Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fabric8-rbac rolebinding is over-permissive #17

Open
switchboardOp opened this issue Sep 4, 2019 · 3 comments
Open

fabric8-rbac rolebinding is over-permissive #17

switchboardOp opened this issue Sep 4, 2019 · 3 comments

Comments

@switchboardOp
Copy link

Cluster-admin, really?
I admit I haven't done a deep dive on the code, but surely something that gets, lists and watches cluster state doesn't need permission to edit and delete everything in the cluster!

@msschl
Copy link

msschl commented Oct 25, 2019

I agree. This should be addressed soon...

@geerlingguy
Copy link

Related: #11

And I mentioned this as an example of a major security risk (for the reason @switchboardOp mentioned, as well as the fact that this also grants all pods in the default namespace cluster-admin, which means any pod running in the same namespace could manage any resource (including other namespaces) in the cluster...) in a recent blog post.

@ThomasManier
Copy link

Over a year and no progress?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants