From 376b05df15a2d2b050c1e68b62b2c7b67b46ba1c Mon Sep 17 00:00:00 2001 From: Kathryn Alexander Date: Fri, 4 May 2018 08:45:32 -0400 Subject: [PATCH] Revert "Undo changes to daemonset RBAC docs" This reverts commit ea979387b6c874dd99a2e5442b327edf15e20fa6. --- admin_guide/manage_rbac.adoc | 19 ------------------- dev_guide/daemonsets.adoc | 7 ------- 2 files changed, 26 deletions(-) diff --git a/admin_guide/manage_rbac.adoc b/admin_guide/manage_rbac.adoc index 412d6e09a590..2945d517404a 100644 --- a/admin_guide/manage_rbac.adoc +++ b/admin_guide/manage_rbac.adoc @@ -716,25 +716,6 @@ Subjects: ifdef::openshift-enterprise,openshift-origin,atomic-registry[] -[[admin-guide-granting-users-daemonset-permissions]] -== Granting Users Daemonset Permissions - -By default, project developers do not have the permission to create -xref:../dev_guide/daemonsets.adoc#dev-guide-daemonsets[daemonsets]. As a cluster -administrator, you can grant them the abilities. - -. Create the cluster role: -+ ----- -$ oc create clusterrole daemonset-admin --verb=create,delete,get,list,update,watch --resource=daemonsets.extensions ----- - -. Create the local role binding: -+ ----- -$ oc adm policy add-role-to-user daemonset-admin ----- - [[creating-local-role]] == Creating a Local Role diff --git a/dev_guide/daemonsets.adoc b/dev_guide/daemonsets.adoc index 38359f8b131c..2a6f78d6d98d 100644 --- a/dev_guide/daemonsets.adoc +++ b/dev_guide/daemonsets.adoc @@ -51,13 +51,6 @@ in your namespace, by setting the namespace annotation `openshift.io/node-select [[dev-guide-creating-daemonsets]] == Creating Daemonsets -[IMPORTANT] -==== -Before creating daemonsets, ensure you have been -xref:../admin_guide/manage_rbac.adoc#admin-guide-granting-users-daemonset-permissions[given -the required role by your {product-title} administrator]. -==== - When creating daemonsets, the `*nodeSelector*` field is used to indicate the nodes on which the daemonset should deploy replicas.