You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Give Paas users, defined via the paas.spec.groups, view access to the default namespace (named after the paas itself) generated by the operator.
Why:
PaasNs'es belonging to the Paas capabilities, are created in this default namespace. If, for some reason, an error is thrown in the reconciliation of these PaasNs'es, is it stated on the status block of those PaasNs'es in that default namespace. However, only a clusteradmin has rights to that namespace, as Paas users from the Paas, don't get access. So far self-service for our customers.
Describe Preferred Solution
Reconcile a view rolebinding for the default namespace, to each group specified in the Paas.
Document that a permission must be in place that all authenticated users may view PaasNs'es.
Describe Alternatives
Can't think of any.
Related Code
Probably in the rolebinding controller.
Additional Context
If the feature request is approved, would you be willing to submit a PR? (Help can be provided if you need assistance submitting a PR)
Yes
No
The text was updated successfully, but these errors were encountered:
Feature Request
Describe the Feature Request
Give Paas users, defined via the paas.spec.groups, view access to the default namespace (named after the paas itself) generated by the operator.
Why:
PaasNs'es belonging to the Paas capabilities, are created in this default namespace. If, for some reason, an error is thrown in the reconciliation of these PaasNs'es, is it stated on the status block of those PaasNs'es in that default namespace. However, only a clusteradmin has rights to that namespace, as Paas users from the Paas, don't get access. So far self-service for our customers.
Describe Preferred Solution
Reconcile a view rolebinding for the default namespace, to each group specified in the Paas.
Document that a permission must be in place that all authenticated users may view PaasNs'es.
Describe Alternatives
Can't think of any.
Related Code
Probably in the rolebinding controller.
Additional Context
If the feature request is approved, would you be willing to submit a PR?
(Help can be provided if you need assistance submitting a PR)
The text was updated successfully, but these errors were encountered: