You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I noticed that Kueue does not provide RBAC permissions for Cohort API to update & read by admis.
What you expected to happen:
Kueue provides the RBAC natively as for other cluster-scoped resources (ClusterQueue, ResourceFlavor, Topology).
How to reproduce it (as minimally and precisely as possible):
Execute a request authenticated as a Kueue batch admin.
Anything else we need to know?:
It is not a critical bugs - administrators can easily provide the necessary RBAC, but I think we should strive for consistency, following the principle of least surprise.
Uh oh!
There was an error while loading. Please reload this page.
What happened:
I noticed that Kueue does not provide RBAC permissions for Cohort API to update & read by admis.
What you expected to happen:
Kueue provides the RBAC natively as for other cluster-scoped resources (ClusterQueue, ResourceFlavor, Topology).
How to reproduce it (as minimally and precisely as possible):
Execute a request authenticated as a Kueue batch admin.
Anything else we need to know?:
It is not a critical bugs - administrators can easily provide the necessary RBAC, but I think we should strive for consistency, following the principle of least surprise.
See for comparison RBAC for ResourceFlavor:
https://github.com/kubernetes-sigs/kueue/blob/main/config/components/rbac/resourceflavor_editor_role.yaml
https://github.com/kubernetes-sigs/kueue/blob/main/config/components/rbac/resourceflavor_viewer_role.yaml
The text was updated successfully, but these errors were encountered: