Git Product home page Git Product logo

sighupio / permission-manager Goto Github PK

View Code? Open in Web Editor NEW
1.2K 27.0 168.0 74.46 MB

Permission Manager is a project that brings sanity to Kubernetes RBAC and Users management, Web UI FTW

Home Page: https://sighup.io/

License: BSD 3-Clause "New" or "Revised" License

Go 18.59% HTML 1.07% CSS 0.22% JavaScript 3.47% Dockerfile 0.67% Makefile 7.58% Shell 7.05% TypeScript 59.63% Mustache 1.06% Starlark 0.66%
kubernetes admin dashboard user-management k8s sighup oss rbac kubeconfig namespace

permission-manager's Introduction

Permission manager

flow

Welcome to the Permission Manager! 🎉 🎉

Build Status Release Slack License

Permission Manager is an application developed by SIGHUP that enables a super-easy and user-friendly RBAC management for Kubernetes. If you are looking for a simple and intuitive way of managing your users within a Kubernetes cluster, this is the right place.

With Permission Manager, you can create users, assign namespaces/permissions, and distribute Kubeconfig YAML files via a nice&easy web UI.

Screenshots

First Page

First Page

Creating a user

Creating a user

Creating a user - Summary

Create user Sumary

User's Kubeconfig

User's Kubeconfig

Deleting a user

Deleting a user

Installation

To deploy and run the Permission Manager on your cluster, follow the installation guide

Development Setup

We love contributions from the community ❤️. Learn how-to-contribute

FAQ

How it works

The application allows us to define and select permission standard templates (those defining who can do what, within a namespace or globally) and associate them with all the users you might want to create.

The template system is an abstraction over Cluster-Roles, RoleBinding, and ClusterRolesBindigs.

What is a template

A template is a ClusterRole with a prefix

template-namespaced-resources___

for example template-namespaced-resources___developer

Why a template is not a CRD

When we started the development of this project, a template was one-to-one to a clusterrole, the usage of a CRD looked overkill. This will obviously change in future to avoid polluting clusterroles and will allow us to have a more precise encapsulation of what is owned by the permission manager.

How to add a new template

Create a clusterrole starting with template-namespaced-resources___ and apply it.

Default templates

developer and operation default templates are located at deployments/kubernetes/seeds/seed.yml

What is a user

A user is a custom resource of kind permissionmanagerusers.permissionmanager.user

Commercial & Enterprise Support

Are you using Permission Manager in your clusters and looking for commercial support? Let us know and get in touch

permission-manager's People

Contributors

al-pragliola avatar angelbarrera92 avatar atosatto avatar billyen2012 avatar craigbox avatar dberuben avatar dependabot[bot] avatar github-actions[bot] avatar iknite avatar jnardiello avatar jonahbohlmann avatar kandros avatar luigibarbato avatar matteovivona avatar mrruban avatar omissis avatar oneoneonepig avatar ralgozino avatar rampage1xx avatar rhnsharma avatar robatbender avatar runzhliu avatar sgolod avatar sunnepah avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

permission-manager's Issues

[Feature] Publish Helm Chart

Would you mind adding an index.yml for the helm chart? so that we can use it directly in the helm. I can help if you like the idea.

Allow email as username

I'm using Google OpenID for cluster authentication and the email claim as the username.
So the subject name in my role bindings is the user email address and the UI blocks me from inputting @ in the user name input field.

Get rid of statik

While working on #81,

I saw we are using statik to embed files in the resulting binary (frontend). In the #81 we are updating the golang version to 1.16. This version includes a native golang feature to embed files.

Changing from statik to native golang way:

  • Makes it easier to maintain the project
  • Makes it easier to automate stuff
  • Makes it easier to develop locally.

UX: Missing favicon

Permission Manager uses React FavIcon instead of a custom one. Would be nice to have a custom favicon to differentiate the tab.

Upgrading from 1.5.1 to 1.6.0 loses permissions

When you upgrade permission manager from 1.5.1 to 1.6.0, the kubeconfig stops using certificates and starts using tokens, but if you download the new kubeconfig you get permission denied for all actions.

Going to the user and clicking the save button, re-applies the permissions.

We don't know the root cause yet, but this migration should be automated or at least documented in the release notes.

Helm chart for permission-manager does not work

When I make helm chart, I always get error:

   ____    __
  / __/___/ /  ___
 / _// __/ _ \/ _ \
/___/\__/_//_/\___/ v3.3.10-dev
High performance, minimalist Go web framework
https://echo.labstack.com
____________________________________O/_______
                                    O\
{"time":"2020-06-09T12:11:22.343530878Z","level":"FATAL","prefix":"echo","file":"run-server.go","line":"17","message":"listen tcp: address tcp/4000\n: unknown port"}

I solved this manually:

  1. Made a namespace,
  2. Applied filled secret,
  3. Applied my Helm Chart.

Unfortunately, this worked only one time. I am not able to install it again.

This is anusual behavior for helm, can you fix it please? Secret should be part of the Helm Chart.

Errors with k8s 1.22

Hello

Looks like permission-mamanher is not supporing newer Kubernetes versions. Tried to install it on 1.22 and was getting following errors:
kubectl apply -f https://github.com/sighupio/permission-manager/releases/download/v1.7.0-rc3/crd.yml
error: unable to recognize "https://github.com/sighupio/permission-manager/releases/download/v1.7.0-rc3/crd.yml": no matches for kind "CustomResourceDefinition" in version "apiextensions.k8s.io/v1beta1"

kubectl apply -f https://github.com/sighupio/permission-manager/releases/download/v1.7.0-rc3/deploy.yml
service/permission-manager created
deployment.apps/permission-manager created
serviceaccount/permission-manager created
clusterrole.rbac.authorization.k8s.io/permission-manager created
error: unable to recognize "https://github.com/sighupio/permission-manager/releases/download/v1.7.0-rc3/deploy.yml": no matches for kind "ClusterRoleBinding" in version "rbac.authorization.k8s.io/v1beta1"

Is this something we could have any time soon?
Thanks!

Restricted when trying to log in

Hi,

After performing the steps described on the installation page, i get Restricted access when trying to log in.
Tried to change the password several times, but without luck.

Any thoughts would be greatly appreciated.

Thanks

Showing developer role in UI even if other role is set for user

Using 1.7.0-rc1:
Whatever role I'm setting for my users it shows developer role in UI, but I'm checking the rolebinding inside the cluster and it binds the right clusterrole (e.g. template-namespaced-resources___operation). this behavior exists for custom templates as well as for templates added from seeds.yaml

Set namespace in generated kubeconfig

The generated kubeconfig doesn't have a namespace set in the context.

If the user doesn't have access the default namespace then they get access denied unless they specify namespace.

Can we have an option to set the namespace in the generated kubeconfig?

Align E2E tests

While working on #81,

I found that the tests executed during the pipeline (e2e) are different from the tests you can execute locally (e2e).
One is based on bats and tests only the API, on the other side, the local e2e opens a cypress window to tests e2e in a browser.

This is something we have to align

how to add subject to rolebinding or clusterrole binding?

Hello how can i make modification in generates bindings?

apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
  creationTimestamp: "2021-10-19T13:51:31Z"
  labels:
    generated_for_user: username
  name: username___template-namespaced-resources___test___monitoring
  namespace: monitoring
  resourceVersion: "62934390"
  uid: 2b36d436-0b65-493c-822a-45d44d98352f
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: template-namespaced-resources___test
subjects:
- kind: ServiceAccount
  name: username
  namespace: permission-manager

i need to have possibility add group which will based on username

- apiGroup: rbac.authorization.k8s.io
  kind: Group or User
  name: username

Please enter Username:

User "student1" created without errors.

ClusterRole-----<>ClusterRoleBinding
both are exist

ubectl describe clusterRoleBinding/student1___template-cluster-resources___read-only
Name:         student1___template-cluster-resources___read-only
Labels:       generated_for_user=
Annotations:  <none>
Role:
  Kind:  ClusterRole
  Name:  template-cluster-resources___read-only
Subjects:
  Kind  Name      Namespace
  ----  ----      ---------
  User  student1  

Any commands are return next error message:

kubectl --kubeconfig=/home/user/.kube/config-student1 get nodes

output

Please enter Username:

x509: cannot validate certificate for 10.255.0.1 because it doesn't contain any IP SANs

[root@master01 kubernetes]# kubectl describe pod -n permission-manager
Warning FailedCreatePodSandBox 20s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = [failed to set up sandbox container "e3bad963c494ae17bcb007fa366cd47ca6a03026fec11cedc7a2bb17311f334d" network for pod "permission-manager-7cd5f4f6b8-5rzx4": networkPlugin cni failed to set up pod "permission-manager-7cd5f4f6b8-5rzx4_permission-manager" network: error getting ClusterInformation: Get https://[10.255.0.1]:443/apis/crd.projectcalico.org/v1/clusterinformations/default: x509: cannot validate certificate for 10.255.0.1 because it doesn't contain any IP SANs, failed to clean up sandbox container "e3bad963c494ae17bcb007fa366cd47ca6a03026fec11cedc7a2bb17311f334d" network for pod "permission-manager-7cd5f4f6b8-5rzx4": networkPlugin cni failed to teardown pod "permission-manager-7cd5f4f6b8-5rzx4_permission-manager" network: error getting ClusterInformation: Get https://[10.255.0.1]:443/apis/crd.projectcalico.org/v1/clusterinformations/default: x509: cannot validate certificate for 10.255.0.1 because it doesn't contain any IP SANs]

How to deal with it ?

Feature: allow flexible subjects for clusterrolebindings/rolebindings

In Azure AKS users can have access granted by either by their AD group membership, or directly using AD user ID. It would be extremely useful, if user access management could be done using permission-manager.

In order to achieve it, it would be necessary to allow different kind of subjects for both clusterrolebinding and rolebinding.
This is an example of clusterrolebinding used for assigning RBAC to AD group:

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: test
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: cluster-developer
subjects:
- apiGroup: rbac.authorization.k8s.io
  kind: Group
  name: id-redacted

Similarly kind: User can be used to grant a specific user access to Kubernetes using RBAC.
Ideally, web interface should allow creation of different kind of subjects and used created subjects for access grants.

Upgrade process

Best practices to upgrade from one RC to another? Nothing in the documentation so far.

E2E tests use a static version of permission manager

Hello,

E2E tests right now use a static version of permission manager, loaded from the deployment files. This causes several issues:
a) requires a version change to make tests effective
b) it forces you to alter deployment file temporarily
c) it renders very hard to do e2e local testing/impossible

Proposed solution: Tests should deploy a locally built temporary image of permission manager.
This could be done either by using kustomize patches on the deployment folder or by opening a new folder with the tests manifests.

# todo it uses static version manifests?
kubectl apply -f deployments/kubernetes/deploy.yml
kubectl wait --for=condition=Available deploy/permission-manager -n permission-manager --timeout=300s

How to get user token for the k8s dashboard?

It looks like you can't authenticate on k8s dashboard using the k8s kubeconfig generated by permission manager. How do you get the token to also use the kubernetes dashboard?

Broken access view in UI for custom template

I was in need to create access rights for user to read resources in only one specific namespace.
So I created ClusterRole:

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: template-namespaced-resources___readonly
rules:
- apiGroups:
  - '*'
  resources:
  - configmaps
  - endpoints
  - persistentvolumeclaims
  - pods
  - pods/log
  - pods/portforward
  - podtemplates
  - replicationcontrollers
  - resourcequotas
  - secrets
  - services
  - events
  - daemonsets
  - deployments
  - replicasets
  - ingresses
  - networkpolicies
  - poddisruptionbudgets
  - statefulsets
  - tlsstores
  - middlewares
  verbs:
  - get
  - list
  - watch

Despite granted access rights works, and user can read needed resources, the grunted rights not shown in UI poperly.
изображение

изображение

Its same for v1.6 and 1.7.1-rc1

The cluster resources option doesn't show its value

Choosing a cluster resources permission in a user configuration different than None, doesn't reflect in the UI after a relod of the page, for example going back to the root and entering to see the user details again.
image
The radio-button is always in None

Steps to reproduce:

  1. create a new user and select "READ-ONLY" for cluster resources and save it.
  2. go back to permission manager's root
  3. open again the user, you should see READ-ONLY selected but the radio button remains in None.

This behaviour is present at least in 1.5.1, 1.6.0 and 1.7.0-rc3

small change in generated kubeconfig

can you please make the context name to be username@clustername instead of clustername as is now? this would be useful for admins which are testing many users on the same cluster.

it seems to be a small change in internal/kubeconfig/create-kubeconfig.go, something like

--- a/internal/kubeconfig/create-kubeconfig.go
+++ b/internal/kubeconfig/create-kubeconfig.go
@@ -35,7 +35,7 @@ users:
user:
client-certificate-data: %s
client-key-data: %s`,

  •           clusterName, clusterName, clusterControlPlaceAddress, caBasebase64, clusterName, username, clusterName, username, crtBase64, privateKeyBase64)
    
  •           clusterName, clusterName, clusterControlPlaceAddress, caBasebase64, clusterName, username, username+"@"+clusterName, username, crtBase64, privateKeyBase64)
    
      return kubeconfigYAML
    

}

Feature: flexible templates for custerroles

Currently (if I am not entirely wrong) permission-manager supports namespaced role-templates. For clusterwide resource-access, there are only three roles (none, read-only, read-write) for all resources available.

I would very much appreciate to be able to define custom roles for cluster-resource-access and to assign them in the web-ui.

PS: Currently, every user needs to have a namespaced role. With this FR it might need to be possible to have a user with only clusterroles

How do with EKS ?

I tried with AKS, it works well. When I try with EKS, this approach failed due to IAM based authentication. Any workaround?

Created user cannot authenticate

I've created users with operation/all-namespaces/read-write permissions.
When I merge into my existing /config:
k get pods
error: You must be logged in to the server (Unauthorized)

k version
error: You must be logged in to the server (the server has asked for the client to provide credentials)

When I point to generated kube config saved to a file, and k version:
Unable to connect to the server: x509: certificate signed by unknown authority (possibly because of "crypto/rsa: verification error" while trying to verify candidate authority certificate "kubernetes")

Unable to view kubeconfig file

Hi
Using k8s 1.8

Am able to create a user and save unless you choose all namespaces then get pacman
Once user is created chose to show kubeconfig file and just get loading screen

Bug when deleting users with same prefix

I have created 2 users: test and test2
if I delete test2 user everything is ok and test user is still available
if I delete test user, test2 user is gone from cluster but still it's showing in permission manager and if I click on username in permission manager application hangs. I've created rolebinding manually in order to bring back user and make application work again.

Same behavior was for 2+ users with the following names:
user
user-dev
user-test
user-staging
user-prod
I deleted user and all other users(rb,sa) were deleted from cluster but they still exist in permission-manager and when I click on one of them the app hangs.

Doubts about function

First of all, thanks to the producers. This tool is what we need most now

image

I don't know what this function is, I don't understand

image
This copy button doesn't work in my Chrome browser

UX: The username suggestion is invalid

When creating a new user in Permission Manager, the username field suggests as an example Jane Doe, but if you write that you get an error message saying that the username is not valid:
Screenshot 2021-08-13 at 10 11 26
Screenshot 2021-08-13 at 10 15 28

Feature: admin user and normal user

Hello,
Thanks for this great project!

Would it be possible to have an OAuth login page?
And different users:

  • if it's an admin user have the possibility to create/delete accounts.
  • Otherwise only have the possibility to download its own kubeconfig file?

certificate-authority-data has no data in kubeconfig

---
apiVersion: v1
kind: Config
current-context: [email protected]
clusters:
  - cluster:
      certificate-authority-data: 
      server: https://127.0.0.1:6443
    name: cluster.local
contexts:
  - context:
      cluster: cluster.local
      user: kkk
      namespace: permission-manager
    name: [email protected]
users:
  - name: kkk
    user:
      token: eyJhbGciOiJSUzI1NiIsImtpZCI6InJCSEw5bnVQcDc3YVY1RVozSkVlV0lGeG5aTTFzcG4xUFVETlQtekFuYXcifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJwZXJtaXNzaW9uLW1hbmFnZXIiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlY3JldC5uYW1lIjoia2trLXRva2VuLWJ4MnR3Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQubmFtZSI6ImtrayIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VydmljZS1hY2NvdW50LnVpZCI6Ijc1Mzk2NzRiLWZhMzItNDY1Mi05M2FiLWNlNTJhYzg3ZGE5YiIsInN1YiI6InN5c3RlbTpzZXJ2aWNlYWNjb3VudDpwZXJtaXNzaW9uLW1hbmFnZXI6a2trIn0.ZWHhyuAIYOpBpAAS_128JV2YM_ELL3As9gkrx07yaBrOhm5G5qdl4cGl1Us3CX6M90MyOE678RyK2qUiSuG7KIMJXGAAz71Qd5mwF3Mbth4Kj7GPHVCtAP5jmeCX1hUJPiA2ZNUMyXfXG6lfL052y40uDPM6A4Nk9jJmnX2pM2TUUPXLixCfn5zziYndhn29CHaWjduZ3SsPEnB446u5ODx1kadtcJNNxjx_pkS2XhcqNH-KOArv6WY370f2mPgNAdQZgXE0TZWMUTi5tWKzmaGMA-Ka--TCD0bL6L5nxHxJkkRhXoU7bBdYiew3CXBx7x3CWxc9Nu582WgwmFbfiw

Helm Chart support

I can see the chart in the source but it does not appear to be published anywhere.
I tried https://sighupio.github.io for your chart repo as a test with no dice.

Do you have plans to publish it out and document it?

Namespaces starting with kube are excluded in namespace overview

First of all thanks for creating this tool it really helps a lot!

I'm wondering why will "kube" Namespaces be excluded from the overview, i guess for security reasons ?

const options = namespaceList
.filter(ns => !ns.metadata.name.startsWith('kube'))
.map(ns => {
return {value: ns.metadata.name, label: ns.metadata.name}
})

Can we provide an option to show namespaces starting with "kube" so rolebindings can be set also for this namespace?
Maybe a configuration variable during setup or a checkbox in the UI ?

Thanks!

Proposal: tag releases on the git repository

Looking at https://quay.io/repository/sighup/permission-manager?tab=tags I've found that two tags of the permission-manager image exists at the moment: 1.5.0 and 1.6.0-dev.
However, looking at the git repository it is not clear to which git commit hashes these versions corresponds.

I must admit that I haven't looked too much in depth into the content of the images to see whether there is any metadata allowing to related these to the git commits hash, but it would be cool having tags of the Docker image corresponding to tags in the git repository in order to ease the version of the application and issues troubleshooting.

bug when creating users with same prefix

Using v1.16.0
There is a bug when creating users with same prefix. Steps to reproduce:

  1. create user with name test in namespace1 with operator role
  2. create user with name test2 in namespace2 or namespace1 with operator/developer role
  3. edit user test and you will see namespace2 with appropriate role has been added to test user. if you try to delete that role, and then open test2 user application hangs and no test2 user/rolebinding exists in cluster

Failed to get resources

Hi, I just deployed permission-manager on k8s infra version 1.17.4
I followed the installation guide to define the cluster_name, control plane address, and the password.

The deployment succeeds and i am able to access the application via the UI. However, I see no users listed (even though we already use some) and i cannot create any new ones from the UI.

I checked the logs of the pod and I think we may have a problem:

image

Integrations with LDAP/OpenID

Hello,
Is there possibility to have any integrations with LDAP with the tool.
That would be a killer feature for us.

clusterrole name in rolebindings also prepended with username

Hi,

First of all very pleased with permission-manager.
Just started using/discovering the tool and ran into an issue.
I'm:

  • using master (1.7.0-rc2).
  • creating a user having read-only access to non-namespaced resources and developers access to all namespaces.

image

After creation I go back to review the user config and the radio-buttons for the non-namespace resources do not show the previously created settings.

image

This might only be a cosmetic issue, but it is slightly confusing .

Next, and this the real issue, it seems that while creating cluster-rolebindings the systems prepends the clusterrole name with user-name (testdev1___template-cluster-resources___read-only):

image

While the created cluster-role has a different name (template-cluster-resources___read-only):

image

This causes the cluster-role failing.

Can you have a look?
Thnx in advance

user not permitted to approve r equests with signerName "kubernetes.io/legacy-unknown"

Hi,

We're ran into an issue on a cluster running kubernetes 1.18.1. When we try and create a user in permission manager the client-certificate-data field is empty.

Looking into the container logs when a user is created, we see the following error:

2020/04/23 16:10:18 Failed to approve CSR: CSR_FOR_octopus2020-04-23 16:10:18.321584926 +0000 UTC m=+120.763289690
certificatesigningrequests.certificates.k8s.io "CSR_FOR_octopus2020-04-23 16:10:18.321584926 +0000 UTC m=+120.763289690" is forbidden: user not permitted to approve requests with signerName "kubernetes.io/legacy-unknown"
2020/04/23 16:11:09 Failed to retry get approved CSR

This looks to be down to breaking changes in kubernetes 1.18.

I was able to resolve it by editing the seed.yml and updated the cluster role for permission manager to add the signers resource:

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: permission-manager-cluster-role
rules:
  - apiGroups:
      - "*"
    resources:
      - "permissionmanagerusers"
      - "clusterrolebindings"
      - "clusterroles"
      - "rolebindings"
      - "roles"
      - "certificatesigningrequests"
      - "certificatesigningrequests/approval"
      - "signers"
    verbs:
      - "*"

  - apiGroups:
      - ""
    resources:
      - "namespaces"
    verbs: ["get", "list"]

Stuck on ...loding after changing CONTROL_PLANE_ADDRESS after initial deployment

Hi, I managed to deploy your app and created several users. I then noticed that the server address in the kube config file pointed to the internal address of the api-server as I configured that in the beginning. I then changed the address to my external api-server loadbalancer address and now the app is stuck on ...loading when trying to list the available users. I try to change the address back to the internal address but I can't get the app to load the user list. It hangs for a while and then dies.

Any ideas? There is nothing in the log. I've tried to restart the pod several times now.

How to change password ?

Hello, I am learning Kubernetes.

After deployment to

http://localhost:4000

I have a problem to login.

First I tried to login with user : admin and password : password, but this do not working.

Here is my configuration :

- name: BASIC_AUTH_PASSWORD
              valueFrom:
                secretKeyRef:
                  name: auth-password-secret
                  key: password

And how can I change this password ?

Thanks for any help.

User settings window hangs

k8s: v1.22.2
permission-manager: v1.7.1-rc1

Error process:

  1. Create a user and give rights to namespace
  2. Remove namespace
  3. Open the user for editing
  4. The endless process of "... loading" and the out of memory error

image

Found error correction process:

  1. Remove CustomResourceDefinitions
  2. Create user again

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.