-
Bug
-
Resolution: Unresolved
-
Blocker
-
ACM 2.14.0, ACM 2.15.0
Description of problem:
Search has an RBAC check for cluster-admin equivalent permissions:
However it is only checking for list permissions:
It is debatable whether this is how it should work or not. If the goal is to check for cluster-admin specifically, then the check should be like this:
oc auth can-i '*' '*' -A
While cluster-admin will have list permissions, the question is whether we should consider someone who has oc auth can-i 'list' -A permissions a cluster-admin and show them all resources on hub + managed clusters. If we only check list, we are verifying they can see everything on the hub, but we don’t know for sure they have access to the managed clusters. If a user only has list, then they would not have permission to create managedclusterviews.
Version-Release number of selected component (if applicable):
How reproducible:
Steps to Reproduce:
- ...
Actual results:
Expected results:
Additional info:
- blocks
-
ACM-21065 Fine-grained RBAC for Virtualization GA in Search (2.16)
-
- New
-