Bug 1373878 - Impersonation not working in Openshift
Summary: Impersonation not working in Openshift
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Documentation
Version: 3.2.0
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
: ---
Assignee: Michal Fojtik
QA Contact: Vikram Goyal
Vikram Goyal
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-09-07 11:07 UTC by Jaspreet Kaur
Modified: 2019-12-16 06:39 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-05-18 19:18:03 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Jaspreet Kaur 2016-09-07 11:07:42 UTC
Description of problem: 	

When trying to impersonate users using the "--as" flag, it complains about it is missing. We've seen in the documentation that should be available https://docs.openshift.com/enterprise/3.2/architecture/additional_concepts/authentication.html#authentication-impersonation 


Version-Release number of selected component (if applicable):
 oc version
oc v3.2.1.9-1-g2265530
kubernetes v1.2.0-36-g4a3f9c5



How reproducible:


Steps to Reproduce: 
1.  oc delete nodes --all --as=system:admin
Error: unknown flag: --as


  oadm policy add-cluster-role-to-user sudoer  chris
Error from server: role "sudoer" not found


Actual results: Impersonation not working


Expected results: As per the documentation this should be working.


Additional info:

Comment 1 David Eads 2016-09-07 12:39:39 UTC
@mfojtik Looks like the release notes got it in the correct tag, but the docs ended up early.

Comment 2 Michal Fojtik 2016-09-07 13:48:17 UTC
PR: https://github.com/openshift/openshift-docs/pull/2809

Comment 5 Kathryn Alexander 2018-05-18 19:18:03 UTC
This change is complete. The information is no longer visible in 3.2, but it is present in 3.3.


Note You need to log in before you can comment on or make changes to this bug.