Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-16281

secrets store operator should create user RBAC for SecretProviderClasses

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Not a Bug
    • Icon: Normal Normal
    • None
    • 4.14.0
    • Storage / Operators
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Description of problem:

      This came up during enhancement review:
      https://github.com/openshift/enhancements/pull/1423/files#r1233880248
      Ideally the secrets store CSI driver operator should create user RBAC roles so that regular users/admins can create/modify/delete SecretProviderClasses in their NS and read SecretProviderClassPodStatuses.
      Similar to VolumeSnapshots here: https://github.com/openshift/cluster-csi-snapshot-controller-operator/blob/master/manifests/05_user_rbac.yaml
      
      Update the secrets store enhancement when this bug is fixed.

      Version-Release number of selected component (if applicable):

      4.14.0

      How reproducible:

       

      Steps to Reproduce:

      1.
      2.
      3.
      

      Actual results:

       

      Expected results:

       

      Additional info:

       

              jdobson@redhat.com Jonathan Dobson
              jdobson@redhat.com Jonathan Dobson
              None
              None
              Rohit Patil Rohit Patil
              None
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: