-
Notifications
You must be signed in to change notification settings - Fork 235
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Restrict secrets access to namespace #702
Comments
This also prevents us from using the operator. Our security guidelines prevent us from using external components that get cluster-wide secret access. |
This would absolutely make sense. Thank you for your contribution. I guess such a change would be a breaking change? Wdyt? @zaljic @bbung |
Not sure if the access can actually be restricted. By default the operator runs cluster-wide, so needs access to resources in all namespaces. |
Is your feature request related to a problem?
Currently, ClusterRoleBindings are used to attach the ClusterRole to the service account created in the Helm Chart. Read access to the secrets API is configured in the ClusterRole. This allows a potential attacker to read secrets from all namespaces in the Kubernetes cluster.
What solution would you like?
Instead of a ClusterRoleBinding, a RoleBinding should be used to only allow access to secrets in the namespace.
What alternatives have you considered?
NONE
Do you have any additional context?
We found the same issue in the kube-prometheus-stack helm chart. Steps to reproduce the issue can be found there:
prometheus-community/helm-charts#4156
The text was updated successfully, but these errors were encountered: