-
Story
-
Resolution: Done
-
Normal
-
None
-
None
As discussed in
Something like
rules: - apiGroups: [""] resources: ["node-role.kubernetes.io/control-plane"] verbs: ["NoExecute"] - apiGroups: [""] resources: ["node.kubernetes.io/not-ready"] verbs: ["NoExecute"] - apiGroups: [""] resources: ["node.kubernetes.io/unreachable"] verbs: ["NoExecute"] [...]
not using the composite variables, just the expression
- expression: "object.spec.tolerations.all(toleration, ( toleration.effect != 'NoExecute' || (toleration.effect == 'NoExecute' && (auhorizer.serviceAccount(object.metadata.namespace, object.spec.serviceAccountName).group('').resource(toleration.key).namespace(object.metadata.namespace).check(toleration.effect).allowed()))))"
And rovide it as a static file through https://github.com/openshift/cluster-kube-scheduler-operator/blob/master/pkg/operator/starter.go#L108-L123
- clones
-
WRKLDS-1148 [Spike] Find and list projects that are running on a control plane nodes and need tolerations to the node-role.kubernetes.io/control-plane:NoExecute taint
- To Do