Skip to content

Commit

Permalink
Merge pull request #1454 from dobsonj/secrets-store-cluster-roles
Browse files Browse the repository at this point in the history
Add ClusterRoles to Secrets Store CSI Driver Operator enhancement
  • Loading branch information
openshift-merge-robot authored Aug 10, 2023
2 parents 1271dd5 + a45c1ca commit 6ce1cca
Showing 1 changed file with 3 additions and 0 deletions.
3 changes: 3 additions & 0 deletions enhancements/storage/csi-secrets-store.md
Original file line number Diff line number Diff line change
Expand Up @@ -101,6 +101,9 @@ The only planned OpenShift API change is to add [secrets-store.csi.k8s.io](https
When the operator is installed via OLM, two new CRD's are created as required by the CSI driver and provider plugins:
[SecretProviderClasses](https://github.com/openshift/secrets-store-csi-driver/blob/main/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml) and
[SecretProviderClassPodStatuses](https://github.com/openshift/secrets-store-csi-driver/blob/main/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml).

ClusterRoles are created for each CRD to grant permissions for those objects to the `view`, `edit`, and `admin` roles. A user with a `view` role will be able to read `SecretProviderClass` and `SecretProviderClassPodStatuses` objects in their namespaces and a user with an `edit` role will be able to create, modify, and delete them.

Once the operator is installed and ClusterCSIDriver object is created, the operator installs a ClusterRole which is used by the CSI driver to read SecretProviderClass objects created by the user, and to create/modify/delete SecretProviderClassPodStatus objects.

### Implementation Details/Notes/Constraints [optional]
Expand Down

0 comments on commit 6ce1cca

Please sign in to comment.