You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
RBAC permissions are still unnecessarily wide today in that pods and pod/exec are granted too broadly. This isn't necessary as the only Pod which needs to be created and exec'd into is the datamover Pod.
Solution Description
Reduce RBAC permissions for Pod creation and /exec subresource to only the datamover Pod.
Alternatives
No response
Additional Context
No response
Troubleshooting
I have searched other issues in this repository and mine is not recorded.
The text was updated successfully, but these errors were encountered:
Because of a combination of the need to support concurrent resizing operations across the cluster (both inter- and intra-namespace), and therefore the need to bring up Pods with dynamic names, coupled with the fact that resourceNames in RBAC rules[] does not support wildcards or regex, this may not be possible to do. Best we may be able to do here is pass a config option to tell DAS to only perform resizes serially and therefore be able to use a Pod with a static name thereby allowing more restrictive RBAC.
Problem Statement
RBAC permissions are still unnecessarily wide today in that
pods
andpod/exec
are granted too broadly. This isn't necessary as the only Pod which needs to be created and exec'd into is the datamover Pod.Solution Description
Reduce RBAC permissions for Pod creation and
/exec
subresource to only the datamover Pod.Alternatives
No response
Additional Context
No response
Troubleshooting
The text was updated successfully, but these errors were encountered: