tigera / operator

Kubernetes operator for installing Calico and Calico Enterprise
Apache License 2.0
187 stars 141 forks source link

restrict RBAC for kube controller secrets to the required namespace only #3602

Closed vara2504 closed 4 days ago

vara2504 commented 1 week ago

Removed the secrets resource from the calico-kube-controllers and es-calico-kube-controllers ClusterRole and created a new Role with secrets resource in the tigera-operator and tigera-elasticsearch namespaces. In both the enterprise and cloud environments, I see that all secrets managed by the kube-controllers belong to either of these namespaces.

Tested in standalone cluster, mgmt and managed cluster .

Description

For PR author

For PR reviewers

A note for code reviewers - all pull requests must have the following:

tmjd commented 1 week ago

Please make sure you consider the multi-tenant configuration and understand if this impacts that configuration.

vara2504 commented 1 week ago

Checked with the multi-tenant team, and we might not have any impact in the tenant namespace. https://tigera.slack.com/archives/C04EKEGHE3C/p1732310285573909