You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
I created a new blueprint that requires access to the K8s API to patch resources like ArgoCD, so I extended the Kanister operator's RBAC with additional roles. However, when executing the Kanister task in the application namespace, it defaults to using the standard service account.
// If a ServiceAccount is not specified and we are in the controller's
// namespace, use the same service account as the controller.
sa:=opts.ServiceAccountName
ifsa==""&&ns==cns {
sa, err=GetControllerServiceAccount(cli)
iferr!=nil {
returnnil, errors.Wrap(err, "Failed to get Controller Service Account")
}
}
Describe the solution you'd like
The serviceAccountName field should be configurable (with this solution, an user can provision the required RBAC + serviceAccount)
Thanks for opening this issue 👍. The team will review it shortly.
If this is a bug report, make sure to include clear instructions how on to reproduce the problem with minimal reproducible examples, where possible. If this is a security report, please review our security policy as outlined in SECURITY.md.
If you haven't already, please take a moment to review our project's Code of Conduct document.
Like documented here (https://docs.kanister.io/functions.html#kubetask), the serviceAccount for the KubeTask pod can be configured using the function argument podOverride. Below is how it can be used
Is your feature request related to a problem? Please describe.
I created a new blueprint that requires access to the K8s API to patch resources like ArgoCD, so I extended the Kanister operator's RBAC with additional roles. However, when executing the Kanister task in the application namespace, it defaults to using the standard service account.
kanister/pkg/kube/pod.go
Lines 79 to 87 in fa04d77
Describe the solution you'd like
The serviceAccountName field should be configurable (with this solution, an user can provision the required RBAC + serviceAccount)
Environment
Kubernetes Version/Provider: AWS EKS 1.31
Storage Provider: AWS EBS
Cluster Size (#nodes): 6 nodes (3 masters + 3 workers)
Data Size: 10Gi
Additional context
The default service account does not allow the users to perform the actions that the kanister operator service account can do.
The text was updated successfully, but these errors were encountered: