-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
limit cluster wide access to secrets #7
Comments
Hi. Sorry for the delay. Yes, the concert is valid. I'll see if I can address it this week. |
The current approach is extremely simple and efficient since it creates a global API Watch, and cross-references pullSecretReferences with the secrets directly in the memory of the |
There is a simple way to limit access to secrets that contain CRI credentials by using the |
Hi team, |
For now the issue is in the help wanted status, because the task is not in our nearest backlog. However, we appreciate any ideas and any help with the implementation. |
One of my ideas was to pass the label selector for namespaces that the exporter can monitor. Then, filter namespaces by the selector and subscribe to secrets controllers and pods only in the limited scope of the cluster. |
Vote for this. We are currently thinking of using the service, but security concerns force us to either analyze any alternatives or develop extra controls, since:
|
There is already a label to select namespaces, oh my. Thus, the only thing required is to refactor the informers to look into specific namespaces instead of requesting resources clusterwide. Then, clusterwide secret access will not be required anymore, it will be enough to create roles/rolebindings in desired namespaces (if needed). |
Giving to
k8s-image-availability-exporter
cluster wide access to all secrets is a little concern. As far as I understand it's to be able to use container registry credentials, right?So it would be useful to have option, eg.:
Currently if we want limit access to secrets by removing from RBAC:
it's causing
k8s-image-availability-exporter
fail to start with:k8s-image-availability-exporter
to only particular namespaces.The text was updated successfully, but these errors were encountered: