Skip to content

Commit 7999f89

Browse files
Merge pull request #90580 from michaelryanpeter/ocpbugs-42519-clarify-operator-group-rbac-hash
OCPBUGS#42519: Clarify Operator group RBAC hash values
2 parents a240b54 + bcebd8c commit 7999f89

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

modules/olm-operatorgroups-rbac.adoc

+13-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
[id="olm-operatorgroups-rbac_{context}"]
66
= Role-based access control
77

8-
When an Operator group is created, three cluster roles are generated. Each contains a single aggregation rule with a cluster role selector set to match a label, as shown below:
8+
When an Operator group is created, three cluster roles are generated. When the cluster roles are generated, they are automatically suffixed with a hash value to ensure that each cluster role is unique. Each Operator group contains a single aggregation rule with a cluster role selector set to match a label, as shown in the following table:
99

1010
[cols="1,1",options="header"]
1111
|===
@@ -21,6 +21,18 @@ When an Operator group is created, three cluster roles are generated. Each conta
2121
|`olm.opgroup.permissions/aggregate-to-view: <operatorgroup_name>`
2222
|===
2323

24+
[NOTE]
25+
====
26+
To use the cluster role of an Operator group to assign role-based access control (RBAC) to a resource, get the full name of cluster role and hash value by running the following command:
27+
28+
[source,terminal]
29+
----
30+
$ oc get clusterroles | grep <operatorgroup_name>
31+
----
32+
33+
Because the hash value is generated when the Operator group is created, you must create the Operator group before you can look up the complete name of the cluster role.
34+
====
35+
2436
The following RBAC resources are generated when a CSV becomes an active member of an Operator group, as long as the CSV is watching all namespaces with the `AllNamespaces` install mode and is not in a failed state with reason `InterOperatorGroupOwnerConflict`:
2537

2638
* Cluster roles for each API resource from a CRD

0 commit comments

Comments
 (0)