Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bind Emergency and Manual Groups same as PowerUser #2358

Merged
merged 2 commits into from
Jul 29, 2019

Conversation

mikkeloscar
Copy link
Contributor

Binds Emergency and Manual Groups same way as PowerUser since they are defined to have the same permissions.

This is currently done in the auth webhook, but we should migrate to RBAC to fix blacklist/whitelist bugs in the auth webhook.

Signed-off-by: Mikkel Oscar Lyderik Larsen <mikkel.larsen@zalando.de>
Signed-off-by: Mikkel Oscar Lyderik Larsen <mikkel.larsen@zalando.de>
@mikkeloscar
Copy link
Contributor Author

👍

}
}`,
expect: expect{
status: http.StatusCreated,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just curious: why are we using 201, when the request was rejected?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is how the AccessReview API works. You "create" a review request 201 and then the response is whether the user would have access to perform that action or not.

@aryszka
Copy link
Contributor

aryszka commented Jul 29, 2019

👍

@mikkeloscar mikkeloscar merged commit 36e0b5d into dev Jul 29, 2019
@mikkeloscar mikkeloscar deleted the manual-emergency-rbac branch July 29, 2019 09:49
This was referenced Jul 29, 2019
mikkeloscar added a commit that referenced this pull request Jul 30, 2019
Partly revert of #2358 to allow only `cdp` service account to `escalate`

Signed-off-by: Mikkel Oscar Lyderik Larsen <mikkel.larsen@zalando.de>
aermakov-zalando pushed a commit that referenced this pull request Aug 1, 2019
Partly revert of #2358 to allow only `cdp` service account to `escalate`

Signed-off-by: Mikkel Oscar Lyderik Larsen <mikkel.larsen@zalando.de>
aermakov-zalando added a commit that referenced this pull request Aug 1, 2019
This was referenced Aug 1, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants