Skip to content

Commit e82a7ef

Browse files
minor edits
1 parent f24f8d5 commit e82a7ef

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

site/rbac.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
1-
# RBAC
1+
# Role-Based Access Control (RBAC)
22

3-
The operator assumes that certain roles and role bindings are created on the Kubernetes cluster. The operator installation scripts create these, and the operator verifies that they are correct when the cluster starts up. This section lists the [RBAC](https://kubernetes.io/docs/admin/authorization/rbac/) definitions that are created.
3+
The operator assumes that certain roles and role bindings are created on the Kubernetes cluster. The operator installation scripts create these, and the operator verifies that they are correct when the cluster starts up. This document lists the [RBAC](https://kubernetes.io/docs/admin/authorization/rbac/) definitions that are created.
44

5-
The general design goal is to provide the operator with the minimum amount of permissions that it requires, and to favor built-in roles over custom roles where it make sense to do so.
5+
The general design goal is to provide the operator with the minimum amount of permissions that it requires, and to favor built-in roles over custom roles, where it make sense to do so.
66

7-
## KUBERNETES ROLE DEFINITIONS
7+
## Kubernetes role definitions
88

9-
| Cluster Role | Resources | Verbs | Notes |
9+
| Cluster role | Resources | Verbs | Notes |
1010
| --- | --- | --- | --- |
11-
| weblogic-operator-cluster-role | namespaces, persistentvolumes | get, list, watch | 1 |
11+
| `weblogic-operator-cluster-role` | namespaces, persistentvolumes | get, list, watch | 1 |
1212
| | customresourcedefinitions in API group apiextensions.k8s.io | get, list, watch, create, update, patch, delete, deletecollection | |
1313
| | domains in API group weblogic.oracle | get, list, watch, update, patch | |
1414
| | Ingresses in API group extensions | get, list, watch, create, update, patch, delete, deletecollection | |
15-
| weblogic-operator-cluster-role-nonresource | nonResourceURLs: ["/version/*"] | get | 1 |
16-
|weblogic-operator-namespace-role | secrets, persistentvolumeclaims | get, list, watch | 2 |
15+
| `weblogic-operator-cluster-role-nonresourc`e | nonResourceURLs: ["/version/*"] | get | 1 |
16+
|`weblogic-operator-namespace-role` | secrets, persistentvolumeclaims | get, list, watch | 2 |
1717
| | services, pods, networkpolicies | get, list, watch, create, update, patch, delete, deletecollection | |
18-
| NAMESPACE-operator-rolebinding-discovery | system:discovery in API group rbac.authorization.k8s.io | | 1 |
19-
| NAMESPACE-operator-rolebinding-auth-delegator | system:auth-delegator in API group rbac.authorization.k8s.io | | 1 |
18+
| `NAMESPACE-operator-rolebinding-discovery` | system:discovery in API group rbac.authorization.k8s.io | | 1 |
19+
| `NAMESPACE-operator-rolebinding-auth-delegator` | system:auth-delegator in API group rbac.authorization.k8s.io | | 1 |
2020

21-
**Notes**
21+
**Notes**:
2222

2323
1. This cluster role is assigned to the operator’s service account in the operator’s namespace. The uppercase text `NAMESPACE` in the cluster role name is replaced with the operator’s namespace.
2424
2. This cluster role is assigned to the operator’s service account in each of the “target namespaces”; that is, each namespace that the operator is configured to manage.

0 commit comments

Comments
 (0)