GitHub actions job with Kaniko container image set is using the wrong credentials #3963
Open
4 tasks done
Labels
bug
Something isn't working
gha-runner-scale-set
Related to the gha-runner-scale-set mode
needs triage
Requires review from the maintainers
Checks
Controller Version
0.9.3
Deployment Method
Helm
Checks
To Reproduce
Describe the bug
The issue occurs specifically in the
Kaniko build job
.What I expect to happen:
I expect the job pod to use the mounted service account token to connect to AWS services.
I can see that the right Kubenretes service account is mounted alongside the credentials secret mounted - meaning it does not use the default SA, therefore there is not reason for it to assume the node permissions.
Describe the expected behavior
What actually happens:
The pod is using the node permissions in order to connect to AWS services, and then fails for lack of permissions.
This happens even though the right service account is mounted.
Additional Context
the controller and the runners themselves run in different namespaces as GitHub suggest is the best practice.
Controller Logs
Runner Pod Logs
The text was updated successfully, but these errors were encountered: