-
Notifications
You must be signed in to change notification settings - Fork 431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change multi-tenancy allowed namespaces to be more restrictive #1288
Comments
/milestone v0.5.0 |
/assign |
I've looked at examples in kubernetes itself and think was wondering if we just should use the @gab-satchi @sedefsavas what do you think? why would we need both? |
Having a labelSelector adds flexibility where namespaces can be added/removed without modifying the Identity. I can't think of any advantages the |
I think one benefit is in terms of security, |
Say I'm Alex and I want to gain access to your identity. I have access to create a namespace. I create a namespace and label it with something I know your identity will select. Boom, I am now using your identity. ^ I'm really concerned about label selectors with this scenario. |
/kind feature
Describe the solution you'd like
[A clear and concise description of what you want to happen.]
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
discussion here: kubernetes-sigs/cluster-api-provider-vsphere#1149 (comment)
Environment:
kubectl version
):/etc/os-release
):The text was updated successfully, but these errors were encountered: