Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Limit resources that can be accessed trough the proxy #24

Open
calind opened this issue Oct 17, 2022 · 3 comments
Open

Limit resources that can be accessed trough the proxy #24

calind opened this issue Oct 17, 2022 · 3 comments
Labels
enhancement New feature or request

Comments

@calind
Copy link

calind commented Oct 17, 2022

When using this proxy to expose kubernetes api to external (read: non-trusted) users a very helpful option would be to limit what API groups are exposed trough proxy. This way one can be sure that the external user is only allowed to interact with certain APIs (eg. allow interacting only Deploymens or a cusom resource but do not allow user to list Nodes for example).

Would a PR for his make sense?

@mlbiam mlbiam added the enhancement New feature or request label Oct 17, 2022
@mlbiam
Copy link

mlbiam commented Oct 17, 2022

I've been kicking around a similar idea, so a PR would be welcome! I don't want to implement this specific use case though. I'm thinking either a webhook or a WASM "plugin"? My thought is that given a payload and user.Info I should be able to make any authorization decision I want. WDYT?

@omelnyk1
Copy link

omelnyk1 commented Dec 8, 2022

Not clear why we need to mix authentication and authorization in one tool. Why we can't deny access to some API groups via native RBAC objects in kubernets: clusterroles, roles, rolebindings?

@mlbiam
Copy link

mlbiam commented Dec 8, 2022

@omelnyk1 RBAC is pretty basic in how it does authorization. You could use an admission controller too, depending on how you want to implement it. You may also want to control access based on which network admins come from, which you can't do with RBAC. It's an additional option.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants