Gateway API: Guide for removing ClusterRole privileges (Remove unnecessary permissions / ... could lead to takeover of the cluster) #6830
Labels
kind/feature
Categorizes issue or PR as related to a new feature.
lifecycle/needs-triage
Indicates that an issue needs to be triaged by a project contributor.
Please describe the problem you have
I'd like to use Contour with Gateway API, and unfortunately the suggested installation method contains a ClusterRole with full read privileges to all secrets/configmaps, as well as creating deployments.
Since Envoy is publicly exposed, a vulnerability might be used to attack the cluster (although it'd have to jump to the Contour control plane first), as discussed before:
Would it be possible for ProjectContour to explicitly support an installation method with reduced privileges?
I'm concerned about overriding these roles and having instability in production because it deviates from the recommended defaults.
Specifically, I'd be happy with:
projectcontour
namespaceWouldn't this remove all the concerning privileges?
I think this would also work when using HTTPProxy with
includes
from the namespace, which I think is already a best practice for a cluster operator to avoid access to the certificates from workload namespaces?The text was updated successfully, but these errors were encountered: