Describe the bug
- I need to lockdown an azure environment and restrict developer access to AKS Service endpoints so that they can use Azure Dev Spaces
- To achieve this , I enabled the Azure Kubernetes Service RBAC Reader Role and the Azure Kubernetes Service Contributor Role
.
- With these permissions , they are unable to access deploy service to AKS and hit a
403 in the logs.
- It seems that they require
Contributor Role, which I think is too permissive.
To Reproduce
Steps to follow to reproduce this issue.
Expected behavior
A clear and concise description of what you expected to happen.
Logs
Attach logs from the following directory:
For Windows: %TEMP%/Azure Dev Spaces
For OSX/Linux: $TMPDIR/Azure Dev Spaces
Environment Details
Client used (CLI/VS Code/Visual Studio): CLI
Azure Dev Spaces CLI
1.0.20200
API v3.2
Client's version:
Operating System:
MacOS
Additional context
Add any other outputs from the clients or context you would like to share.