Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Develop better ACLs for prow build clusters and e2e projects #844

Closed
spiffxp opened this issue May 6, 2020 · 8 comments
Closed

Develop better ACLs for prow build clusters and e2e projects #844

spiffxp opened this issue May 6, 2020 · 8 comments
Labels
area/access Define who has access to what via IAM bindings, role bindings, policy, etc. area/prow Setting up or working with prow in general, prow.k8s.io, prow build clusters lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. sig/testing Categorizes an issue or PR as relevant to SIG Testing.

Comments

@spiffxp
Copy link
Member

spiffxp commented May 6, 2020

At present, I basically copied what was done for the aaa cluster and the kubernetes-public project, and applied that to:

  • k8s-infra-prow-build/prow-build
  • k8s-infra-prow-build-trusted/prow-build-trusted

There are some problems with this setup:

  • I'm listed as the only owner (org owners incidentally have owner privileges, I think)
  • Nobody else has the project editor role
  • The existing set of people who have access to k8s-prow-builds/prow don't have access to these clusters (IIRC they basically have the project owner role for their clusters)

I'd like to get us to the point where we have something better, possibly:

  • the ability for a larger group of people to be able to view things (logging, monitoring) for both prow build clusters
  • the ability for a smaller trusted group of people to be able to write to the prow-build cluster
  • the ability for a (even smaller? different?) trusted group of people to read secrets and write to the prow-build-trusted cluster
  • the ability for people to see what's happening in a given e2e cluster (maybe v0 of this is predefining a role that can be manually/selectively granted)

ref: #752, followup to: #830

@spiffxp spiffxp added area/access Define who has access to what via IAM bindings, role bindings, policy, etc. sig/testing Categorizes an issue or PR as relevant to SIG Testing. wg/k8s-infra labels May 6, 2020
This was referenced May 6, 2020
@spiffxp spiffxp added the area/prow Setting up or working with prow in general, prow.k8s.io, prow build clusters label May 7, 2020
@spiffxp
Copy link
Member Author

spiffxp commented May 7, 2020

Spoke with test-infra-oncall team, if I can't add the group they use, I have permission to create a new @kubernetes.io group for them here

@spiffxp spiffxp added this to Backlog in sig-k8s-infra May 11, 2020
@spiffxp spiffxp changed the title Develop better ACLs for prow build clusters Develop better ACLs for prow build clusters and e2e projects May 13, 2020
@spiffxp
Copy link
Member Author

spiffxp commented May 27, 2020

Will work on this over next two weeks

@spiffxp
Copy link
Member Author

spiffxp commented Jun 9, 2020

#919 setup the following:

They're only using primitive roles (owner and viewer)

@spiffxp
Copy link
Member Author

spiffxp commented Jul 30, 2020

k8s-infra-prow-viewers@kubernetes.io is significantly more useful now thanks to the custome prow.viewer role added in #1061

@spiffxp
Copy link
Member Author

spiffxp commented Oct 6, 2020

Revisiting the description

I'd like to get us to the point where we have something better, possibly:

  • the ability for a larger group of people to be able to view things (logging, monitoring) for both prow build clusters

Members of k8s-infra-prow-viewers@kubernetes.io can do this

  • the ability for a smaller trusted group of people to be able to write to the prow-build cluster
  • the ability for a (even smaller? different?) trusted group of people to read secrets and write to the prow-build-trusted cluster

I question whether it's worth making the distinction between "can access secrets" and "can write to cluster". The more valuable thing would be to build trust and staff k8s-infra-prow-oncall@kubernetes.io. What do others think?

  • the ability for people to see what's happening in a given e2e cluster (maybe v0 of this is predefining a role that can be manually/selectively granted)

Members of k8s-infra-prow-viewers@kubernetes.io can do this

RFC: what else do people think needs to be done to close this out?

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jan 4, 2021
@spiffxp
Copy link
Member Author

spiffxp commented Jan 14, 2021

/close
Calling this done, we can open separate issues if we'd like to adjust prow-related ACL's

@k8s-ci-robot
Copy link
Contributor

@spiffxp: Closing this issue.

In response to this:

/close
Calling this done, we can open separate issues if we'd like to adjust prow-related ACL's

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

sig-k8s-infra automation moved this from Backlog to Done Jan 14, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/access Define who has access to what via IAM bindings, role bindings, policy, etc. area/prow Setting up or working with prow in general, prow.k8s.io, prow build clusters lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. sig/testing Categorizes an issue or PR as relevant to SIG Testing.
Projects
sig-k8s-infra
  
Done
Development

No branches or pull requests

3 participants