Skip to content
Open
Prev Previous commit
Next Next commit
Avoid deleting shared OIDC ClusterRole during auth type transitions
Signed-off-by: Aniket Paluskar <apaluska@redhat.com>
  • Loading branch information
aniketpalu committed Apr 8, 2026
commit 8c8b79ddf63116e5c3aa71ba6d229f561021ae5e
4 changes: 0 additions & 4 deletions infra/feast-operator/internal/controller/authz/authz.go
Original file line number Diff line number Diff line change
Expand Up @@ -384,10 +384,6 @@ func (authz *FeastAuthorization) createOidcClusterRoleBinding() error {
}

func (authz *FeastAuthorization) cleanupOidcRbac() {
cr := &rbacv1.ClusterRole{ObjectMeta: metav1.ObjectMeta{Name: authz.getOidcClusterRoleName()}}
cr.SetGroupVersionKind(rbacv1.SchemeGroupVersion.WithKind("ClusterRole"))
_ = authz.Handler.Client.Delete(authz.Handler.Context, cr)

crb := &rbacv1.ClusterRoleBinding{ObjectMeta: metav1.ObjectMeta{Name: authz.getOidcClusterRoleBindingName()}}
crb.SetGroupVersionKind(rbacv1.SchemeGroupVersion.WithKind("ClusterRoleBinding"))
_ = authz.Handler.Client.Delete(authz.Handler.Context, crb)
Expand Down
Loading