-
Notifications
You must be signed in to change notification settings - Fork 263
Closed
Labels
bugSomething isn't workingSomething isn't working
Description
Describe the bug
At the moment the Helm chart produces roles with resource
set to kind/resource-name
(e.g. secrets/taskcluster-ui
). This causes issues when deploying from restricted service accounts where RBAC is enabled.
To Reproduce
Steps to reproduce the behavior:
- Use
helm template
on the chart ininfrastructure/k8s
with a validvalues.yml
. - Look at the generated
Role
s. - Notice that the
resource
field doesn't match the documentation.
Alternatively:
- Create a service account with appropriate roles to deploy Taskcluster (in particular all verbs for
secrets
). - Try and deploy Taskcluster.
- Notice errors during deployment:
roles.rbac.authorization.k8s.io \"taskcluster-web-server-secrets-read\" is forbidden: user \"system:serviceaccount:taskcluster-operator:default\" (groups=[\"system:serviceaccounts\" \"system:serviceaccounts:taskcluster-operator\" \"system:authenticated\"]) is attempting to grant RBAC permissions not currently held:\n{APIGroups:[\"\"], Resources:[\"secrets/taskcluster-web-server\"], Verbs:[\"get\" \"watch\" \"list\"]}
Expected behavior
Kubernetes Roles should use resourceNames
to specify individual resources: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#referring-to-resources.
Taskcluster version
v37.2.0
Kubernetes Version
1.16.13-gke.401
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working