-
Notifications
You must be signed in to change notification settings - Fork 74
WINC-1147: Implement node-specific RBAC for WICD #3133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WINC-1147: Implement node-specific RBAC for WICD #3133
Conversation
Skipping CI for Draft Pull Request. |
Caution There are some errors in your PipelineRun template.
|
1 similar comment
Caution There are some errors in your PipelineRun template.
|
3c9fbd8
to
79daf6b
Compare
@mansikulkarni96: This pull request references WINC-1147 which is a valid jira issue. In response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/test aws-e2e-operator |
b63342b
to
3880ade
Compare
/test aws-e2e-operator |
/cc: @openshift/openshift-team-windows-containers |
/test aws-e2e-operator |
26c3aa2
to
e59cc4c
Compare
/test aws-e2e-operator |
@mansikulkarni96: This pull request references WINC-1147 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
e59cc4c
to
a75ca18
Compare
/test aws-e2e-operator |
a75ca18
to
bef5293
Compare
/test aws-e2e-operator |
a4d4d9e
to
c626d76
Compare
labels: | ||
app.kubernetes.io/name: "windows-machine-config-operator" | ||
app.kubernetes.io/part-of: "wicd" | ||
wicd.openshift.io/scope: "bootstrap" # Mark as bootstrap-only permissions |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
consider using full name for the annotation
daemon.windowsinstanceconfig.openshift.io/scope: "bootstrap"
controllers/configmap_controller.go
Outdated
ObjectMeta: meta.ObjectMeta{ | ||
Name: wicdRBACResourceName, | ||
Labels: map[string]string{ | ||
"app.kubernetes.io/name": "windows-machine-config-operator", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
include openshift
in the app name. i.e. openshift-windows-machine-config-operator
/test lint |
- patch | ||
- update |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
added back for upgrade scenario, since during upgrade previous version of WICD binary will not have the capability and permissions to remove annotations from node using the certificate method.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good catch
/lgtm |
/hold cancel |
/retest-required azure cluster install issue |
/retest-required |
/hold Revision ea07d8e was retested 3 times: holding |
/test azure-e2e-upgrade |
/hold cancel |
/hold Revision ea07d8e was retested 3 times: holding |
/override ci/prow/nutanix-e2e-operator ci/prow/vsphere-e2e-operator ci/prow/vsphere-proxy-e2e-operator |
@mansikulkarni96: Overrode contexts on behalf of mansikulkarni96: ci/prow/nutanix-e2e-operator, ci/prow/vsphere-e2e-operator, ci/prow/vsphere-proxy-e2e-operator In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@mansikulkarni96 is it safe to remove the hold? |
cc @sebsoto |
/hold cancel |
/override ci/prow/nutanix-e2e-operator ci/prow/vsphere-proxy-e2e-operator ci/prow/aws-e2e-operator ci/prow/azure-e2e-operator ci/prow/vsphere-disconnected-e2e-operator ci/prow/azure-e2e-upgrade |
@mansikulkarni96: Overrode contexts on behalf of mansikulkarni96: ci/prow/aws-e2e-operator, ci/prow/azure-e2e-operator, ci/prow/azure-e2e-upgrade, ci/prow/nutanix-e2e-operator, ci/prow/vsphere-disconnected-e2e-operator, ci/prow/vsphere-proxy-e2e-operator In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@mansikulkarni96: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Update:
Certificate-Based Authentication:
RBAC Permissions:
Security Model:
Reference ovn-controller implementation: openshift/ovn-kubernetes@7dc4804
The flow is:
This gives each WICD instance a unique, node-specific certificate identity that the admission webhook can validate against in the follow-up.