-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update bootstrap policy with replicaset/daemonset permissions in the apps API group #54309
Update bootstrap policy with replicaset/daemonset permissions in the apps API group #54309
Conversation
20a9767
to
3789051
Compare
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ericchiang, liggitt Associated issue: 54310 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/test pull-kubernetes-bazel-test |
@pwittrock saw an unexpected flake on https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/pr-logs/pull/54309/pull-kubernetes-bazel-test/11424/ with apply |
Automatic merge from submit-queue (batch tested with PRs 52147, 54309). If you want to cherry-pick this change to another branch, please follow the instructions here. |
@@ -98,7 +98,7 @@ func buildControllerRoles() ([]rbac.ClusterRole, []rbac.ClusterRoleBinding) { | |||
rbac.NewRule("get", "list", "watch", "update").Groups(extensionsGroup, appsGroup).Resources("deployments").RuleOrDie(), | |||
rbac.NewRule("update").Groups(extensionsGroup, appsGroup).Resources("deployments/status").RuleOrDie(), | |||
rbac.NewRule("update").Groups(extensionsGroup, appsGroup).Resources("deployments/finalizers").RuleOrDie(), | |||
rbac.NewRule("get", "list", "watch", "create", "update", "patch", "delete").Groups(extensionsGroup).Resources("replicasets").RuleOrDie(), | |||
rbac.NewRule("get", "list", "watch", "create", "update", "patch", "delete").Groups(appsGroup, extensionsGroup).Resources("replicasets").RuleOrDie(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did we want to remove the extensions group from here in permissions?
cc @kow3ns
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not until the resource is removed from the extensions API grou
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh, nvm. misread the change. I thought it was replacing extensions with apps.
@liggitt so the controllers only use extensions right now. When we move them to apps, they will only use apps. I don't think we actually need permissions for apps until then, and I don't see why we would ever add permissions for both. |
including the new group when the type moves ensures a smooth transition for the controller on rolling upgrades |
@liggitt true, but we can only update to appsv1beta2 because we need to ensure everything works in a mixed mode, multi-master cluster during a 1.8 - 1.9 upgrade scenario. After we introduce v1, the subsequent release should see the controllers switched over to v1 while meeting that requirement. i.e. 1.9 - 1.10 upgrade would be correctly supported with all controllers using the AppsV1() interface. |
Thanks |
Resolves #54310
Bootstrap policy was not updated when replicasets and daemonsets got promoted to the apps group