New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow clusterwide actions within apb #576
Comments
|
IRC Discussion: https://paste.fedoraproject.org/paste/-bnngTfuX3Kr6qgKQ11emg |
|
I'm all for finding a way to enable APBs that are specifically targeted at cluster admins. I ran into this as well with my shot at an acme-controller-apb (there was also another problem with the asb modules, so I didn't actually encouter this denial) Could deploying a dedicated ASB for these cluster-wide APBs be a solution? And then find a way to have this broker's APBs only be useable for/shown in the Service Catalog of privileged users? |
|
maybe we can address it in a simpler way by optionally enabling the use of a dedicated namespace for the apb run using default sa there ? |
|
Looking at asb-installer, I kinda like the idea of using the APB format just to package privileged applications and install without actually using the broker. |
That's definitely a possibility. Here's what I was thinking for this issue:
|
|
for testing purposes, cant we just have the apb running in a specific namespace with a specific (or default) sa ( i was thinking of the openshift-ansible-broker ns actually) |
|
An example 'tech-preview' way to give an apb cluster-level access: https://github.com/ansibleplaybookbundle/kubevirt-apb/blob/master/roles/kubevirt-apb/tasks/provision.yml#L3-L13. To summarize, the user pass login credentials to the apb. The apb will sign into a user that has cluster-admin permissions, which will allow your apb to have full access to cluster-resources. |
|
The pastebin link from #576 (comment) is no longer valid. Looking through my IRC logs from Dec 5, 2017 I think this was the conversation that was intended. Adding it here for posterity. |
|
Is there any workaround for this other than asking for user/pwd as apb params? |
|
@siamaksade I have seen work to have namespaced brokers that are capable of doing cluster level actions. I have also worked on https://github.com/openshift/ansible-service-broker/blob/master/apb/install.yaml which runs the broker-apb in a pod. That broker-apb does everything from creating cluster role bindings to custom resource definitions. To answer your question though, if your goal is to have an APB accessed via the service-catalog UI in OpenShift that has this kind of power, the answer is no. In that case you would need to use one of the workarounds like user/pwd as the apb's parameters. |
|
@djzager I saw the broker installer but that is sort of contradictory to the goals of creating an APB. We could always run playbooks inside a pod, no reason to turn it into an APB |
|
@siamaksade there is currently no additional workarounds that I am aware of and I believe you will be waiting for namespaced brokers before you could expect the Broker to support this in an intelligent way. Here is the proposal PR against the service-catalog kubernetes-retired/service-catalog#1826. |
as one can be done with say helm, it would be useful to be able to create namespaces within the apb or define cluster role bindings .
this is useful for example for controllers trying to gather custom resource definitions cluster wide
What happened:
gets a permission denied
What you expected to happen:
sample code to succeed
How to reproduce it:
use the following sample code in an apb
The text was updated successfully, but these errors were encountered: