Skip to content

Commit

Permalink
UPSTREAM: <carry>: Revert "Remove Endpoints write access from aggrega…
Browse files Browse the repository at this point in the history
…ted edit role"

OpenShift has an admission controller to prevent restricted Endpoints
changes, and there's no reason to block non-restricted changes (such
as modifying the annotations of an Endpoints, which is done by "oc
idle").

This reverts commit 416efda.

openshift-rebase(v1.24):source=573d6345f81

openshift-rebase(v1.24):source=573d6345f81

openshift-rebase(v1.24):source=573d6345f81
  • Loading branch information
danwinship authored and soltysh committed Sep 20, 2022
1 parent 8558e88 commit 239b9ed
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 1 deletion.
2 changes: 1 addition & 1 deletion plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
Original file line number Diff line number Diff line change
Expand Up @@ -292,7 +292,7 @@ func clusterRoles() []rbacv1.ClusterRole {
rbacv1helpers.NewRule(Write...).Groups(legacyGroup).Resources("pods", "pods/attach", "pods/proxy", "pods/exec", "pods/portforward").RuleOrDie(),
rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("pods/eviction").RuleOrDie(),
rbacv1helpers.NewRule(Write...).Groups(legacyGroup).Resources("replicationcontrollers", "replicationcontrollers/scale", "serviceaccounts",
"services", "services/proxy", "persistentvolumeclaims", "configmaps", "secrets", "events").RuleOrDie(),
"services", "services/proxy", "endpoints", "persistentvolumeclaims", "configmaps", "secrets", "events").RuleOrDie(),
rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("serviceaccounts/token").RuleOrDie(),

rbacv1helpers.NewRule(Write...).Groups(appsGroup).Resources(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -134,6 +134,7 @@ items:
- ""
resources:
- configmaps
- endpoints
- events
- persistentvolumeclaims
- replicationcontrollers
Expand Down

0 comments on commit 239b9ed

Please sign in to comment.