Prevent normal users create harvester-public namespace

  • Related issues: #2485 [FEATURE] [Harvester Node Driver v2] Prevent normal users from creating VMs in harvester-public namespace

Category:

  • Rancher integration

Verification Steps

  1. Import Harvester from Rancher
  2. Create standard user in Rancher User & Authentication
  3. Edit Harvester in virtualization Management, assign Cluster Member role to user image
  4. Login with user
  5. Create cloud credential
  6. Provision an RKE2 cluster
  7. Check the namespace dropdown list

Expected Results

  1. Now the standard user with cluster member rights won’t display harvester-public while user node driver to provision the RKE2 cluster.

    image

  2. Cluster member user can see harvester-public in Harvester image