You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Just like org.cdk8s.plus29.k8s.PolicyRule allows you to provide resourceNames as a qualifier for the privileges, so should org.cdk8s.plus29.ClusterRolePolicyRule.
Use Case:
Needed to achieve the equivalent of:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
role: myRole
name: myRole
rules:
apiGroups:
""
resourceNames:
myConfigMap
resources:
configmaps
verbs:
get
list
watch
Proposed Solution:
Not read up on the repo enough to do that.
Other:
👋 I may be able to implement this feature request
⚠️ This feature might incur a breaking change
This is a 🚀 Feature Request
The text was updated successfully, but these errors were encountered:
Description of the feature or enhancement:
Just like org.cdk8s.plus29.k8s.PolicyRule allows you to provide resourceNames as a qualifier for the privileges, so should org.cdk8s.plus29.ClusterRolePolicyRule.
Use Case:
Needed to achieve the equivalent of:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
role: myRole
name: myRole
rules:
resourceNames:
resources:
verbs:
Proposed Solution:
Not read up on the repo enough to do that.
Other:
This is a 🚀 Feature Request
The text was updated successfully, but these errors were encountered: