-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Separate build strategy permissions into distinct roles #8528
Conversation
I think I dislike this least of the options discussed in #8526 (comment) |
Post 1.2? |
Rules: []authorizationapi.PolicyRule{ | ||
{ | ||
APIGroups: []string{api.GroupName}, | ||
Verbs: sets.NewString("create", "update"), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
shouldn't need update.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
removed
Eh, less userfriendly in the end. Feels like the cheap way out to me. |
@@ -942,5 +979,23 @@ func GetBootstrapClusterRoleBindings() []authorizationapi.ClusterRoleBinding { | |||
{Kind: authorizationapi.SystemGroupKind, Name: UnauthenticatedGroup}, | |||
}, | |||
}, | |||
|
|||
// Grant all build strategy roles by default | |||
// Cluster admins can remove these role bindings if they don't want them |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
add something like "and its "safe" because system:authenticated
is excluded from clusterrolebinding reconciliation by default."
Minor comments, lgtm, but this release is supposed to be done. @danmcp or @smarterclayton for approval. |
[test] |
LGTM |
Approved for 1.2 given the security impact if we reset it. |
|
"image cache/mysql:pullthrough not found" flake |
[merge] |
This flake is worrying me in that we have no idea why it is happening. |
Image import flake:
[test] |
UI flake on test, image import flake on merge |
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/merge_pull_requests_origin/5608/) (Image: devenv-rhel7_3984) |
TestTryOrdering flake, [test][merge] |
Evaluated for origin test up to 3ae0a8d |
Evaluated for origin merge up to 3ae0a8d |
continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/3032/) |
Fixed TestTryOrdering upstream in On Sat, Apr 16, 2016 at 11:00 AM, OpenShift Bot
|
Resolves #8526 by making build strategy permissions individually grantable/revocable. Removes build strategy permissions from the
admin
andedit
roles and adds three default roles, one for each build strategy.As before, all users that can create builds are granted permission to use all
build strategies (Docker, Source-to-Image, and Custom).
Each build strategy has a corresponding build subresource and role. A user must have permission to create a build and permission to create on the build strategy subresource in order to create builds using that strategy. Default roles are provided which grant the create permission on the build strategy subresource.