-
Notifications
You must be signed in to change notification settings - Fork 39.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ScaleIO - Secret to be stored in/loaded from a static namespace #53740
ScaleIO - Secret to be stored in/loaded from a static namespace #53740
Conversation
Hi @vladimirvivien. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: vladimirvivien Assign the PR to them by writing Associated issue: 53619 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/ok-to-test |
@vladimirvivien: you can't request testing unless you are a kubernetes member. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
sioName = "scaleio" | ||
sioPluginName = "kubernetes.io/scaleio" | ||
sioConfigFileName = "sioconf.dat" | ||
sioSecretNamespace = "scaleio" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the same comment as #53622 (comment) applies here. this change has a few problems:
- it is not backwards compatible (it breaks existing volumes that use secrets in the pod namespace)
- it hardcodes a namespace which cannot be assumed to be available
the approach outlined in #53622 (comment) is what should be followed to enable detaching mount credentials from the pod namespace.
@liggitt Part of any upgrade/setup directions will:
Lastly, we're pursuing this simple approach in hope of getting this cherry-picked for previous k8s release. We are planning on implementing the full API object update in a future PR. |
@vladimirvivien PR needs rebase |
Assign back to me once it is LGTM'ed and ready for approval. |
What this PR does / why we need it:
This PR is to decouple the ScaleIO secret from the same namespace as that of the PV/PVC/Storageclass that uses it (#53619). Currently, authorized non-admin k8s user, who creates volumes, may end up having unauthorized access to ScaleIO secret information. This PR assumes all ScaleIO secrets are assigned to a namespace called
scaleio
that is protected from non-admin users.Which issue this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close that issue when PR gets merged): fixes #53619Special notes for your reviewer:
Release note: