-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ability to influence serviceaccount used in created deployment #31
Comments
The service account is managed by the component that deploys the container. For example, if tekton would be used to run pipelines that have kubedock running as a sidecar, you would use the |
Hmm.. I'm not quite sure I understand. I'm running the Task with the "kubedock" serviceaccount which has all the RBAC in place to create a deployment etc (like the RBAC listed in the README). But the deployment created still creates Pods with the default serviceaccount. So for example a PostgreSQL instance which has been spinned up is running with the default serviceAccount. |
Check, I misunderstood. You want to influence the serviceAccount in the containers that are spun up by kubedock. That makes sense. I think something like providing a command-line argument for that would be sufficient right? |
That would help. Maybe even a label which maps to the used serviceAccount? |
Added both label |
Wow! That was quick. Thanks a lot! |
I removed the override via the label; this can allow privilege escalation via a test if there are service accounts in the namespace kubedock is running that have more privileges. |
I'm looking through the code but can't see a way to influence the serviceaccount used. The default serviceaccount would be unwise and probably in many setups has little to none rights. Would there be a way to specificy this as a label as well?
Thanks for kubedock!
Regards,
Gijs van Dulmen
The text was updated successfully, but these errors were encountered: