-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix issue with RabbitmqClusterReference Namespace Namespace and ConnectionSecret #700
Fix issue with RabbitmqClusterReference Namespace Namespace and ConnectionSecret #700
Conversation
@mindw, we have received your signed contributor license agreement. The review is usually completed within a week, but may take longer under certain circumstances. Another comment will be added to the pull request to notify you when the merge can proceed. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can't accept this contribution as it stands. For historical context see #51 #147 and #201.
The main reason to reject is the security implications this change may have. The user running the Topology Operator has access to a wide set of resources, secrets among them. The Topology Operator cannot know if user Cody
has access to a namespace other than the namespace a request is coming from. For example: Cody
creates a Queue
in namespace dev
. The existence of Queue
object in NS dev
is sufficient to conclude that Cody
has access to NS dev
, at least to create a Topology object. We can't know whether Cody
has access to any other NS like app-1
.
As illustrated in the example above, we would be allowing Cody
to bypass NS restrictions, and therefore, we can't accept this as it currenty stands.
@Zerpet , thank you for the detailed and prompt reply. From what I gather, it would be enough to add support for the I'll update the PR and tests then. |
Bear in mind that when The solution you propose will be acceptable in the specific scenario where a [1] https://rabbitmq.com/kubernetes/operator/using-topology-operator.html#non-operator |
@mindw, we have received your signed contributor license agreement. The review is usually completed within a week, but may take longer under certain circumstances. Another comment will be added to the pull request to notify you when the merge can proceed. |
@zarpet - the annotation Again, thank you the detailed explanations and your time! |
@mindw, VMware has approved your signed contributor license agreement. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, thank you!
I will merge after CI passes |
This closes #501
Note to reviewers: remember to look at the commits in this PR and consider if they can be squashed
Note to contributors: remember to re-generate client set if there are any API changes
Summary Of Changes
Fix an issue where Namespace was ignored when using ConnectionSecret.
Additional Context
This doesn't look like a feature - it's more like a bug. Why support RabbitmqCluster via namespace but forbid secrets?