-
Notifications
You must be signed in to change notification settings - Fork 398
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Epic: API Export Permissions on Binding #1219
Comments
@shawn-hurley the controller my team is building currently needs to be able to create a service account, cluster role, and cluster role bindings through the virtual workspace. Please let me know if you need additional detail. Thanks! |
@shawn-hurley 0.8 check in here. Demo objectives Stories are these scoped for delivery in 0.8? If not can you update the description with expected delivery items?
|
cc @stevekuznetsov for 0.8 check in |
Moved #1337 to after 0.8. All claim-related work for 0.8 is now done. Moving epic milestone to v0.9 |
@sttts how is this different from the local MaximalPermissionPolicy? |
re
I'd say the most basic use case here is "API provider must only be allowed to see the resources it needs and no more", or to be more specific: "you can't see all my secrets" 😄. |
I've expanded on the remaining bullets here to create full issues and migrated this issue to a project view. |
@stevekuznetsov that link gives me a 404 |
Demo Objective
Demo Steps
Stories
------ 0.6 cut line
------- 0.7 cut line
------- 0.7.1 cut line
binding.status.exportPermissionClaims
------- 0.8 cut line
PermissionClaim
s cannot allow privilege escalations #1337) @s-urbaniak-------- MVP complete – testing-ready --------
kubectl kcp apis bind | accept | reject
– sketch out a command @dinhxuanvu feature: A Command-Line Interface For Managing API Bindings #1935The text was updated successfully, but these errors were encountered: