fix: add events read permission to project RBAC roles#822
Conversation
The GetSessionPodEvents handler uses the user's own K8s token to list pod events, but the project ClusterRoles were missing permission to list events in the core API group, causing a 403 for all users. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Claude Code ReviewSummaryThis PR adds Issues by SeverityBlocker IssuesNone Critical IssuesNone Major IssuesNone Minor Issues1. Dual-source RBAC definitions risk drift over time Files: The events rules were correctly added to both locations in this PR. However, these files appear to define the same ClusterRoles in two places. Future PRs that update one set but not the other will cause silent role mismatches at deploy time. This is a pre-existing concern, but this PR increases its surface area. Suggestion: Note in 2. Test plan not completed before merge The PR description has unchecked test plan items at merge time. For RBAC changes, confirming deployment and 403 resolution are the minimum validation steps. Suggestion: For future RBAC PRs, require test plan confirmation before merge. Positive Highlights
Recommendations
|
Summary
eventsread access (get,list,watch) toambient-project-view,ambient-project-edit, andambient-project-adminClusterRolesGetSessionPodEvents— the handler uses the user's own K8s token but the RBAC roles were missing permission to listeventsin the core API groupTest plan
🤖 Generated with Claude Code