Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

manifest fails on Azure ("attempt to grant extra privileges") #17

Closed
Globegitter opened this issue Jun 20, 2017 · 3 comments
Closed

manifest fails on Azure ("attempt to grant extra privileges") #17

Globegitter opened this issue Jun 20, 2017 · 3 comments

Comments

@Globegitter
Copy link

After fixing the error mentioned in #16 I get the following error:

Error from server (Forbidden): error when creating "controller.yaml": roles.rbac.authorization.k8s.io "sealed-secrets-key-admin" is forbidden: attempt to grant extra privileges: [{[get] [] [secrets] [sealed-secrets-key] []} {[create] [] [secrets] [] []}] user=&{client  [system:authenticated] map[]} ownerrules=[] ruleResolutionErrors=[]
Error from server (Forbidden): error when creating "controller.yaml": clusterroles.rbac.authorization.k8s.io "secrets-unsealer" is forbidden: attempt to grant extra privileges: [{[get] [ksonnet.io] [sealedsecrets] [] []} {[list] [ksonnet.io] [sealedsecrets] [] []} {[watch] [ksonnet.io] [sealedsecrets] [] []} {[create] [] [secrets] [] []} {[update] [] [secrets] [] []} {[delete] [] [secrets] [] []}] user=&{client  [system:authenticated] map[]} ownerrules=[] ruleResolutionErrors=[]

I have just created a fresh cluster on azure, via acs-engine running on k8s 1.6.6 - not quite sure where the issues is.

@Globegitter
Copy link
Author

Ah, I think Azure/acs-engine#680 is probably the issue here.

@anguslees
Copy link
Contributor

Thanks for reporting the issue. I did wonder whether including the RBAC rules by default would cause problems for anyone, and it seems "yes" :(

The easy workaround is to download the controller.yaml and remove all the RBAC rules. Please let me know if https://gist.github.com/anguslees/cd81816ada739258dd493114818753a6 works for you (actually verify that it can create secrets, etc not just that kubectl create works). If it's useful, I can include this simpler manifest in future releases.

@anguslees anguslees changed the title Error from server manifest fails on Azure ("attempt to grant extra privileges") Jun 21, 2017
@Globegitter
Copy link
Author

@anguslees Yeah including that in future releases would indeed be useful, at least for a while, at some point it would probably good to push everyone to use RBAC. Anyway, I updated your snippet to 0.3.0 and then ran the commands from the readme and all working. Thanks for posting this so quickly.

anguslees added a commit to anguslees/sealed-secrets that referenced this issue Jun 22, 2017
RBAC doesn't work on Azure atm, and the additional RBAC rules may also
be undesirable in other future situations.

This change adds and publishes a `controller-norbac.yaml` which is the
bare minimum required for controller functionality (TPR and controller
service/deployment).

Fixes bitnami-labs#17
anguslees added a commit to anguslees/sealed-secrets that referenced this issue Jun 22, 2017
RBAC doesn't work on Azure atm, and the additional RBAC rules may also
be undesirable in other future situations.

This change adds and publishes a `controller-norbac.yaml` which is the
bare minimum required for controller functionality (TPR and controller
service/deployment).

Fixes bitnami-labs#17
anguslees added a commit to anguslees/sealed-secrets that referenced this issue Jun 22, 2017
RBAC doesn't work on Azure atm, and the additional RBAC rules may also
be undesirable in other future situations.

This change adds and publishes a `controller-norbac.yaml` which is the
bare minimum required for controller functionality (TPR and controller
service/deployment).

Fixes bitnami-labs#17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants