As mentioned in #2 and #3, some security-related admission controllers and feature gates may prevent certain attacks. Because those are configured on the control plane, they cannot be retrieved via k8s API.
Add an auto-discovery mode that relies on impersonation & dry-run write operations to figure out which relevant feature gates & admission controller are enabled. Populate rbacDB.metadata with those for policies to consume.
Flag description should clearly document that in this mode rbac-police does some dry-run write operations.
As mentioned in #2 and #3, some security-related admission controllers and feature gates may prevent certain attacks. Because those are configured on the control plane, they cannot be retrieved via k8s API.
Add an auto-discovery mode that relies on impersonation & dry-run write operations to figure out which relevant feature gates & admission controller are enabled. Populate
rbacDB.metadata
with those for policies to consume.Flag description should clearly document that in this mode
rbac-police
does some dry-run write operations.