-
Notifications
You must be signed in to change notification settings - Fork 894
feat: cancel stuck pending jobs #17803
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 1 commit
0f51f35
2f3d606
4b252eb
ca49519
af994c2
3815727
b65f620
3c7c323
35df01f
8aa1ee2
4385933
96fee51
d8db119
5120fb1
8d4fa5a
18b809c
0fe1404
77be34e
4351529
c03bfa3
a15bd1c
5b9348f
91d2d32
767cb77
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
- Loading branch information
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -503,7 +503,7 @@ func ReloadBuiltinRoles(opts *RoleOptions) { | |
// the ability to create templates and provisioners has | ||
// a lot of overlap. | ||
ResourceProvisionerDaemon.Type: {policy.ActionCreate, policy.ActionRead, policy.ActionUpdate, policy.ActionDelete}, | ||
ResourceProvisionerJobs.Type: {policy.ActionRead}, | ||
ResourceProvisionerJobs.Type: {policy.ActionRead, policy.ActionUpdate, policy.ActionCreate}, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Wouldn't regular members need this permission too? To create the jobs for their workspaces? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. They would, but I'm not sure I want to polute the RBAC with assigning members access to all provisioner jobs. We currently don't check this at all. I'll introduce another PR that separetly focuses on solving this issue. |
||
}), | ||
}, | ||
User: []Permission{}, | ||
|
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These should really be scoped. If users are inside orgs, even if they are
org-admins
they should not be able to read across org boundaries.The organization boundaries have to be kept.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Right now it's impossible to check this without extending the database that would link ProvisionerJobs to owners.
I'll do that in a separate PR.