-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add system:image-auditor #8455
add system:image-auditor #8455
Conversation
[test] |
Evaluated for origin test up to 7f6db1f |
@pweil- concerns for 1.2? |
@pweil- @smarterclayton as you're mentioning, +1 for having this in 1.2 or something equivalent in openshift-ansible for |
No concerns on a new role, low risk. |
Rules: []authorizationapi.PolicyRule{ | ||
{ | ||
APIGroups: []string{imageapi.GroupName}, | ||
Verbs: sets.NewString("get", "list", "watch", "patch", "update"), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would not expect an auditor role to have any write permissions. Is there a different name we could use?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would not expect an auditor role to have any write permissions. Is there a different name we could use?
This is a thing that vets images to indicate whether they're good or bad. Alternate name suggestions welcome. I thought of this one and image-inspector
, but thought that auditor
was seemed like a better fit.
continuous-integration/openshift-jenkins/test FAILURE (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/2880/) |
Relates to ManageIQ/manageiq#7536 @deads2k Thanks! |
Approved per pweil's assessment On Mon, Apr 11, 2016 at 10:27 AM, Mooli Tayer [email protected]
|
@liggitt barring any better names, the rest looks clean? |
[merge] |
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/merge_pull_requests_origin/5571/) (Image: devenv-rhel7_3956) |
Evaluated for origin merge up to 7f6db1f |
Would "approver" be more indicative of giving write access? |
The role definitely is intended to be vague - to cover viewing AND On Tue, Apr 12, 2016 at 9:46 AM, Jordan Liggitt [email protected]
|
Adds a
system:image-auditor
role for components that want to monitor new images in the docker registry and annotate the image as "good" or "bad" based on scan results.@smarterclayton Approval? I think this is low risk and helps teams trying to integrate with us.
@simon3z @moolitayer Comments on whether this satisfies your use-case?