Skip to content

Commit a21fb10

Browse files
revert(authpolicy): remove openshift-user-allowed from base auth-policy
Remove the openshift-user-allowed authorization rule that was added in 7a81db4 but not reverted with the other auth-policy changes. The base auth-policy should match main — functional OIDC changes belong in the OIDC patch template only. Signed-off-by: Wen Liang <liangwen12year@gmail.com>
1 parent 130927b commit a21fb10

1 file changed

Lines changed: 0 additions & 15 deletions

File tree

deployment/base/maas-api/policies/auth-policy.yaml

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -61,21 +61,6 @@ spec:
6161
operator: eq
6262
value: "true"
6363
priority: 0
64-
# OpenShift / Kubernetes user tokens: Kuadrant requires every applicable authz rule to
65-
# allow. api-key-valid is skipped for non-sk-oai tokens; without this rule those
66-
# requests were denied with HTTP 403 after successful TokenReview.
67-
# Require auth.identity.user.username (TokenReview / kubernetes userinfo) so external
68-
# OIDC JWT flows (oidc-client-bound) are not blocked when that field is absent.
69-
openshift-user-allowed:
70-
when:
71-
- predicate: '!request.headers.authorization.startsWith("Bearer sk-oai-")'
72-
- predicate: 'has(auth.identity.user.username)'
73-
patternMatching:
74-
patterns:
75-
- selector: auth.identity.user.username
76-
operator: neq
77-
value: ""
78-
priority: 1
7964
response:
8065
success:
8166
headers:

0 commit comments

Comments
 (0)