-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automated backport of #3040: Reduce submariner-operator RBAC permissions #3045
Merged
skitt
merged 10 commits into
submariner-io:release-0.17
from
tpantelis:automated-backport-of-#3040-upstream-release-0.17
May 6, 2024
Merged
Automated backport of #3040: Reduce submariner-operator RBAC permissions #3045
skitt
merged 10 commits into
submariner-io:release-0.17
from
tpantelis:automated-backport-of-#3040-upstream-release-0.17
May 6, 2024
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- Remove Role wildcard access to "pods" - only "get" and "list" access is needed which is provided by the ClusterRole. - "services" are created for metrics so reduce Role access accordingly - The operator does not access "endpoints", "persistentvolumeclaims", "events", "replicasets" or "statefulsets" so remove access. - Reduce access to "deployments", "daemonsets" and "submariner.io" resources to only what's needed and remove wildcard access. Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
- The following resources are not accessed at all so remove permissions: - "services" - "endpoints" - "events" - "configmaps" - "deployments" - "daemonsets" - "replicasets" - "statefulsets" - "customresourcedefinitions", - "operator.openshift.io/dnses" - "config.openshift.io/networks" - "monitoring.coreos.com/servicemonitors" - The gateway pod is annotated - it only needs "get" and "update" access - Remove wildcard access to "submariner.io" resources and specify exactly what's needed. - Reduce "configmaps" access to just "get". Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
- The following resources are not accessed so remove permissions: - "services" - "endpoints" - "events" - "deployments" - "daemonsets" - "replicasets" - "statefulsets" - "customresourcedefinitions", - "operator.openshift.io/dnses" - "monitoring.coreos.com/servicemonitors" - Reduce access to "pods", "services", "secrets", "configmaps", and "endpoints" to "get" and "list" - Remove wildcard access to "submariner.io" resources and specify exactly what's needed. Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
- The following resources are not accessed at all so remove permissions: - "services" - "endpoints" - "persistentvolumeclaims" - "events" - "configmaps" - "secrets" - "deployments" - "daemonsets" - "replicasets" - "statefulsets" - "namespaces" - "monitoring.coreos.com/servicemonitors" - Reduce "pods" access to only "get", "list", "watch" Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
- Remove "update" access to "services", "namespaces" and "endpoints". - Remove wildcard access to "multicluster.x-k8s.io" resources and specify exactly what's needed. Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
- The following resources are not accessed so remove permissions: - "services" - "endpoints" - "namespaces" - Reduce "endpointslices" access to "get", "list", and "watch" Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
🤖 Created branch: z_pr3045/tpantelis/automated-backport-of-#3040-upstream-release-0.17 |
We grant namespace read permissions which is only needed to query for the existence of the "openshift-monitoring" namespace to determine where to create ServiceMonitors. However we can eliminate this query and thus the permissions by trying to create ServiceMonitors in the "openshift-monitoring" namespace and, if the error indicates the namespace is missing, create in the provided namespace. Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
This resource type is only used for network settings discovery to query the "cluster" Network so restrict the RBAC to only "get" access to the "cluster" resource name. This applies to both the submariner-operator: https://github.com/submariner-io/submariner/blob/85fea596f30b0e84d6962c92bb129a6b8bce8028/pkg/routeagent_driver/handlers/ovn/connection.go#L358 and route-agent components: https://github.com/submariner-io/submariner/blob/85fea596f30b0e84d6962c92bb129a6b8bce8028/pkg/routeagent_driver/handlers/ovn/connection.go#L358 Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
These were added for network-plugin syncer removal so retrict the delete permissions to the networkplugin-syncer resource names. Signed-off-by: Tom Pantelis <tompantelis@gmail.com>
tpantelis
force-pushed
the
automated-backport-of-#3040-upstream-release-0.17
branch
from
May 6, 2024 14:48
f5ade24
to
70d6587
Compare
tpantelis
requested review from
aswinsuryan,
dfarrell07,
maayanf24 and
yboaron
as code owners
May 6, 2024 14:48
skitt
approved these changes
May 6, 2024
dfarrell07
approved these changes
May 6, 2024
🤖 Closed branches: [z_pr3045/tpantelis/automated-backport-of-#3040-upstream-release-0.17] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Backport of #3040 on release-0.17.
#3040: Reduce submariner-operator RBAC permissions
For details on the backport process, see the backport requests page.