Default Che Operator OLM installation grants create/update/patch permissions for CheClusters to all users with the edit role #21695
Labels
area/che-operator
Issues and PRs related to Eclipse Che Kubernetes Operator
kind/bug
Outline of a bug - must adhere to the bug report template.
sprint/current
Milestone
Describe the bug
The default Che Operator install provisions aggregate roles
These clusterroles are specified to aggregate with the default
admin
,crdview
,edit
andview
roles in the cluster, granting those permissions for CheClusters to users with that Kubernetes role (e.g. if I have edit permissions in a namespace, the aggregated edit roles will allow me to edit checlusters in that namespace).We should consider restricting this, as regular users are not intended to create or edit CheClusters, and that permission should be granted more specifically. In particular, the Che Operator does not generally support more than one CheCluster being installed in a cluster and will fail to start workspaces in that case.
The severity of this issue is increased in clusters where #21694 is present, as creating a second CheCluster can trigger workspace failures that require manual workarounds to resolve across the cluster, even after the CheCluster has been cleaned up.
Che version
next (development version)
Steps to reproduce
kubectl auth can-i create checlusters
returnsyes
Expected behavior
Regular users should be restricted from creating CheClusters.
Runtime
OpenShift
Screenshots
No response
Installation method
OperatorHub
Environment
Linux, Dev Sandbox (workspaces.openshift.com)
Eclipse Che Logs
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: