-
Epic
-
Resolution: Unresolved
-
Normal
-
Pipelines 1.15.0
-
Reduce the role for pipeline service account when we set customRBACresource to true.
-
2
-
False
-
-
False
-
-
Enhancement
-
Done
-
-
-
Pipelines Sprint Pioneers 26, Pipelines Sprint Pioneers 27, Pipelines Sprint Pioneers 28, Pipelines Sprint Pioneers 29, Pipelines Sprint Pioneers 30
What is the nature and description of the request?
- When we set customRBACresource to "true" it is granting edit cluster role to the pipeline service account, which is higher privileged for pipeline service account using which app teams are able to create deployments and other objects.
Why does the customer need this? (List the business requirements here)
- We would like to follow least privileged model to restrict the access to pipeline account.
How would the customer like to achieve this? (List the functional requirements here)
- By reducing the privileged to the pipeline service account.
- is documented by
-
RHDEVDOCS-6800 Document legacyPipelineRbac and PSA role degraded with customRBACresource set to true
-
- Open
-
- is duplicated by
-
SRVKP-7150 Validate the pipeline SA whether it requires edit access for cluster role
-
- Closed
-