-
Notifications
You must be signed in to change notification settings - Fork 390
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow setting service account on build pods #1506
Comments
An alternative solution to support AWS ECR as the docker registry was proposed (and just updated) in #1055. I will look into your proposed change and see if I can (and have time to) come up with something. |
I've commented on #1055 (comment) If you want to add a service account I think you can just add a new traitlets config to Lines 189 to 209 in c4af713
and pass that into the pod creation method if it's set. Ignore the old Build class and most of the BinderHub.* settings- with the new Traitlets based class there's no need to pass parameters down through the whole BinderHub stack since Traitlets automatically passes them to the class.
|
Proposed change
Currently, we pass in the username / password for the docker registry so we can push images to it. There are solutions like workload-identity and IRSA that allow using kubernetes service accounts to be used instead to authenticate to cloud services.
Currently, there's no way to configure which kubernetes service account the build pods should use. We'll need to expose that as an option to make use of it.
Alternative options
Who would use this feature?
(Optional): Suggest a solution
Builder
object, so it can use it to construct the podThe text was updated successfully, but these errors were encountered: