Skip to content

One pager for a namespace-restricted option#6419

Merged
negz merged 1 commit intocrossplane:mainfrom
orange-cloudfoundry:one-pager-namespace-restricted
Oct 9, 2025
Merged

One pager for a namespace-restricted option#6419
negz merged 1 commit intocrossplane:mainfrom
orange-cloudfoundry:one-pager-namespace-restricted

Conversation

@frigaut-orange
Copy link
Copy Markdown
Contributor

Description of your changes

This one pager proposes a new --namespace-restricted option for Crossplane in order for it to work in evironments where rights on cluster-scoped resources are limited.

Related issue : #6348

I have:

  • Read and followed Crossplane's [contribution process].
  • Run earthly +reviewable to ensure this PR is ready for review.
  • [ ] Added or updated unit tests.
  • [ ] Added or updated e2e tests.
  • [ ] Linked a PR or a [docs tracking issue] to [document this change].
  • [ ] Added backport release-x.y labels to auto-backport this PR.
  • [ ] Followed the [API promotion workflow] if this PR introduces, removes, or promotes an API.

Signed-off-by: François Rigaut <francois.rigaut@orange.com>
```

Assuming crossplane has admin rights on all resources in its own namespace (or at
least rights that are currently defined in the ClusterRole, except in a Role instead)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The RBAC manager also has rights to make ClusterRole resources:

- apiGroups:
  - rbac.authorization.k8s.io
  resources:
  - clusterroles
  verbs:
  - bind
- apiGroups:
  - rbac.authorization.k8s.io
  resources:
  - clusterrolebindings
  verbs:
  - "*"
- apiGroups:
  - ""
  - coordination.k8s.io
  resources:
  - configmaps
  - leases
  verbs:
  - get
  - list
  - create
  - update
  - patch
  - watch
  - delete

The proposal should look at addressing how the RBAC manager should change? One option could be strict mode where the tooling installs Aggregated RBAC roles into the cluster while installing providers/XRDs?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, I see:

1. Disable the RBAC manager pod, since the objective is to manage permissions 
   specific to an ecosystem (i.e. outside of Crossplane).

@github-actions
Copy link
Copy Markdown

github-actions bot commented Sep 4, 2025

Crossplane does not currently have enough maintainers to address every issue and pull request. This pull request has been automatically marked as stale because it has had no activity in the last 90 days. It will be closed in 14 days if no further activity occurs. Adding a comment starting with /fresh will mark this PR as not stale.

@github-actions github-actions bot added the stale label Sep 4, 2025
@frigaut-orange
Copy link
Copy Markdown
Contributor Author

/fresh

@github-actions github-actions bot removed the stale label Sep 4, 2025
Copy link
Copy Markdown
Member

@negz negz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

TIL I never approved and merged this. Sorry! I'm approving given you've already been chipping away at this work. 😄

@negz negz closed this Oct 9, 2025
@negz negz reopened this Oct 9, 2025
@negz
Copy link
Copy Markdown
Member

negz commented Oct 9, 2025

Closed and reopened to trigger CI.

@negz negz merged commit e880f88 into crossplane:main Oct 9, 2025
23 of 24 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants