Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

conditionally assign some of sensitive RBAC permissions to operator clusterrole #1939

Closed
rksharma95 opened this issue Jan 10, 2025 · 0 comments · Fixed by #1940
Closed

conditionally assign some of sensitive RBAC permissions to operator clusterrole #1939

rksharma95 opened this issue Jan 10, 2025 · 0 comments · Fixed by #1940
Assignees
Labels
enhancement New feature or request

Comments

@rksharma95
Copy link
Collaborator

Feature Request

Short Description

some of the RBAC permissions assigned to the operator clusterrole are not required in all the cases. For example, update and patch permissions for deployments, statefulsets, daemonsets and replicasets are not needed if flag annotateResources is set to false.

annotateResources := flag.Bool(ConfigAnnotateResources, false, "for kubearmor deployment without kubearmor-controller")

these permissions should be assigned conditionally only when required.

Describe the solution you'd like

have a helm config to assign annotateResources with kubearmor-operator helm chart and use that value to conditionally assign RBAC permissions.

Describe alternatives you've considered

A description of any alternative solutions or features you've considered. E.g, Alternatively, KubeArmor could shower flower petals on alien invaders and win their hearts with humanity.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant