroups:
 | 
				
			||||||
 | 
					    - policy
 | 
				
			||||||
 | 
					    resources:
 | 
				
			||||||
 | 
					    - poddisruptionbudgets
 | 
				
			||||||
 | 
					    verbs:
 | 
				
			||||||
 | 
					    - create
 | 
				
			||||||
 | 
					    - delete
 | 
				
			||||||
 | 
					    - deletecollection
 | 
				
			||||||
 | 
					    - get
 | 
				
			||||||
 | 
					    - list
 | 
				
			||||||
 | 
					    - patch
 | 
				
			||||||
 | 
					    - update
 | 
				
			||||||
 | 
					    - watch
 | 
				
			||||||
  - apiGroups:
 | 
					  - apiGroups:
 | 
				
			||||||
    - authorization.k8s.io
 | 
					    - authorization.k8s.io
 | 
				
			||||||
    resources:
 | 
					    resources:
 | 
				
			||||||
@@ -322,6 +335,19 @@ items:
 | 
				
			|||||||
    - patch
 | 
					    - patch
 | 
				
			||||||
    - update
 | 
					    - update
 | 
				
			||||||
    - watch
 | 
					    - watch
 | 
				
			||||||
 | 
					  - apiGroups:
 | 
				
			||||||
 | 
					    - policy
 | 
				
			||||||
 | 
					    resources:
 | 
				
			||||||
 | 
					    - poddisruptionbudgets
 | 
				
			||||||
 | 
					    verbs:
 | 
				
			||||||
 | 
					    - create
 | 
				
			||||||
 | 
					    - delete
 | 
				
			||||||
 | 
					    - deletecollection
 | 
				
			||||||
 | 
					    - get
 | 
				
			||||||
 | 
					    - list
 | 
				
			||||||
 | 
					    - patch
 | 
				
			||||||
 | 
					    - update
 | 
				
			||||||
 | 
					    - watch
 | 
				
			||||||
- apiVersion: rbac.authorization.k8s.io/v1
 | 
					- apiVersion: rbac.authorization.k8s.io/v1
 | 
				
			||||||
  kind: ClusterRole
 | 
					  kind: ClusterRole
 | 
				
			||||||
  metadata:
 | 
					  metadata:
 | 
				
			||||||
@@ -981,5 +1007,13 @@ items:
 | 
				
			|||||||
    - get
 | 
					    - get
 | 
				
			||||||
    - list
 | 
					    - list
 | 
				
			||||||
    - watch
 | 
					    - watch
 | 
				
			||||||
 | 
					  - apiGroups:
 | 
				
			||||||
 | 
					    - policy
 | 
				
			||||||
 | 
					    resources:
 | 
				
			||||||
 | 
					    - poddisruptionbudgets
 | 
				
			||||||
 | 
					    verbs:
 | 
				
			||||||
 | 
					    - get
 | 
				
			||||||
 | 
					    - list
 | 
				
			||||||
 | 
					    - watch
 | 
				
			||||||
kind: List
 | 
					kind: List
 | 
				
			||||||
metadata: {}
 | 
					metadata: {}
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user