Skip to content

Commit

Permalink
OCPBUGS-31353: Minimize wildcard privileges for CRDs and namespaces
Browse files Browse the repository at this point in the history
- Restricted namespace permissions exclusively to operand namespaces (routers and canary).
- Scoped CRD permissions to readonly to enable infromer watches.
- Restricted wildcard CRD permissions exclusively to Gateway API.
  • Loading branch information
alebedev87 committed Nov 26, 2024
1 parent 8be1749 commit 71e83f9
Showing 1 changed file with 24 additions and 1 deletion.
25 changes: 24 additions & 1 deletion manifests/00-cluster-role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,6 @@ rules:
- ""
resources:
- configmaps
- namespaces
- serviceaccounts
- endpoints
- services
Expand All @@ -25,6 +24,16 @@ rules:
verbs:
- "*"

- apiGroups:
- ""
resources:
- namespaces
resourceNames:
- openshift-ingress
- openshift-ingress-canary
verbs:
- "*"

- apiGroups:
- ""
resources:
Expand Down Expand Up @@ -172,6 +181,20 @@ rules:
resources:
- customresourcedefinitions
verbs:
- get
- list
- watch

- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
resourceNames:
- gatewayclasses.gateway.networking.k8s.io
- gateways.gateway.networking.k8s.io
- httproutes.gateway.networking.k8s.io
- referencegrants.gateway.networking.k8s.io
verbs:
- '*'

- apiGroups:
Expand Down

0 comments on commit 71e83f9

Please sign in to comment.