Skip to content
This repository has been archived by the owner on Aug 1, 2024. It is now read-only.

Conversation

rm3l
Copy link
Member

@rm3l rm3l commented May 14, 2024

Description

There was a difference in the RBAC permissions of the operator between the CSV used for RHDH (https://github.com/janus-idp/operator/blob/main/.rhdh/bundle/manifests/rhdh-operator.csv.yaml) and the upstream one (https://github.com/janus-idp/operator/blob/main/bundle/manifests/backstage-operator.clusterserviceversion.yaml).
This causes issues like the one reported in #360.

Which issue(s) does this PR fix or relate to

PR acceptance criteria

  • Tests
  • Documentation
  • If the bundle manifests have been updated, make sure to review the rhdh-operator.csv.yaml file accordingly

How to test changes / Special notes to the reviewer

Diff should only be about the service account name:

$ diff -U 1 \
    <(yq '.spec.install.spec.clusterPermissions' bundle/manifests/backstage-operator.clusterserviceversion.yaml) \
    <(yq '.spec.install.spec.clusterPermissions' .rhdh/bundle/manifests/rhdh-operator.csv.yaml)

--- /proc/self/fd/11    2024-05-14 16:28:32.538242718 +0200
+++ /proc/self/fd/12    2024-05-14 16:28:32.539242725 +0200
@@ -107,2 +107,2 @@
         - create
-  serviceAccountName: backstage-controller-manager
+  serviceAccountName: rhdh-operator

We can retry the repro steps depicted in #360 after a new downstream build is done (after this PR merged).

This should be kept in sync with the CSV file in 'bundle/manifests/backstage-operator.clusterserviceversion.yaml'
@rm3l rm3l changed the title Fix RBAC permissions of the Operator in the RHDH CSV Fix the RBAC permissions of the Operator in the RHDH CSV May 14, 2024
@rm3l rm3l requested review from nickboldt, gazarenkov and coreydaley and removed request for kadel and jianrongzhang89 May 14, 2024 15:57
@rm3l rm3l force-pushed the 360-setting-custom-spec.application.route.host-not-working-using-the-rhdh-operator-on-openshift-due-to-inconsistent-permissions-between-rhdh-and-backstage-csvs branch from e4f35e5 to b26032b Compare May 14, 2024 16:05
@rm3l rm3l force-pushed the 360-setting-custom-spec.application.route.host-not-working-using-the-rhdh-operator-on-openshift-due-to-inconsistent-permissions-between-rhdh-and-backstage-csvs branch from b26032b to c36d734 Compare May 16, 2024 12:31
Copy link

sonarcloud bot commented May 16, 2024

Quality Gate Passed Quality Gate passed

Issues
0 New issues
0 Accepted issues

Measures
0 Security Hotspots
No data about Coverage
No data about Duplication

See analysis details on SonarCloud

@gazarenkov gazarenkov self-requested a review May 20, 2024 07:27
@openshift-ci openshift-ci bot added the lgtm PR is ready to be merged. Required by Prow. label May 20, 2024
Copy link

openshift-ci bot commented May 20, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: gazarenkov

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved PR has been approved by an approver from all required OWNERS files. Required by Prow. label May 20, 2024
@openshift-merge-bot openshift-merge-bot bot merged commit c34751e into janus-idp:main May 20, 2024
8 checks passed
@rm3l rm3l deleted the 360-setting-custom-spec.application.route.host-not-working-using-the-rhdh-operator-on-openshift-due-to-inconsistent-permissions-between-rhdh-and-backstage-csvs branch May 21, 2024 07:19
@rm3l rm3l mentioned this pull request May 21, 2024
2 tasks
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
approved PR has been approved by an approver from all required OWNERS files. Required by Prow. lgtm PR is ready to be merged. Required by Prow.
Projects
None yet
2 participants