Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Core Feature] Flyte Security Context #800

Closed
EngHabu opened this issue Mar 5, 2021 · 1 comment
Closed

[Core Feature] Flyte Security Context #800

EngHabu opened this issue Mar 5, 2021 · 1 comment
Assignees
Labels
enhancement New feature or request
Milestone

Comments

@EngHabu
Copy link
Contributor

EngHabu commented Mar 5, 2021

Motivation: Why do you think this is important?
Flyte launches many entities through different execution engines, defining what identity each one should impersonate when executing has been one of the confusing aspects of using Flyte. Let's step back, define what the right model is based on what we know today and make sure it works across the stack.

Goal: What should the final outcome look like, ideally?

  1. Works with Tasks that run on pods, remote containers (e.g. AWS Batch) where you have user's custom code that runs and need an identity to communicate with other resources as well as metadata tasks (e.g. SQL Queries, WebAPI calls... etc.) where the execution of user's code is more controlled.
  2. Defaults can be set at Task level but should be overridable at LaunchPlan and Execution levels
  3. Support passing secrets, IAM and k8s service accounts.
@kumare3
Copy link
Contributor

kumare3 commented Mar 24, 2021

This is merged and will be available in the next platform release (it is available in the nightly build) - Example: https://github.com/flyteorg/flytesnacks/blob/master/cookbook/core/intermediate/use_secrets.py

@kumare3 kumare3 closed this as completed Mar 24, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants