Bug 1449025
| Summary: | [dedicated] dedicated-cluster-admin needs to have an ability to edit EgressNetworkPolicy | ||
|---|---|---|---|
| Product: | OpenShift Online | Reporter: | Kenjiro Nakayama <knakayam> |
| Component: | Accounts and Billing | Assignee: | Abhishek Gupta <abhgupta> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Bing Li <bingli> |
| Severity: | high | Docs Contact: | |
| Priority: | medium | ||
| Version: | 3.x | CC: | abhgupta, aos-bugs, bbennett, bleanhar, chuyu, eparis, joelsmith, jokerman, mmccomas, xtian, yasun, yufchang |
| Target Milestone: | --- | Flags: | joelsmith:
needinfo+
|
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-11-09 18:49:36 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Kenjiro Nakayama
2017-05-09 05:46:48 UTC
Abhishek: If you decide that dedicated admins should be allowed to do this, and I can't think of any reason why they ought not to, then you need to grant permission to the dedicated admins to create, edit, and delete EgressNetworkPolicy objects. Joel: Are you fine with granting this access to dedicated admins? Hi, please handle this issue as a bug. As I pointed, the dedicated docs obviously mentioned that egree policy is available and the customer expects the feature. https://docs.openshift.com/dedicated/admin_guide/limit_pod_access_egress.html "As an OpenShift Dedicated cluster administrator, you can use egress policy to limit the addresses that some or all pods can access from within the cluster, so that:" Sorry, somehow I missed comment #2. Yes, this seems fine to me. Verified in ded-stage-aws(openshift-scripts-dedicated-3.5.1.51-1.git.0.a7c2b4a.el7.x86_64
):
OpenShift Master: v3.5.5.26
Kubernetes Master: v1.5.2+43a9be4
[root@ded-stage-aws-master-90bc4 ~]# oc get clusterrole dedicated-project-admin -o yaml
apiVersion: v1
kind: ClusterRole
metadata:
annotations:
authorization.openshift.io/system-only: "true"
creationTimestamp: 2017-06-29T23:06:53Z
name: dedicated-project-admin
resourceVersion: "2804"
selfLink: /oapi/v1/clusterroles/dedicated-project-admin
uid: a41bf9ac-5d1f-11e7-aa22-0ed098d7ac88
rules:
......
- apiGroups:
- ""
attributeRestrictions: null
resources:
- egressnetworkpolicies
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
......
[root@ded-stage-aws-master-90bc4 ~]#
Move to verified.
@Abhishek today, the original customer reported that he still cannot view/edit the egressnetworkpolicy after their cluster's update to 3.5.5.31. Could you please confirm if operation team has applied the role to existing clusters? Bump @Brenton for c#11 |