Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Always enable RBAC so the cluster-info ConfigMap can be exposed #169

Closed
luxas opened this issue Feb 16, 2017 · 3 comments
Closed

Always enable RBAC so the cluster-info ConfigMap can be exposed #169

luxas opened this issue Feb 16, 2017 · 3 comments
Milestone

Comments

@luxas
Copy link
Member

luxas commented Feb 16, 2017

The cluster-info ConfigMap should be exposed to everyone, including system:unauthenticated, see: kubernetes/community#189

We actually face some challenges in doing so.
The proposed solution is to always enable RBAC, and to turn on RBAC by default and have it configurable.
So in case the user gives ABAC as the authz mode, the actual param will be --authorization-mode=RBAC,ABAC and that will work as supposed in most cases given that the multiple authz modules' responses are unioned (if one module grants, the request is granted)

If RBAC is specified as the authz mode to use, kubeadm will set up ClusterRoleBindings for kube-dns, kube-proxy and maybe other things as well.

But the proposal is to always make the RBAC module grant

  • token users to do TLS bootstrapping
  • anyone access the cluster-info ConfigMap in the kube-public namespace.

This issue is based on a conversation on Slack between me, @liggitt and @jbeda

cc @mikedanese @erictune @roberthbailey @deads2k @pires @dmmcquay @errordeveloper @dgoodwin

@luxas luxas added this to the v1.6 milestone Feb 16, 2017
@erictune
Copy link
Member

@cjcullen

I don't know that this would be wise on GKE.

@luxas
Copy link
Member Author

luxas commented Feb 16, 2017

@erictune Interesting. What differs?
Also see: https://github.com/kubernetes/community/blob/master/contributors/design-proposals/bootstrap-discovery.md

The general thing with kubeadm is making it possible to set up secure clusters without having to copy files, so this is a tradeoff for that. Anyway, I see that this might not be optimal for everyone (you're basically giving your CA cert away for free), so this should be swappable as everything else in kubeadm as well

@luxas
Copy link
Member Author

luxas commented Mar 2, 2017

Fixed with kubernetes/kubernetes#41810

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants