Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
93 changes: 14 additions & 79 deletions charts/kagenti-operator/templates/rbac/role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,21 +9,10 @@ rules:
- ""
resources:
- configmaps
- endpoints
- namespaces
- persistentvolumeclaims
- pods
- pods/log
- secrets
- serviceaccounts
- services
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍 Excellent RBAC hygiene — removing 79 lines of over-provisioned permissions (secrets, CRDs, webhooks, RBAC management, ingresses, deprecated extensions API group) while adding the missing agentruntimes resources. Verified against config/rbac/role.yaml on main: 1:1 match.

verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- ""
Expand All @@ -32,39 +21,21 @@ rules:
verbs:
- create
- patch
- update
- apiGroups:
- admissionregistration.k8s.io
resources:
- mutatingwebhookconfigurations
- validatingwebhookconfigurations
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- apiextensions.k8s.io
- ""
resources:
- customresourcedefinitions
- pods
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- apps
- agent.kagenti.dev
resources:
- daemonsets
- deployments
- replicasets
- statefulsets
- agentcards
- agentruntimes
verbs:
- create
- delete
Expand All @@ -74,56 +45,35 @@ rules:
- update
- watch
- apiGroups:
- apps
- agent.kagenti.dev
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

suggestion (merge coordination): PR #247 (Keycloak client registration) adds a secrets rule to config/rbac/role.yaml. If #247 merges before this PR, you'll need to rebase and add the secrets rule here too — otherwise the Helm chart will drift again on that one resource.

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the heads-up on this. I guess this could be addressed as a follow-up PR since it's still inconclusive which roles will remain in PR #247 .

resources:
- deployments/finalizers
- statefulsets/finalizers
- agentcards/finalizers
- agentruntimes/finalizers
verbs:
- update
- apiGroups:
- extensions
- agent.kagenti.dev
resources:
- daemonsets
- deployments
- replicasets
- agentcards/status
- agentruntimes/status
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- agent.kagenti.dev
- apps
resources:
- agentcards
- deployments
- statefulsets
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- agent.kagenti.dev
resources:
- agentcards/finalizers
verbs:
- update
- apiGroups:
- agent.kagenti.dev
resources:
- agentcards/status
verbs:
- get
- patch
- update
- apiGroups:
- networking.k8s.io
resources:
- ingresses
- networkpolicies
verbs:
- create
Expand All @@ -140,20 +90,5 @@ rules:
verbs:
- get
- list
- watch
- patch
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterrolebindings
- clusterroles
- rolebindings
- roles
verbs:
- create
- delete
- get
- list
- patch
- update
- watch