-
Notifications
You must be signed in to change notification settings - Fork 244
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ability to specify ServiceAccount for odo dev
#5977
Comments
Notes from the discussion on this in the odo contributors' call:
|
As part of this Sprint, the team will be investigating how to implement pod-overrides and container-overrides annotations in the Devfile library (as a more generic way that would allow us to support user-defined ServiceAccounts), as discussed in devfile/api#920 (comment). Related issue: devfile/api#936 To better estimate the work that needs to be done, we are investigating if there exists some library that could help with merging JSON data. /assign @feloy |
The gojq (github.com/itchyny/gojq) can be used:
|
I've opened devfile/library#155 for |
TODO (as of Nov-23, 2022):
|
This issue is slightly blocked on devfile/api#1002. |
/label status/blocked |
/kind feature
Which functionality do you think we should add?
When running the
odo dev
command, I would like to be able to specify the Kubernetes ServiceAccount the pod should run as.Why is this needed?
Currently, if you use
odo dev
the pod will start as the default service account. Some workloads running on Kubernetes need to run as a specific service account in order to have the proper permissions to work properly. One common use case is a Kubernetes Operator.The text was updated successfully, but these errors were encountered: