Commit graph

12 commits

Author SHA1 Message Date
Malepati Bala Siva Sai Akhil
d290689dbd Fix minor typo in Role Based Access Control 2017-08-17 03:16:45 +05:30
Mohammad Asif Siddiqui
359f53e4d0 Fix Minor Typo in Readme 2017-08-16 23:52:07 +08:00
Chance Zibolski
8cd18bc205 examples/nginx/rbac: Give access to own namespace
Even with `--force-namespace-isolation`, nginx-ingress-controller still queries for it's own namespace, so give it access to querying namespaces within it's namespace in the nginx-ingress-role.
2017-07-20 16:10:39 -07:00
Manuel de Brito Fontes
f4fe72a247 Release nginx 0.9.0-beta.11 2017-07-15 13:56:38 -04:00
Clayton O'Neill
d19b0b2606 Fix missing hyphen in yaml for nginx RBAC example 2017-07-14 10:53:56 -04:00
Manuel de Brito Fontes
9dec76acda Fix nginx ingress controller release 0.9-beta.9 2017-06-30 10:20:10 -04:00
Manuel de Brito Fontes
796aa945f0 Release nginx ingress controller 0.9-beta.9 2017-06-29 20:00:08 -04:00
Manuel de Brito Fontes
4d4ece1d89 Release nginx ingress controller 0.9-beta.8 2017-06-13 22:22:21 -04:00
Michael Grosser
ec6efbd9d3 Introduce working example of nginx controller with rbac 2017-06-08 06:34:47 +00:00
Andrey Arapov
4618fd2f64
rbac-nginx: resourceNames cannot filter create verb 2017-06-03 11:28:28 +02:00
Jan Weitz
cf4ad26d3c Fix #798 - RBAC for leader election
Using gcr.io/google_containers/nginx-ingress-controller:0.9.0-beta.7
the nginx-controller needs to handle leader-election via configmaps.

To perform the leader-election the nginx-controller needs to have the
appropiate RBAC permissions.

Previously to this fix, the following errors occured:

-  cannot get configmaps in the namespace "NAMESPACE_PLACEHOLDER". (get configmaps ingress-controller-leader-nginx)
- initially creating leader election record: User "system:serviceaccount:NAMESPACE_PLACEHOLDER" cannot create configmaps in the namespace "NAMESPACE_PLACEHOLDER". (post configmaps)

fix ingress rbac roles

There was 2 things that the current IC (0.9 beta7) needs.

The ClusterRole was missing `get nodes`:

```
RBAC DENY: user "system:serviceaccount:kube-system:nginx-ingress-controller" groups [system:serviceaccounts system:serviceaccounts:kube-system system:authenticated] cannot "get" resource "nodes" named "xxx" cluster-wide
```

The Role was missing `update configmaps`:

```RBAC DENY: user "system:serviceaccount:kube-system:nginx-ingress-controller" groups [system:serviceaccounts system:serviceaccounts:kube-system system:authenticated] cannot "update" resource "configmaps" named "ingress-controller-leader-nginx" in namespace "kube-system"```

removed update configmap because of #798

rebased on master, moved get nodes to own rule

added get nodes to cluster permissions
2017-06-02 17:57:15 +02:00
Steve Kallestad
d7c999c970 added rbac example discussed in kubernetes/ingress issue #266 2017-05-23 09:58:53 -07:00