-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[epic] Permission validation pre-flight check #988
Comments
This epic is a prerequisite for #919 |
The first step is to schedule a design meeting and then work on the brief for this epic. |
Prior-art that could help kickstart some conversation: #1282 |
/assign @trgeiger |
@everettraven: GitHub didn't allow me to assign the following users: trgeiger. Note that only operator-framework members with read permissions, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@trgeiger did you really want to tackle this one? otherwise I'm psyched to work on it. Might be able to split up the work too. |
I'm happy to work together or help out, either way. I just wanted to dive head first into some of the upcoming work. I've got a brief and RFC started if you want to connect on that. |
Cool, I'm adding to the Brief now |
One #737 is implemented, it will be important to have a pre-flight check that is able to evaluate if the ServiceAccount provided in the
ClusterExtension
has sufficient permissions to stamp out the content for a bundle on the cluster. Having this pre-flight check would:I have done some previous work related to this in Carvel's kapp project [1]. It can be used as an inspiration for our own implementation or pulled in as a library (with a lightweight abstraction on top to satisfy the Preflight interface introduced in #979).
References:
Brief: https://docs.google.com/document/d/1fCkUaaXebfF1237iRrFC-F7HNNe7-TFeXpN0wSUdiXc/edit?usp=sharing
RFC: https://docs.google.com/document/d/1W7ThVE7yAd43IW1KETAB9x8pQqIRu7Dqs7jZi5QjQaM/edit?usp=sharing
The text was updated successfully, but these errors were encountered: