Skip to content

Commit 61f3695

Browse files
authored
Merge pull request #9055 from kalexand-rh/revertf3a17af
Revert "Undo changes to daemonset RBAC docs"
2 parents 0ce493a + fc63704 commit 61f3695

File tree

2 files changed

+0
-26
lines changed

2 files changed

+0
-26
lines changed

admin_guide/manage_rbac.adoc

-19
Original file line numberDiff line numberDiff line change
@@ -712,25 +712,6 @@ Subjects:
712712

713713

714714
ifdef::openshift-enterprise,openshift-origin,atomic-registry[]
715-
[[admin-guide-granting-users-daemonset-permissions]]
716-
== Granting Users Daemonset Permissions
717-
718-
By default, project developers do not have the permission to create
719-
xref:../dev_guide/daemonsets.adoc#dev-guide-daemonsets[daemonsets]. As a cluster
720-
administrator, you can grant them the abilities.
721-
722-
. Create the cluster role:
723-
+
724-
----
725-
$ oc create clusterrole daemonset-admin --verb=create,delete,get,list,update,watch --resource=daemonsets.extensions
726-
----
727-
728-
. Create the local role binding:
729-
+
730-
----
731-
$ oc adm policy add-role-to-user daemonset-admin <user>
732-
----
733-
734715
[[creating-local-role]]
735716
== Creating a Local Role
736717

dev_guide/daemonsets.adoc

-7
Original file line numberDiff line numberDiff line change
@@ -51,13 +51,6 @@ in your namespace, by setting the namespace annotation `openshift.io/node-select
5151
[[dev-guide-creating-daemonsets]]
5252
== Creating Daemonsets
5353

54-
[IMPORTANT]
55-
====
56-
Before creating daemonsets, ensure you have been
57-
xref:../admin_guide/manage_rbac.adoc#admin-guide-granting-users-daemonset-permissions[given
58-
the required role by your {product-title} administrator].
59-
====
60-
6154
When creating daemonsets, the `*nodeSelector*` field is used to indicate the
6255
nodes on which the daemonset should deploy replicas.
6356

0 commit comments

Comments
 (0)