-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FlowForge helm: 1. Editors: service account. 2. Broker: propagate ingress. 3. README #148
FlowForge helm: 1. Editors: service account. 2. Broker: propagate ingress. 3. README #148
Conversation
… broker: propagate ingress definitions to broker helm. 3. remove secrets from referent values.yml, adding ref for service account definition. 4. Update README.md with IAM section
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for this, I've added some quick notes, but will have to come back and review properly later.
One small thing, the issue says the changes can be applied independently, but that's not possible if they are all in the same PR.
And it would also be useful to raise the issue with the suggestions before doing the work for the PR so we have time to discuss the requirements/changes first to ensure they align with our future plans. If you can update the issue with details about each change that would be useful
@hardillb Thank you, sorry for making some mess here. You are right about several aspects of this PR, which is clearly wrong and I will take this into account. Regarding aspects:
Please let me know if this makes more sense and thank you! |
The broker Ingress annotations definitely The editor AWS IAM stuff I want to have a longer think about, I think it would be best to try and build a generic way to add kubernetes annotations that can be applied across the board so we don't end up adding values for each specific task and also don't add things that end up being AWS specific if possible so we can support all the different Cloud environment equally. I will try and come up with something over the weekend. |
Just wanted to apologize for the misunderstanding which I might introduce with "IAM". Regarding the ServiceAccount - since it's k8s-level resource, it can be used with the different annotations, depending on the vendor, but still serve the purpose of identity binding.
Still this does not solve the problem of "multiple roles support per project" since it's going to be "identity for any project running on this FlowForge" - but this is the food for thinking! 🙂 |
Sorry it's been a while, just looking at this again. Can you please add the new helm fields to the values.schema.json file as a well |
…unt definition schema to align with default values.yaml
Hey @hardillb, sorry for delay.
|
Will need to patch the broker annotations in #156 |
Multiple changes in FlowForge helm, all are optional.
Description
FlowForge helm edits:
values.yaml
, adding ref forEditors default service account definition
.*Note that by "default" here meant that all Editor instances will be provisioned with this service account linked.
Related Issue(s)
FlowForge helm: option to provision default service account for editors. broker: derive the ingress definitions from values.yaml. cluster role-related: resources names should be release-dependent
Checklist
flowforge.yml
?flowforge/helm
to update ConfigMap Templateflowforge/CloudProject
to update values for Staging/ProductionLabels
backport
labelarea:migration
label