You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/master/guides/working-without-rbac-manager.md
+20-8Lines changed: 20 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,21 +3,30 @@ title: Working without RBAC Manager
3
3
weight: 280
4
4
---
5
5
6
-
RBAC Manager is responsible for granting appropriate permissions to components.
6
+
RBAC Manager is responsible for establishing appropriate roles structure to components.
7
7
8
8
In cases, where administrators are not allowing permissive cluster wide-permissions,you can turn off RBAC Manager
9
-
with argument `--set rbacManager.deploy=false` in [helm chart](https://github.com/crossplane/crossplane/blob/main/cluster/charts/crossplane/README.md#configuration).
9
+
with argument `--set rbacManager.deploy=false` in [helm chart](https://github.com/crossplane/crossplane/blob/main/cluster/charts/crossplane/README.md#configuration) during installation.
10
10
```yaml {label="value",copy-lines="none"}
11
11
rbacManager:
12
12
enabled: false
13
13
```
14
14
15
-
Once done, you need to configure custom permissions for each provider and custom resource definition. Below guides
16
-
will instruct you step by step the additional work needed for each provider and XRD.
15
+
Once done, you need to configure Roles on your own for each provider and Composition Resource Definitions (XRDs).
16
+
Below guides will instruct you step by step the additional work needed for each provider and XRD to be able to
17
+
successfully deploy a provider and an XRD.
18
+
19
+
The guide only establishes minimal number of resources to fulfill the guide's goal, RBAC Manager creates more resources
has more information on the installed _ClusterRoles_.
23
+
24
+
> Note: The guide doesn't address any cluster-wide permissions that are used in Core Crossplane service.
17
25
18
26
## Provider RBAC
19
27
20
-
> Note: Please keep in mind this guide doesn't show manual steps for installing providers. If you want to control Crossplane Core pod permissions even further, you can manually install the provider service.
28
+
> Note: Please keep in mind this guide doesn't show manual steps for installing providers. If you want to control
29
+
> Crossplane Core pod permissions even further, you can manually install the provider service.
21
30
22
31
For the prpose of this guide, let's assume you want to deploy a `provider-kubernetes` to the cluster and control its
23
32
permissions. You create a resource provider as usual
@@ -34,7 +43,7 @@ Once installed, save provider service account name
34
43
SA=$(kubectl -n crossplane-system get sa -o name | grep provider-kubernetes | sed -e 's|serviceaccount\/||g')
35
44
```
36
45
37
-
### ClusterRole for provider
46
+
### Provider ClusterRole
38
47
39
48
Then, create a ClusterRole, that will have necessary rules for resources that are to be managed by a provider:
40
49
```yaml
@@ -96,7 +105,7 @@ subjects:
96
105
namespace: crossplane-system
97
106
```
98
107
99
-
### ClusterRole for core Crossplane
108
+
### Core Crossplane ClusterRole
100
109
101
110
Now, create a new ClusterRole, for core Crossplane service
102
111
```yaml
@@ -182,10 +191,11 @@ spec:
182
191
name: kubernetes-provider-config
183
192
```
184
193
185
-
## Compositions
194
+
## Composition Resource Definitions RBAC
186
195
If you want to add a CompositionResourceDefinition in a system without RBAC Manager, you need to create the
187
196
necessary XRD definition as well as assign permissions to the defined type to Core Crossplane ServiceAccount.
188
197
198
+
### XRD ClusterRole
189
199
For the purpose of the example, let's create a sample XRD:
0 commit comments