Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

security: Operator and Toolbox SCC for default service account on OpenShift #13936

Merged
merged 1 commit into from
Mar 18, 2024

Conversation

travisn
Copy link
Member

@travisn travisn commented Mar 14, 2024

The default service account access is needed for the operator and the toolbox to run on openshift. This is a follow-up from #13362 that created a new default service account to use with all ceph or rook components that were relying on the default service account.

Checklist:

  • Commit Message Formatting: Commit titles and messages follow guidelines in the developer guide.
  • Reviewed the developer guide on Submitting a Pull Request
  • Pending release notes updated with breaking and/or notable changes for the next minor release.
  • Documentation has been updated, if necessary.
  • Unit tests have been added, if necessary.
  • Integration tests have been added, if necessary.

@travisn travisn requested a review from parth-gr March 14, 2024 18:34
@travisn travisn force-pushed the default-serviceaccount-scc branch from d96f5ae to d594510 Compare March 14, 2024 18:39
Copy link
Member

@parth-gr parth-gr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@@ -22,6 +22,7 @@ spec:
app: rook-ceph-tools-operator-image
spec:
dnsPolicy: ClusterFirstWithHostNet
serviceAccountName: rook-ceph-default
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does that mean toolbox deployment should also use the default service account created by rook, instead of k8s default service account?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, toolbox needs to use the service account, it's updated below as well.

@subhamkrai
Copy link
Contributor

we may need to backport it to 1.13 since required for download also

@travisn
Copy link
Member Author

travisn commented Mar 15, 2024

we may need to backport it to 1.13 since required for download also

What's required for 1.13? The new default service account is only expected in 1.14

@travisn travisn force-pushed the default-serviceaccount-scc branch from d594510 to 3a93a72 Compare March 15, 2024 15:20
@parth-gr
Copy link
Member

@travisn I think Subham means for the downstream, but we have a separate pr for it red-hat-storage/ocs-operator#2511

The default service account access is needed for the operator
and the toolbox to run on openshift. This is a follow-up from
PR 13362 that created a new default service account to use with
all ceph or rook components that were relying on the default
service account.

Signed-off-by: Travis Nielsen <[email protected]>
@travisn travisn force-pushed the default-serviceaccount-scc branch from 3a93a72 to 3e54055 Compare March 18, 2024 17:40
@travisn travisn merged commit a536b36 into rook:master Mar 18, 2024
51 checks passed
@travisn travisn deleted the default-serviceaccount-scc branch May 29, 2024 16:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

3 participants