-
Notifications
You must be signed in to change notification settings - Fork 9
Description
Once we have the ability to do user impersonation, we will need a way to limit who is allowed to use it.
I think the most likely place to do that is in an Admission Controller. We will need the admission controller to know who is trying to make the request, and validate that they are authorized to do user impersonation (possibly via new config or rbac). If the user is allowed to do impersonation, allow whatever they put in the impersonate field to stay as is. If they arent allowed, the controller should inject the user's name in the impersonate field (whether they were trying to do impersonation or not).
Until this is implemented, we are limiting user impersonation only to razeedeploy resources created in the razeedeploy
namespace. NOTE: For now, cluster owners should be aware that they should prevent their users from creating razeedeploy resources in the razeedeploy namespace if they want to prevent them from using user-impersonation.