-
Bug
-
Resolution: Not a Bug
-
Normal
-
None
-
4.14.0
-
None
-
Quality / Stability / Reliability
-
False
-
-
None
-
Low
-
No
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
This came up during enhancement review: https://github.com/openshift/enhancements/pull/1423/files#r1233880248 Ideally the secrets store CSI driver operator should create user RBAC roles so that regular users/admins can create/modify/delete SecretProviderClasses in their NS and read SecretProviderClassPodStatuses. Similar to VolumeSnapshots here: https://github.com/openshift/cluster-csi-snapshot-controller-operator/blob/master/manifests/05_user_rbac.yaml Update the secrets store enhancement when this bug is fixed.
Version-Release number of selected component (if applicable):
4.14.0
How reproducible:
Steps to Reproduce:
1. 2. 3.
Actual results:
Expected results:
Additional info: