Introduce tap-admin ClusterRole, web privs flag#3203
Conversation
|
Integration test results for afcf1ac: success 🎉 |
cli/cmd/install.go
Outdated
| ) | ||
| flags.BoolVar( | ||
| &options.restrictDashboardPrivileges, "restrict-dashboard-privileges", options.restrictDashboardPrivileges, | ||
| "Restrict the Linkerd Dashboard's default privileges to disallow Tap.", |
There was a problem hiding this comment.
Minuscule nit: no other help description finishes with a dot 😜
alpeb
left a comment
There was a problem hiding this comment.
Besides my nit above, it looks good to me 👍
I assume the dashboard's tap still works with --restrict-dashboard-privileges because it's hitting the old tap API?
|
Oh I did found an issue afterwards: the new flag is exposed in |
|
Installation works great with both Some questions:
|
|
@alpeb Nice catch re: this flag not being on |
|
@ihcsim Good questions re: the rbac stuff.
My understanding is that since the
If the
We do default to installing |
79adcdd to
859fb03
Compare
|
Integration test results for 859fb03: fail 😕 |
859fb03 to
b40e06c
Compare
|
Integration test results for b40e06c: fail 😕 |
d9acd3b to
a7be9e0
Compare
The web dashboard will be migrating to the new Tap APIService, which requires RBAC privileges to access. Introduce a new ClusterRole, `linkerd-linkerd-tap-admin`, which gives cluster-wide tap privileges. Also introduce a new ClusterRoleBinding, `linkerd-linkerd-web-admin` which binds the `linkerd-web` service account to the new tap ClusterRole. This ClusterRoleBinding is enabled by default, but may be disabled via a new `linkerd install` flag `--restrict-dashboard-privileges`. Fixes #3177 Signed-off-by: Andrew Seigner <[email protected]>
also misc cleanup of flag code Signed-off-by: Andrew Seigner <[email protected]>
a7be9e0 to
773e9fc
Compare
|
Integration test results for 773e9fc: success 🎉 |
The web dashboard will be migrating to the new Tap APIService, which
requires RBAC privileges to access.
Introduce a new ClusterRole,
linkerd-linkerd-tap-admin, which givescluster-wide tap privileges. Also introduce a new ClusterRoleBinding,
linkerd-linkerd-web-adminwhich binds thelinkerd-webserviceaccount to the new tap ClusterRole. This ClusterRoleBinding is enabled
by default, but may be disabled via a new
linkerd installflag--restrict-dashboard-privileges.Fixes #3177
Signed-off-by: Andrew Seigner [email protected]