-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce RBAC Toggle Enhancement #116
base: master
Are you sure you want to change the base?
Conversation
/hold |
7af7737
to
fde8733
Compare
Signed-off-by: Alexander Greene <greene.al1991@gmail.com>
- The existing [CustomResourceDefinition (CRD)](https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/) primitive does not provide a great user experience on multitenant environments. | ||
- It becomes increasingly complex when a user installs multiple versions of an operator scoped to different namespaces. | ||
|
||
As more operators move towards the cluster scoped model, it becomes increasingly problematic for cluster admins that are uncomfortable or unable to allow OLM to grant cluster wide RBAC to operators it installs. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit:
As more operators move towards the cluster scoped model, it becomes increasingly problematic for cluster admins that are uncomfortable or unable to allow OLM to grant cluster wide RBAC to operators it installs. | |
As more operators move towards the cluster scoped model, it becomes increasingly problematic for cluster admins that are uncomfortable or unable to allow OLM to grant cluster wide RBAC to installed operators. |
|
||
### Version Skew Strategy | ||
|
||
The is feature does not depend on other projects and uses existing APIs, as such there is little concern regarding the version of other components. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The is feature does not depend on other projects and uses existing APIs, as such there is little concern regarding the version of other components. | |
This feature does not depend on other projects and uses existing APIs, as such there is little concern regarding the version of other components. |
|
||
## Drawbacks | ||
|
||
The goal of this enhancement is to provide cluster admins with greater control over the RBAC that OLM generates on cluster. Providing cluster admin's with the means to disable OLM's RBAC generation naturally places a greater burden on cluster admins to manage RBAC as they install new operators. There are a number of existing processes that become more tedious when RBAC generation is disabled, to name a few: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The goal of this enhancement is to provide cluster admins with greater control over the RBAC that OLM generates on cluster. Providing cluster admin's with the means to disable OLM's RBAC generation naturally places a greater burden on cluster admins to manage RBAC as they install new operators. There are a number of existing processes that become more tedious when RBAC generation is disabled, to name a few: | |
The goal of this enhancement is to provide cluster admins with greater control over the RBAC that OLM generates on cluster. Providing cluster admins with the means to disable OLM's RBAC generation naturally places a greater burden on cluster admins to manage RBAC as they install new operators. There are a number of existing processes that become more tedious when RBAC generation is disabled, to name a few: |
|
||
- The cluster admin must keep track of the namespaces that include the roles and roleBindings required by the operator. If the cluster admin wants to extend the scope of the operator to additional namespaces, they would need to create additional RBAC in said namespaces. | ||
- The cluster admin must keep the `WATCHED_NAMESPACES` environment variable up to date, otherwise the informer will: | ||
-- Receive events from namespaces that it lacks the appropriate RBAC. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
-- Receive events from namespaces that it lacks the appropriate RBAC. | |
-- Receive events from namespaces it has no appropriate RBAC to handle. |
- The cluster admin must keep track of the namespaces that include the roles and roleBindings required by the operator. If the cluster admin wants to extend the scope of the operator to additional namespaces, they would need to create additional RBAC in said namespaces. | ||
- The cluster admin must keep the `WATCHED_NAMESPACES` environment variable up to date, otherwise the informer will: | ||
-- Receive events from namespaces that it lacks the appropriate RBAC. | ||
-- Not Receive events from namespaces that it has the appropriate RBAC. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
-- Not Receive events from namespaces that it has the appropriate RBAC. | |
-- Not Receive events from namespaces for which it has the appropriate RBAC. |
No description provided.