-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verifying that chectl can deploy multiuser Che without cluster admin privileges #14662
Comments
If we want to configure OpenShift OAuth or create console link - then we need cluster role https://github.com/eclipse/che-operator/blob/master/deploy/cluster_role.yaml But from your logs, we can see that it failed during role creating and AFAIU it's about granting operator an ability to created pods, routes, services ... https://github.com/eclipse/che-operator/blob/master/deploy/role.yaml But your issue totally makes sense if we can not avoid admin rights at all - maybe we can improve UX, like make chectl interactive - ask the user to type credentials that we will use only for those operations that we can not do with default context credentials. |
Testing now on
I see
And running as |
@amisevsk It's not possible to deploy operator without admin rights yet.
I just shared different alternatives for using chectl+minishift and I definitely agree that chectl workflow should be improved. |
Thanks @sleshchenko -- I realize that the operator requires admin, it was just a little confusing. Mostly the issue is one you've described elsewhere of trying to get serviceaccounts in the default namespace causing a confusing message (but I think you've got a PR for this already). @ibuziuk Regarding the scope of this issue, what actual testing is required? We currently have five platforms listed in the issue description, for each of those do we need to just test the "main" installer for that platform (e.g. helm for k8s clusters, etc)? As it stands, my opinion would be
|
These are the minimum permissions required to install che via `chectl: I bound those roles to the The main admin-y thing is being able to create clusterroles/roles. This requires a decent level of permissions, but not cluster-admin. If you are able to create cluster roles you can create the roles required to access |
Updated Roles required for a normal user to install che via https://gist.github.com/tomgeorge/3e6d9cefad635160a022fc1a8f929e1c Testing matrix:
|
Creating a CRD requires cluster wide privileges and I think we should process that in a different way compared to the creation of namespaced resourced. An idea would be to add the option
@tomgeorge about your testing matrix: are the default user privileges enough to deploy Che (if we exclude the CRD) on minikube/minishift/crc? |
They are not, I had to apply the roles listed above. If I disable Minikube does not have any identity provider and users are typically in the admin context, so that is less of an issue. |
for point 2a: I believe that you would need permission to impersonate |
@l0rd @davidfestal what if the che operator created a |
hello @sleshchenko @amisevsk could we update the doc accordingly ? if anything is needed to install Che, should be specified in https://www.eclipse.org/che/docs/che-7/running-che-locally/#using-minishift-to-set-up-openshift-3_running-che-locally |
@sunix Sorry, accordingly to what? [1] eclipse-che/che-operator#137 |
Is this issue done? If so, please close. If not, please move to backlog or scheduled milestone. |
Tom said: "No it probably should go back in the backlog" |
Issues go stale after Mark the issue as fresh with If this issue is safe to close now please do so. Moderators: Add |
Currently, cluster-admin is a requirement according to the chectl error message:
admin rights should not be required (except if the user wants to configure Keycloak to use OpenShift OAuth). Today for some reason we create a che-operator ClusterRole. Why do we need that? Can we avoid it?
Usecase:
The text was updated successfully, but these errors were encountered: