-
Notifications
You must be signed in to change notification settings - Fork 97
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] - Only users in admin group can create environments #1898
Comments
I added @ericdatakelly to the admin group and he is now able to create environments as expected. |
@kcpevey Could you please confirm if this Nebari deployment uses the default Keycloak roles set by Nebari? Double-checking because I believe we can update this configuration in Keycloack later if needed, and I'd like to verify that this is a bug in Nebari vs. a case of better documentation. :) Also, potential ref: Lines 57 to 62 in a402580
|
@pavithraes the configuration matches the default. |
I assumed that users in the |
We might also need to modify how the role_bindings for developer role: Lines 123 to 127 in aab5f3f
|
Ref to conda-store role mapping: |
Next steps for @fangchenli:
|
The output for role_bindings looks correct to me. I moved role bindings related code to one method, and here is a simple test. user = "JohnDoe"
default_namespace = "default"
roles = {"developer"}
groups = {"group1", "group2", "group3"}
role_bindings = create_role_bindings(user, default_namespace, roles, groups) result: {'JohnDoe/*': {'admin'}, 'default/*': {'viewer'}, 'global/*': {'developer'}, 'group3/*': {'developer'}, 'group1/*': {'developer'}, 'group2/*': {'developer'}} |
This has been resolved at the conda-store level. Nebari needs to be upgraded to V2 role mapping to resolve this issue. |
I've verified that this is still an issue. As Kim said above, this can be resolved by upgrading to v2 of conda-store API. |
xref: #2090 |
This will be taken care of as part of the permissions overhaul. Blocked until that work is further along. |
This is resolved by the permissions overhaul. Keycloak admins can assign fine-grained permissions for certain namespaces with view, edit admin access https://www.nebari.dev/docs/how-tos/fine-grained-permissions#conda-store-scopes |
Describe the bug
I am unable to create an environment in a shared namespace via Conda Store. Another user on the same deployment of Nebari has the same experience. Our admin says we are in the shared user groups, so we should be able to create envs in those namespaces. I am able to view and use existing shared environments, but I cannot create one.
Expected behavior
I expected to be able to click on the plus symbol in a shared namespace and create an environment.
OS and architecture in which you are running Nebari
AWS
How to Reproduce the problem?
Command output
No response
Versions and dependencies used.
Nebari version: v2023.5.2.dev151+gc6941f3d.d20230727
Compute environment
AWS
Integrations
Keycloak, conda-store
Anything else?
No response
The text was updated successfully, but these errors were encountered: