Skip to content

Fix Azure Deploy state RBAC check for non-privileged OIDC#59

Merged
Cataldir merged 1 commit intomainfrom
fix/ci-rbac-nonprivileged-state-access-20260312
Mar 12, 2026
Merged

Fix Azure Deploy state RBAC check for non-privileged OIDC#59
Cataldir merged 1 commit intomainfrom
fix/ci-rbac-nonprivileged-state-access-20260312

Conversation

@Cataldir
Copy link
Contributor

Summary\n- remove hard dependency on

oleAssignments/write during deploy\n- keep deterministic principal resolution and data-plane readiness probe\n- continue if runtime role assignment is unauthorized, and gate on actual blob access\n- provide explicit remediation scope when data-plane access is missing\n\n## Why\nGitHub OIDC principal may have deploy rights but not RBAC-admin rights; deploy must not fail solely because it cannot create new role assignments at runtime.

@Cataldir Cataldir merged commit ac43f64 into main Mar 12, 2026
4 checks passed
@Cataldir Cataldir deleted the fix/ci-rbac-nonprivileged-state-access-20260312 branch March 12, 2026 04:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant