Skip to content

Commit

Permalink
Fix operator ClusterRole permissions
Browse files Browse the repository at this point in the history
ClusterRole and ClusterRoleBinding delete permissions were
recently added to the operator Role but they need to be in
the operator ClusterRole.

Signed-off-by: Tom Pantelis <[email protected]>
  • Loading branch information
tpantelis authored and sridhargaddam committed Aug 24, 2023
1 parent 19cce1f commit b479693
Show file tree
Hide file tree
Showing 3 changed files with 14 additions and 14 deletions.
7 changes: 7 additions & 0 deletions config/rbac/submariner-operator/cluster_role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -76,3 +76,10 @@ rules:
- daemonsets
verbs:
- list
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- clusterrolebindings
verbs:
- delete
7 changes: 0 additions & 7 deletions config/rbac/submariner-operator/role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,13 +24,6 @@ rules:
- serviceaccounts
verbs:
- delete
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- clusterrolebindings
verbs:
- delete
- apiGroups:
- apps
resources:
Expand Down
14 changes: 7 additions & 7 deletions pkg/embeddedyamls/yamls.go
Original file line number Diff line number Diff line change
Expand Up @@ -2519,13 +2519,6 @@ rules:
- serviceaccounts
verbs:
- delete
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- clusterrolebindings
verbs:
- delete
- apiGroups:
- apps
resources:
Expand Down Expand Up @@ -2660,6 +2653,13 @@ rules:
- daemonsets
verbs:
- list
- apiGroups:
- rbac.authorization.k8s.io
resources:
- clusterroles
- clusterrolebindings
verbs:
- delete
`
Config_rbac_submariner_operator_cluster_role_binding_yaml = `---
apiVersion: rbac.authorization.k8s.io/v1
Expand Down

0 comments on commit b479693

Please sign in to comment.