Skip to content

Create Admission Controller for user impersonation #189

@alewitt2

Description

@alewitt2

Once we have the ability to do user impersonation, we will need a way to limit who is allowed to use it.

I think the most likely place to do that is in an Admission Controller. We will need the admission controller to know who is trying to make the request, and validate that they are authorized to do user impersonation (possibly via new config or rbac). If the user is allowed to do impersonation, allow whatever they put in the impersonate field to stay as is. If they arent allowed, the controller should inject the user's name in the impersonate field (whether they were trying to do impersonation or not).

Until this is implemented, we are limiting user impersonation only to razeedeploy resources created in the razeedeploy namespace. NOTE: For now, cluster owners should be aware that they should prevent their users from creating razeedeploy resources in the razeedeploy namespace if they want to prevent them from using user-impersonation.

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions