Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

✨ (helm) Service Account support for K8s Resources in Helm Charts #780

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

AlexB-mgtc
Copy link

Purpose

Implement #778

Add support for specifying custom service accounts in all Kubernetes resources in our Helm charts to enable workload identity federation with managed cloud services (PostgreSQL, Redis, etc.). This allows deployments to authenticate to cloud resources without embedding credentials in secrets.

Proposal

This PR adds an optional serviceAccountName parameter to each component section in the Helm chart values that can be specified during deployment. When provided, the specified service account will be used for the corresponding Kubernetes resources.

✅ Add serviceAccountName field to Backend deployment and job templates
✅ Add serviceAccountName field to Frontend deployment template
✅ Add serviceAccountName field to Y-Provider deployment template
✅ Update values.yaml with new parameters and documentation
✅ Ensure backward compatibility with null default values
✅ Regenerate README.md
✅ Update CHANGELOG.md

Example usage in values.yaml:

backend:
  serviceAccountName: backend-sa  # For database access

frontend:
  serviceAccountName: frontend-sa  # For storage access

yProvider:
  serviceAccountName: yprovider-sa  # For collaboration services

@lunika
Copy link
Member

lunika commented Mar 25, 2025

Hi,
Thank you for your contribution.

In order to merge it can you please

Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants