-
Feature Request
-
Resolution: Won't Do
-
Undefined
-
None
-
None
-
None
-
Product / Portfolio Work
-
None
-
False
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Kubernetes has a concept for RBAC aggregation rules:
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#aggregated-clusterroles
which allows one component to grant permissions to other component.
In order to that we need to define a ClusterRole and a ClusterRoleBinding that will be associated with the service account of the operator.
To do that, we need the namespace of the service account, see example here:
We can't know the namespace that the operator will be deployed in.
It would be good if the CSV will allow us to use aggregation rules.
More info and context:
https://coreos.slack.com/archives/C3VS0LV41/p1627378253118400