We need to pay attention on the permission when there are APIs changed. There are three types of permissions:
- Anonymous
- Global or cluster level
- Resource specific
Please don't forget to add the corresponding permission setting to role-templates.yaml when you are trying to change (add, remove) any APIs.
You could update the GlobalRole
which is anonymous when you are trying to create a new anonymous API.
As we know, some APIs does not belong to any CR (custom resource). For example: ci/nodelabels
.
Update here when you update a global API.
You could create (or update) an CR (custom resource) that is RoleBase
when you are trying to
create a new resource specific API. Such as, role-template-manage-pipelines.
Please feel free to add the following item into a GlobalRole
of authenticated
:
You could find it by: kubectl edit globalrole authenticated
rules:
- apiGroups:
- devops.kubesphere.io
resources:
- devops
- pipelines
- pipelines/branches
- pipelineruns
- pipelineruns/nodedetails
verbs:
- get