-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updates webhook cluster role to work with Owner References #4269
Conversation
…forcement When running on Kubernetes platforms like OpenShift where the OwnerReferencesPermissionEnforcement is "on" we need to have additional ClusterRole rules added. In particular our knative tooling for our webhooks is assigning the OwnerRef of the (mutating/validating)webhookconfiguration resources to the tekton-pipelines namespace. We need to update the webhooks ClusterRole to allow "delete" for both `mutatingwebhookconfigurations` and `validatingwebhookconfigurations` as well as "update" for `namespaces/finalizers` for the tekton-pipelines namespace.
/kind bug |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: afrittoli The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/test pull-tekton-pipeline-integration-tests |
/lgtm |
Add additional permissions to operator based on Pipelines v0.29.0 release. (new permissions from: tektoncd/pipeline pr tektoncd/pipeline#4269) Signed-off-by: Nikhil Thomas <[email protected]>
Add additional permissions to operator based on Pipelines v0.29.0 release. (new permissions from: tektoncd/pipeline pr tektoncd/pipeline#4269) Signed-off-by: Nikhil Thomas <[email protected]> (cherry picked from commit ad74963)
Add additional permissions to operator based on Pipelines v0.29.0 release. (new permissions from: tektoncd/pipeline pr tektoncd/pipeline#4269) Signed-off-by: Nikhil Thomas <[email protected]>
Add additional permissions to operator based on Pipelines v0.29.0 release. (new permissions from: tektoncd/pipeline pr tektoncd/pipeline#4269) Signed-off-by: Nikhil Thomas <[email protected]>
Add additional permissions to operator based on Pipelines v0.29.0 release. (new permissions from: tektoncd/pipeline pr tektoncd/pipeline#4269) Signed-off-by: Nikhil Thomas <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
Backport tektoncd/pipeline#4269 to fix deployment of the webhook on OpenShift. Signed-off-by: Vincent Demeester <[email protected]>
When running on Kubernetes platforms like OpenShift where the OwnerReferencesPermissionEnforcement is "on" we need to have additional ClusterRole rules added. In particular the knative tooling for our webhooks is assigning the OwnerRef of the (mutating/validating)webhookconfiguration resources to the tekton-pipelines namespace.
Fixes #4258
Changes
We need to update the webhooks ClusterRole to allow "delete" for both
mutatingwebhookconfigurations
andvalidatingwebhookconfigurations
as well as "update" fornamespaces/finalizers
for the tekton-pipelines namespace.Submitter Checklist
As the author of this PR, please check off the items in this checklist:
functionality, content, code)
Release Notes