kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy
Kubernetes Submit Queue 7f87337b8b
Merge pull request #56650 from danwinship/networkpolicy-rbac
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Add RBAC policies for NetworkPolicy

**What this PR does / why we need it**:
When using RBAC, none of the namespace-level roles currently have permission to do anything with NetworkPolicy. (Only cluster-admin does, by virtue of having permission on "*".) This fixes it so "admin" and "edit" have read/write permission, and "view" has read-only permission.

I added permission for both the extensions and networking objects, which I believe is correct as long as both of them exist?

(This would be nice to fix in 1.9, although it's not a regression. It's always been broken.)

**Release note**:
```release-note
When using Role-Based Access Control, the "admin", "edit", and "view" roles now have the expected permissions on NetworkPolicy resources.
```
2017-12-16 12:09:11 -08:00
..
testdata Merge pull request #56650 from danwinship/networkpolicy-rbac 2017-12-16 12:09:11 -08:00
BUILD Update generated files 2017-11-09 12:14:08 +01:00
controller_policy.go CSI - feature gate fix, gated RBAC rules, csi nodeID label 2017-12-02 05:54:54 -05:00
controller_policy_test.go handle clusterrole migration 2017-11-13 08:18:00 -05:00
namespace_policy.go Merge pull request #46685 from xilabao/fix-err-message-in-namespace_policy 2017-08-03 23:59:05 -07:00
policy.go Merge pull request #56650 from danwinship/networkpolicy-rbac 2017-12-16 12:09:11 -08:00
policy_test.go handle clusterrole migration 2017-11-13 08:18:00 -05:00