Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Force Namespace isolation #597

Closed
krallistic opened this issue Apr 12, 2017 · 1 comment · Fixed by #599
Closed

Force Namespace isolation #597

krallistic opened this issue Apr 12, 2017 · 1 comment · Fixed by #599
Assignees

Comments

@krallistic
Copy link

Currently the controller make a watch on secrets in all namespaces, even if the controller is restricted to one namespace. (Same with configmaps, see https://github.com/kubernetes/ingress/blob/master/core/pkg/ingress/controller/controller.go#L257 )

This was done since if otherwise users would be required to duplicate certificates in every NS. But if you have a cluster and use NS for user separation this breaks the separation (since it requires cross NS read access to secrets), which makes any ingress (using that code) unusable in a NS separated cluster.

I would propose to introduce another Flag: --force-namespace which limits the watch on secrets and configmaps to the NS defined by --watch-namespace.

@cabrinoob
Copy link

Hi,
Does this isolation applies to ingress resources?
Because suppose I have 2 ingress controllers installed on my cluster, every Ingress resources in every namespaces are applied by both controllers.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants