Files
kubernetes/test
Patrick Ohly ee3205804b dra e2e: demonstrate how to use RBAC + VAP for a kubelet plugin
In reality, the kubelet plugin of a DRA driver is meant to be deployed as a
daemonset with a service account that limits its
permissions. https://kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/#additional-metadata-in-pod-bound-tokens
ensures that the node name is bound to the pod, which then can be used
in a validating admission policy (VAP) to ensure that the operations are
limited to the node.

In E2E testing, we emulate that via impersonation. This ensures that the plugin
does not accidentally depend on additional permissions.
2024-07-18 23:30:09 +02:00
..
2024-06-26 01:07:24 +08:00
2024-05-24 10:02:51 +03:00
2021-03-04 07:54:53 +01:00
2024-02-29 22:07:00 -08:00
2023-05-11 16:43:38 +00:00