Skip to content
This repository was archived by the owner on Feb 22, 2022. It is now read-only.

[stable/nginx-ingress] namespace scoped installation not longer possible because of Bugfix #9636 #11033

Closed
Nuke1234 opened this issue Jan 31, 2019 · 5 comments · Fixed by #13460
Labels
lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale.

Comments

@Nuke1234
Copy link

Version of Helm and Kubernetes:
Client: &version.Version{SemVer:"v2.10.0", GitCommit:"9ad53aac42165a5fadc6c87be0dea6b115f93090", GitTreeState:"clean"}
Server: &version.Version{SemVer:"v2.10.0", GitCommit:"9ad53aac42165a5fadc6c87be0dea6b115f93090", GitTreeState:"clean"}

Kubernetes version 1.11

Which chart:

stable/nginx-ingress

What happened:

I tried to install the nginx-ingress controller namespaced, where helm is also restricted to this namespace and does not have permissions to create cluster roles and cluster role bindings.

Error: release event-gateway-nginx failed: clusterroles.rbac.authorization.k8s.io is forbidden: User "system:serviceaccount:event-gateway:tiller" cannot create clusterroles.rbac.authorization.k8s.io at the cluster scope

#9636 introduced a cluster role and cluster role binding for a scoped nginx ingress. This prohibits installing nginx-ingress in a rbac enabled cluster where the helm service account is also limited to a certain namespace.

What you expected to happen:
I expected that the installation of nginx-ingress when scoped doesn't need a service account which has cluster admin rights

How to reproduce it (as minimally and precisely as possible):
install a tiller with a service account scoped to one namespace
install the stable/nginx ingress controller

Anything else we need to know:

@MV-SH
Copy link

MV-SH commented Feb 18, 2019

The latest chart version 1.3.1 still has this problem - after #9636, the scoped deployment can no longer be finished without having authorization for cluster role deployments, which defies the purpose of having scoped deployment in the first place.

@stale
Copy link

stale bot commented Mar 20, 2019

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Any further update will cause the issue/pull request to no longer be considered stale. Thank you for your contributions.

@stale stale bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Mar 20, 2019
@MV-SH
Copy link

MV-SH commented Mar 20, 2019

Well there hasn't been much activity on this issue from the Helm charts side, so just as a followup, this seems to have been fixed upstream in kubernetes/ingress-nginx#3887

Therefore, the cluster level roles added in #9636 should not be needed anymore and everything can get back to normal.

@stale stale bot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Mar 20, 2019
@stale
Copy link

stale bot commented Apr 19, 2019

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Any further update will cause the issue/pull request to no longer be considered stale. Thank you for your contributions.

@stale
Copy link

stale bot commented May 4, 2019

This issue is being automatically closed due to inactivity.

@stale stale bot closed this as completed May 4, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants