Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

1Password Connect not using onepassword-connect-operator Service Account #191

Open
ahussey-redhat opened this issue Apr 1, 2024 · 0 comments
Labels
bug Something isn't working

Comments

@ahussey-redhat
Copy link

Your environment

Chart Version: 1.15.0

Helm Version: N/A (deployed using ArgoCD)

Kubernetes Version: OpenShift 4.15.3

What happened?

When deploying 1Password Connect, the connect pod fails to start because the SCC that is required (anyuid) isn't associated with the default Service Account. It is however associated with the onepassword-connect-operator Service Account.
By manually modifying the deployment, and specifying serviceAccount: onepassword-connect-operator, the issue is resolved and the deployment is successful.

What did you expect to happen?

The deployment to deploy successfully.

Steps to reproduce

  1. Deploy the 1Password Connect Operator using Helm on OpenShift
  2. Watch the 1Password Connect Deployment fail due to SCC errors

Notes & Logs

If you could add the following stanza to the connect definition in the Helm values, and use that to define the service account for the onepassword-connect Deployment, this issue will be resolve

  serviceAccount:
    create: true
    annotations: {}
    name: onepassword-connect-operator
@ahussey-redhat ahussey-redhat added the bug Something isn't working label Apr 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant