-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
using user-gcp-sa creds for a pipeline step appears to prevent creating cluster resources from that pod #705
Comments
One 'gotcha' scenario if we don't do this: I could see people wanting to just blanket apply |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has been automatically closed because it has not had recent activity. Please comment "/reopen" to reopen it. |
It looks like any pipeline step pod that needs to create a new service, deployment, etc. will throw a permissions error that the kf 'user' account (
<deployment_name>-user@
) doesn't have the rights to do "container.services.create", "container.deployments.create", etc.) if the pod is using gcp auth via the.apply(gcp.use_gcp_secret('user-gcp-sa'))
call for that step when the pipeline is defined. Without the gcp creds attached, it can create the service successfully.Adding the "Kubernetes Engine Admin" role to that kf user account fixes the issue.
I guess that might mean that the gcp creds in this case are less permissive than the non-gcp-credentials state?
I'd argue that use of the gcp creds shouldn't prevent creating new cluster resources.
(This may be more a core kf issue... feel free to re-categorize)
The text was updated successfully, but these errors were encountered: