Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update our kubelet (and other) certs for RBAC #1231

Closed
justinsb opened this issue Dec 21, 2016 · 5 comments · Fixed by #9653
Closed

Update our kubelet (and other) certs for RBAC #1231

justinsb opened this issue Dec 21, 2016 · 5 comments · Fixed by #9653
Labels
area/security lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness.

Comments

@justinsb
Copy link
Member

We need to do the equivalent of https://github.com/kubernetes/kubernetes/pull/39020/commits

And check for any other changes

@liggitt
Copy link
Member

liggitt commented Feb 10, 2017

https://docs.google.com/document/d/1PqI--ql3LQsA69fEvRq1nQWgiIoE5Dyftja5Um9ML7Q/edit and https://github.com/kubernetes/kubernetes.github.io/pull/2360/files is documentation in progress for the roles and default bindings available to deployers.

deployers can either set up credentials for control plane components to match the default bindings, or they can bind roles themselves... either way works.

currently, the expected users/groups to pick up permissions automatically are:

  1. bootstrap superuser in the system:masters group (username doesn't matter)
  2. kubelet in the system:nodes group, username of system:node:<nodename>
  3. controller manager as the user system:kube-controller-manager
  4. kube-proxy as the user system:kube-proxy
  5. scheduler as the user system:kube-scheduler

kubernetes/kubernetes#40021 is tracking remaining roles that need development, some of which will have default bindings as well.

@bgeesaman
Copy link

I believe this work (if not completed already) will enable the kubelet to also use --authorization-mode=Webhook to prevent arbitrary container command injection via kubelet-exploit

@bgeesaman
Copy link

Looks like the Kubelet certs are in the format of Subject: O=system:nodes, CN=kubelet and so it requires the additional RBAC clusterrolebinding to get the proper permissions right now.

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Feb 19, 2018
@chrislovecnm
Copy link
Contributor

/lifecycle frozen
/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot added lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Feb 20, 2018
@rifelpet rifelpet removed this from the 1.5.2 milestone Apr 11, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

7 participants