roles: add custom org role container.deployer#2156
roles: add custom org role container.deployer#2156k8s-ci-robot merged 3 commits intokubernetes:mainfrom
Conversation
|
/cc @BenTheElder @ameukam |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: BenTheElder, spiffxp The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/lgtm |
| - contactcenterinsights.analyses.list | ||
| - contactcenterinsights.conversations.list | ||
| - contactcenterinsights.issueModels.list | ||
| - contactcenterinsights.issues.list | ||
| - contactcenterinsights.operations.list | ||
| - contactcenterinsights.phraseMatchers.list |
There was a problem hiding this comment.
@spiffxp out of curiosity, why do we need this ? Do we have a GCP API use this as a dependency ?
There was a problem hiding this comment.
These are coming in via roles/iam.securityReviewer, ref:
k8s.io/infra/gcp/roles/specs/audit.viewer.yaml
Lines 45 to 46 in b4f1725
And we're constraining to list|get.* permissions, with some service-specific exceptions, ref:
k8s.io/infra/gcp/roles/specs/audit.viewer.yaml
Lines 59 to 67 in b4f1725
You're right that we don't need this; it's more that I've been lazy about restricting what we pull in. I honestly don't really know whether it makes more sense to use roles/viewer instead of all the service-specific roles, or if it's worth investing the time to tighten the role to exactly the services we expect.
There was a problem hiding this comment.
I'm happy with the current state of laziness just want to make sure I understand correctly. :-)
Looking at https://github.com/darkbitio/gcp-iam-role-permissions/blob/master/roles/viewer, I think we should stick at custom roles.
|
/hold cancel |
|
Ran |
The intent is to bind this to prow-deployer@k8s-infra-prow-build-trusted to give prow the ability to CRUD all resources in a given GKE cluster without granting it permission to CRUD the cluster itself.
Motivated by issues deploying kubernetes-external-secrets via post-k8sio-deploy-prow-build-trusted-resources: #2148 (comment)
See individual commits for details