Skip to content
This repository has been archived by the owner on Apr 30, 2021. It is now read-only.

Allow operators to exec into pods #1192

Merged
merged 2 commits into from
Oct 5, 2020
Merged

Allow operators to exec into pods #1192

merged 2 commits into from
Oct 5, 2020

Conversation

Krenair
Copy link
Contributor

@Krenair Krenair commented Sep 25, 2020

No description provided.

@chrisfarms
Copy link
Contributor

I can't think of anything dangerous you could do with a Pod exec that you couldn't already do with the existing Pod create/patch permissions. So I don't really see any problem with allowing this for "namespace operators".

At one point in the past, we had the intention to enforce image provenance with Notary - even for "namespace operators") which would mean you can always know what code is running and where it came from.... exec would have allowed you to effectively bypass that restriction. However no such restriction is in place.

It does slightly reduce the ability to know what code is executing in the cluster. With the ability to exec you can no longer look at the image+digest and have any confidence that the code executing in the container is the same as is stored in the image+digest. But I believe this is a risk we are willing to accept for dev-namespaces, which after all are all about making it easier to debug without the constraints of the prod restrictions.

We might want to add an amendment to ADR43 for good housekeeping with this decision as part of this PR

@Krenair Krenair merged commit 3407dd9 into master Oct 5, 2020
@Krenair Krenair deleted the operator-exec branch October 5, 2020 11:08
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants