-
Notifications
You must be signed in to change notification settings - Fork 209
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cross namespace secrets/resourcegroup scenario #4527
Labels
Comments
Things we should look into:
Regardless of which of the above options we end up suggesting folks use, we want to make sure we understand the security implications/risks of allowing cross-namespace writes. |
Hoping that we can design this some in 2.13. |
Related to #1398 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
From a question I asked on Slack, to which @theunrepentantgeek replied.
I'm trying to come up with a setup to have a "manager" app which creates resource groups and an identity, and then creates the secret for the identity, and hands it to a second K8s namespace, for resources in that namespace to use that resource group.
Basically I don't want the individual namespaces to have permissions to CREATE groups, just create resources inside them. But I'm finding that difficult.... the manager can create the resource group.... in its own namespace. As well as the user identity, in its own namespace..... and operatorSpec can create the secret from the identity.... but not in the second namespace.
And then the second issue, which is that you can't reference Resource Groups (or anything) cross namespace. So, I'd require either to use an ARM ID in the child namespaces, or have two RG entities, with one with detach-on-delete. But the detach on delete would probably need to be in the child, and thus enforced by the child.
A solution to the first issue would be to be able to optionally specify the namespace for a SecretDestination. And then the requisite security considerations around that.
A solution to the second would be to allow cross namespace owners.
It's possible both of these things will hit the same issue: security.
But the strict prohibition against cross-namespace stuff kinda makes delegation of things like this hard.
The text was updated successfully, but these errors were encountered: