Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Admission Controller should not require full cluster admin #127

Open
blang9238 opened this issue Mar 12, 2021 · 0 comments
Open

Admission Controller should not require full cluster admin #127

blang9238 opened this issue Mar 12, 2021 · 0 comments

Comments

@blang9238
Copy link
Contributor

The current chart for the admission controller grants full cluster admin.

While applying k8s pod security policies, it was noticed that even without allowing the anchore-webhook-admission permission to use the policy, it could do it.

It was narrowed down to

kind: ClusterRole
apiGroup: rbac.authorization.k8s.io
name: cluster-admin
which gives cluster-admin permission to the anchore-admission-controller. This seems to defeat all the purpose of doing all the fine grained roles in the anchore-admission-controller helm chart as full cluster admin is given anyway.

Can we investigate the need for cluster-admin for the controller?

@blang9238 blang9238 changed the title Admission Controller needs full cluster admin Admission Controller should not require full cluster admin Jun 17, 2021
Btodhunter pushed a commit that referenced this issue Sep 26, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant