-
Notifications
You must be signed in to change notification settings - Fork 1.8k
Set ClusterRole for roleRef in unauth webook example #95980
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Set ClusterRole for roleRef in unauth webook example #95980
Conversation
Otherwise my webhooks don't work and I get failure replies to my sent webhooks with messages like: ``` RBAC: role.rbac.authorization.k8s.io \"system:webhook\" not found. ```
cc @adambkaplan |
@dustymabe: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/hold We were deliberate in using OpenShift's mechanism for triggering builds generically via webhooks is dated and doesn't incorporate OWASP best practices - particularly protections around access control, as evidenced by the current docs. Granting the Current users of BuildConfig webhooks should strongly consider moving off this to OpenShift Pipelines and Pipelines as Code. This has stronger webhook protections built in and also enables additional features related to software supply chain, such as Tekton Chains. |
I thought the fact that this example includes |
Shame on me then - I misread it (and this is why k8s RBAC is hard).
/lgtm |
/hold cancel |
@adambkaplan sounds like this might be good to add as a note somewhere. either as a callout or an admonition below the code block. wdyt? |
Otherwise my webhooks don't work and I get failure replies to my sent webhooks with messages like: