Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Epic: descope the Submariner operator #75

Closed
14 tasks
skitt opened this issue Mar 14, 2022 · 6 comments
Closed
14 tasks

Epic: descope the Submariner operator #75

skitt opened this issue Mar 14, 2022 · 6 comments

Comments

@skitt
Copy link
Member

skitt commented Mar 14, 2022

Epic Description

The Submariner operator currently has wide-ranging privileges. It doesn’t need to be able to access anything outside the namespaces it manages, so this should be reduced. See https://hackmd.io/wVfLKpxtSN-P0n07Kx4J8Q for background.

Depends on submariner-io/submariner-operator#1105

RBAC generation will affect this, we should wait to have a better idea of that before starting work on designing this.

Acceptance Criteria

The operator is de-scoped, ideally with no ClusterRole, at minimum with justifications for every permission in its ClusterRole.

See also submariner-io/submariner-operator#1105 which overlaps with this; auto-generation should be used if the SDK supports it for namespace-scoped Roles.

Definition of Done (Checklist)

  • Code complete
  • Relevant metrics added
  • The acceptance criteria met
  • Unit/e2e test added & pass
  • CI jobs pass
  • Deployed using cloud-prepare+subctl
  • Deployed using ACM/OCM addon
  • Deploy using Helm
  • Deployed on supported platforms (for e.g kind, OCP on AWS, OCP on GCP)
  • Run subctl verify, diagnose and gather
  • Uninstall
  • Troubleshooting (gather/diagnose) added
  • Documentation added
  • Release notes added

Work Items

@skitt
Copy link
Member Author

skitt commented Apr 13, 2022

This doesn’t have a corresponding EP yet; I don’t think it’s worth going into detail until #105 is implemented, since that should address a number of the issues involved in descoping the operator (or help determine whether it is actually possible to do so).

I will revisit this once #105 is done, and go through the exception process if the epic remains relevant.

@dfarrell07
Copy link
Member

Talking about this on the PR scrub, it seems it has two serial dependencies and would be tough to finish this release. Moving back to the backlog.

@maayanf24
Copy link
Contributor

This doesn’t have a corresponding EP yet; I don’t think it’s worth going into detail until #105 is implemented, since that should address a number of the issues involved in descoping the operator (or help determine whether it is actually possible to do so).

I will revisit this once #105 is done, and go through the exception process if the epic remains relevant.

@skitt - Do you have plans to add a EP for this?

@github-actions
Copy link

This PR/issue depends on:

@dfarrell07
Copy link
Member

The key difference between this and the RBAC work is that once we make the RBAC changes, we also need to decide if we need to configure the operator to be able to watch same-namespace, other-namespace, or all-namespaces.

@tpantelis
Copy link
Contributor

This enhancement has been covered by the recent work to reduce RBAC permissions for all the components.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants