-
Notifications
You must be signed in to change notification settings - Fork 183
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Namespace-Level Permission Check if Cluster-level fail #1195
Comments
@Jaguar-Kwok , if you do not have access for all namespaces, you can set up your accessible namespaces in the cluster settings. |
@joaquimrocha Thank you for your reply. |
@Jaguar-Kwok , I see. Given that one may not have the permissions to list all namespaces, I am not sure an auto detection would work. But we can add the comma separated parsing. Also, if you have a group of users that are using Headlamp, you can create a plugin that simply adds a certain list of namespaces as the allowed ones, so all users will have this list by default at least. |
I would definitely expect that if user CAN list all namespaces and CAN list pods in some of those namespaces then he can see only namespaces where he has any permissions and pods from those namespaces ass well. |
Also I think this is connected with #752. |
We are also having this problem. I understand we can ask users to set the accessible namespaces in the cluster settings but this is not the best user experience when a user has a lot of namespaces to manage. I know other dashboards, like Skooner (which I don't want to use since it doesn't seem like it is maintained anymore) require "List all namespaces" permissions for all users, which is reasonable since there is no other way to know what namespaces exist. But once the user uses "filter" to drill down to a specific namespace all the API calls are made using that namespace filter. I think headlamp has room to improve here. Basically, I believe headlamp works like this:
|
@joaquimrocha just wondering if what I said makes sense or you see problems with the logic. I don't expect this to be a high priority to fix but just hoping to get some visibility on this and see if it is possible to implement this in the future |
If a user lacks permission to access all pods at the cluster level, the system should attempt to verify the user's permissions at the namespace level. If the user has the necessary permissions, the relevant pods should be displayed, rather than presenting a 'no permission' message, especially the user have GET cluster-level namespace permission but not GET cluster-level pod permission.
The text was updated successfully, but these errors were encountered: