Skip to content

RBAC support for isolating permissions for ResourceGraphDefinitions #892

@toweroy

Description

@toweroy

Feature Description

Problem Statement:
In order to give access to the different ResourceGraphDefinitions (RGD) that we want to support in our cluster (and that might also be owned by other teams than us), today we have to grant the kro controller access to ALL of the required apis, resources, etc… via a ClusterRole. This is becomes harder to maintain since all permissions get aggregated to one (kro) controller, and it also is a concern in regards of security/permission isolation (i.e. on controller holds all of the permissinons required for all the RGDs).

It would be great to have RBAC support in kro that could then allow use to isolate permissions depending on the different RGDs that will exist.

Proposed Solution:
Provide a way to define RBAC permissions in kro that allows for isolated permissions that only concern the specific RGD dynamic controller (I believe right now we create one per RGD?).

Alternatives Considered:
There are currently no good alternatives (that I know of) for avoiding giving all of the required permissions as an aggregate to the kro controller.

  • Please vote on this issue by adding a 👍 reaction to the original issue
  • If you are interested in working on this feature, please leave a comment

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/featureCategorizes issue or PR as related to a new feature.needs-kreptriage/acceptedIndicates an issue or PR is ready to be actively worked on.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions