-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use impersonation #8672
Use impersonation #8672
Conversation
5cf6306
to
6873424
Compare
@@ -51,6 +52,7 @@ const ( | |||
// Roles | |||
const ( | |||
ClusterAdminRoleName = "cluster-admin" | |||
WheelRoleName = "wheel" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd prefer something like sudo
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd prefer something like sudo
sudoer
or sudo
? I'll change the name to anything.
nit on role name, update bootstrappolicy test fixtures and add a test, then LGTM |
6873424
to
12b480d
Compare
comments addressed. [merge] |
os::cmd::expect_success_and_text 'oc whoami --as=system:admin' "system:admin" | ||
|
||
os::cmd::expect_success 'oc login -u local-admin -p pw' | ||
os::cmd::expect_success 'oc new-project foo' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
clean up project foo?
[Test]ing while waiting on the merge queue |
45b9762
to
71b0d59
Compare
71b0d59
to
d56acf1
Compare
Evaluated for origin test up to d56acf1 |
continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/3473/) |
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/3473/) (Image: devenv-rhel7_4063) |
Evaluated for origin merge up to d56acf1 |
Adds impersonation power for service accounts to project admins and editors (they can see the secret anyway).
It also adds a wheel group so that
oadm policy add-cluster-role-to-user wheel deads --config=openshift.local.config/master/admin.kubeconfig
and then deads can dooc get clusterrolebindings --as=system:admin
. I think I'd like to start recommending the approach as the way to grant yourself cluster-admin like powers without having every command be a typo risk.