OCPBUGS-26544: Replace GCP role with explicit permissions#1015
Conversation
Instead of using a predefined role in the cloud credentials request for GCP, enumerate permissions explicitly. The Google Cloud DNS API permissions are documented here: <https://cloud.google.com/dns/docs/access-control> Each method in the Cloud DNS API has a corresponding permission. The operator's DNS provider implementation for GCP only calls two methods: - dns.changes.create - dns.resourcerecordsets.list These methods require the following permissions: - dns.changes.create - dns.resourceRecordSets.create - dns.resourceRecordSets.update - dns.resourceRecordSets.delete - dns.resourceRecordSets.list This commit replaces the dns.admin role with these permissions in the credentials request. This commit resolves CCO-249. https://issues.redhat.com/browse/CCO-249 * manifests/00-ingress-credentials-request.yaml: Replace the roles/dns.admin predefined role with an explicit list of permissions.
|
@Miciah: This pull request references Jira Issue OCPBUGS-26544, which is valid. The bug has been moved to the POST state. 6 validation(s) were run on this bug
Requesting review from QA contact: The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/assign |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: candita The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@Miciah: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
/label backport-risk-assessed |
|
verified with pre-merge testing |
|
/label qe-approved |
|
@Miciah: This pull request references Jira Issue OCPBUGS-26544, which is valid. 6 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@Miciah: Jira Issue OCPBUGS-26544: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-26544 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[ART PR BUILD NOTIFIER] This PR has been included in build ose-cluster-ingress-operator-container-v4.15.0-202401100831.p0.g611011b.assembly.stream for distgit ose-cluster-ingress-operator. |
|
Fix included in accepted release 4.15.0-0.nightly-2024-01-13-050900 |
This is a manual cherry-pick of #844, which merged as a feature and therefore cannot be automatically cherry-picked.
--
Instead of using a predefined role in the cloud credentials request for GCP, enumerate permissions explicitly.
The Google Cloud DNS API permissions are documented here: https://cloud.google.com/dns/docs/access-control
Each method in the Cloud DNS API has a corresponding permission. The operator's DNS provider implementation for GCP only calls two methods:
dns.changes.createdns.resourcerecordsets.listThese methods require the following permissions:
dns.changes.createdns.resourceRecordSets.createdns.resourceRecordSets.updatedns.resourceRecordSets.deletedns.resourceRecordSets.listThis PR replaces the
dns.adminrole with these permissions in the credentials request.manifests/00-ingress-credentials-request.yaml: Replace theroles/dns.adminpredefined role with an explicit list of permissions.