We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
After we implemented #737, users now provide their own service accounts that must have the permissions necessary to manage the lifecycle of a bundle.
This epics depends on #988 and #1424.
The service account needs CRUD on each group resource of each unique object in the bundle
escalate
bind
OwnerReferencesPermissionEnforcement
clusterextensions/finalizers
update
There are some technical challenges here:
The text was updated successfully, but these errors were encountered:
No branches or pull requests
After we implemented #737, users now provide their own service accounts that must have the permissions necessary to manage the lifecycle of a bundle.
This epics depends on #988 and #1424.
The service account needs CRUD on each group resource of each unique object in the bundle
escalate
/bind
to allow the service account to create permissions it itself does not haveOwnerReferencesPermissionEnforcement
admission plugin, thenclusterextensions/finalizers
update
permission is also required. See https://github.com/operator-framework/operator-controller/blob/76bb90f4568e00d1e1f261cc53ac7b37501eb03c/docs/drafts/permissions-for-owner-references-permission-enforcement-plugin.mdThere are some technical challenges here:
The text was updated successfully, but these errors were encountered: