mirror of https://github.com/k3s-io/k3s
allow the kubelet to request certificates
This allows the rotation process to use the kubelet's credentials.pull/6/head
parent
ab794c6128
commit
074f2da32a
|
@ -217,6 +217,9 @@ func ClusterRoles() []rbac.ClusterRole {
|
||||||
// TODO: change glusterfs to use DNS lookup so this isn't needed?
|
// TODO: change glusterfs to use DNS lookup so this isn't needed?
|
||||||
// Needed for glusterfs volumes
|
// Needed for glusterfs volumes
|
||||||
rbac.NewRule("get").Groups(legacyGroup).Resources("endpoints").RuleOrDie(),
|
rbac.NewRule("get").Groups(legacyGroup).Resources("endpoints").RuleOrDie(),
|
||||||
|
// Used to create a certificatesigningrequest for a node-specific client certificate, and watch
|
||||||
|
// for it to be signed. This allows the kubelet to rotate it's own certificate.
|
||||||
|
rbac.NewRule("create", "get", "list", "watch").Groups(certificatesGroup).Resources("certificatesigningrequests").RuleOrDie(),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -569,6 +569,15 @@ items:
|
||||||
- endpoints
|
- endpoints
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
|
- apiGroups:
|
||||||
|
- certificates.k8s.io
|
||||||
|
resources:
|
||||||
|
- certificatesigningrequests
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
- apiVersion: rbac.authorization.k8s.io/v1beta1
|
- apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
|
|
Loading…
Reference in New Issue