Skip to content

Commit 6fe9944

Browse files
committed
Allow registry-admin to manage RBAC roles/bindings
registry-admin can already manage these resources via the proxied origin authorization endpoints. This just allows it to perform these actions directly. Signed-off-by: Monis Khan <[email protected]>
1 parent 0bee69f commit 6fe9944

File tree

3 files changed

+30
-0
lines changed

3 files changed

+30
-0
lines changed

pkg/cmd/server/bootstrappolicy/policy.go

+1
Original file line numberDiff line numberDiff line change
@@ -778,6 +778,7 @@ func GetOpenshiftBootstrapClusterRoles() []rbac.ClusterRole {
778778
rbac.NewRule("create").Groups(imageGroup, legacyImageGroup).Resources("imagestreamimports").RuleOrDie(),
779779
rbac.NewRule("get", "update").Groups(imageGroup, legacyImageGroup).Resources("imagestreams/layers").RuleOrDie(),
780780
rbac.NewRule(readWrite...).Groups(authzGroup, legacyAuthzGroup).Resources("rolebindings", "roles").RuleOrDie(),
781+
rbac.NewRule(readWrite...).Groups(rbacGroup).Resources("roles", "rolebindings").RuleOrDie(),
781782
rbac.NewRule("create").Groups(authzGroup, legacyAuthzGroup).Resources("localresourceaccessreviews", "localsubjectaccessreviews", "subjectrulesreviews").RuleOrDie(),
782783
rbac.NewRule("create").Groups(kAuthzGroup).Resources("localsubjectaccessreviews").RuleOrDie(),
783784

test/testdata/bootstrappolicy/bootstrap_cluster_roles.yaml

+14
Original file line numberDiff line numberDiff line change
@@ -2560,6 +2560,20 @@ items:
25602560
- patch
25612561
- update
25622562
- watch
2563+
- apiGroups:
2564+
- rbac.authorization.k8s.io
2565+
resources:
2566+
- rolebindings
2567+
- roles
2568+
verbs:
2569+
- create
2570+
- delete
2571+
- deletecollection
2572+
- get
2573+
- list
2574+
- patch
2575+
- update
2576+
- watch
25632577
- apiGroups:
25642578
- ""
25652579
- authorization.openshift.io

test/testdata/bootstrappolicy/bootstrap_policy_file.yaml

+15
Original file line numberDiff line numberDiff line change
@@ -2800,6 +2800,21 @@ items:
28002800
- patch
28012801
- update
28022802
- watch
2803+
- apiGroups:
2804+
- rbac.authorization.k8s.io
2805+
attributeRestrictions: null
2806+
resources:
2807+
- rolebindings
2808+
- roles
2809+
verbs:
2810+
- create
2811+
- delete
2812+
- deletecollection
2813+
- get
2814+
- list
2815+
- patch
2816+
- update
2817+
- watch
28032818
- apiGroups:
28042819
- ""
28052820
- authorization.openshift.io

0 commit comments

Comments
 (0)