You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When verifying RBAC for Kubernetes components in a DevWorkspace, DWO checks whether the user is able to work with this object in the current namespace. To avoid multiple SAR tests per request, the webhook server checks that the user can * the relevant resource, equivalent to
oc auth can-i '*' <resource> -n <namespace>
However, even if the user has admin privileges, granting all individual verbs for the resource, the SAR request appears to check if the user explictly has * permissions, causing the check to fail.
How To Reproduce
Create a regular user in an OpenShift cluster and create a namespace for testing
(optional) Verify the user can use all verbs on pods:
for verb in create delete deletecollection get list patch update watch; do oc auth can-i $verb pods -n $NAMESPACE; done
(optional) Verify the user cannot * pods:
oc auth can-i '*' pods -n $NAMESPACE
Create a DevWorkspace that has a pod component
Expected behavior
Check should be improved to avoid this issue.
Additional context
The text was updated successfully, but these errors were encountered:
Description
When verifying RBAC for Kubernetes components in a DevWorkspace, DWO checks whether the user is able to work with this object in the current namespace. To avoid multiple SAR tests per request, the webhook server checks that the user can
*
the relevant resource, equivalent toHowever, even if the user has
admin
privileges, granting all individual verbs for the resource, the SAR request appears to check if the user explictly has*
permissions, causing the check to fail.How To Reproduce
*
pods:Expected behavior
Check should be improved to avoid this issue.
Additional context
The text was updated successfully, but these errors were encountered: