Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: easier permission management for pipelines #192

Closed
abangser opened this issue Jul 12, 2024 · 2 comments
Closed

feat: easier permission management for pipelines #192

abangser opened this issue Jul 12, 2024 · 2 comments

Comments

@abangser
Copy link
Member

abangser commented Jul 12, 2024

By default Kratix creates a service account for use by pipelines. They are deterministically named (using the name of the Promise) and this allows for users to provide permissions to the pipelines using Kubernetes native options such as RBAC. There are two service accounts created per Promise. One for the promise workflows (both configure and delete) and one for the resource workflows (both configure and delete).

While the promise workflows always run in the kratix-platform-system namespace, the resource workflows run in the namespace where the request comes into. This is not always deterministic and therefore users right now need to manage copying any data (e.g. secrets or configmaps) and any permissions (e.g. rolebindings) over into each namespace a user might make a request from. This isn't a great experience.

We want permission to be something that is more native to the Promise writing experience and therefore can be created on request rather than separately managed. Some designs are being drawn up, if this is interesting please reach out!

Note: this is different from more control over permissions which will be handed in #193.

@kirederik
Copy link
Member

kirederik commented Jul 17, 2024

@abangser
Copy link
Member Author

abangser commented Aug 9, 2024

This issue was covered by the work described above

@abangser abangser closed this as completed Aug 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants