generated from open-component-model/repository-template
-
Notifications
You must be signed in to change notification settings - Fork 1
Closed as not planned
Closed as not planned
Copy link
Labels
area/ipceiImportant Project of Common European InterestImportant Project of Common European Interestkind/tasksmall task, normally part of feature or epicsmall task, normally part of feature or epicneeds/refinementDiscuss with the team and gain a shared understandingDiscuss with the team and gain a shared understanding
Description
Description
In #624 we applied the k8s ApplySet for deployers. While implementing this, we found out that our current permission concept for the deployer does not work anymore for the ApplySet, since the deployer needs to be able to get/list/delete resources in the cluster.
For reference, the actual lookup the actual implementation in https://github.com/open-component-model/open-component-model/pull/1335/changes#diff-471c0beaf0cee38ed3a51901a53c633cb94d0fcb2230955143463f36aaa65bfdR584
This issue is about discussing which way we want to go with the permission concept.
- Give wildcard access to all possible resources which can be deployed by the deployer beforehand (simplest, least security)
- Let the user provide a cluster-role / role with permissions he decides on to (least work for us, harder to integrate for the user, error-prone)
- Dynamically create roles based on the resources to be generated by the deployer (hardest to implement, good middleground, easier for the user)
Permission Concept Comparison
| Aspect | 1. Wildcard Access | 2. User-Provided Role | 3. Dynamic Role Creation |
|---|---|---|---|
| Security | ✅ High - user controls exact permissions | ✅ High - minimal permissions based on actual resources | |
| Implementation Complexity | ✅ Simple - single RBAC manifest | ✅ Simple - use existing role | |
| User Experience | ✅ Easy - works out of the box | ✅ Easy - automatic permission setup | |
| Maintenance | ✅ Low - one-time setup | ❌ High - users must update as resources change | |
| Error Handling | ✅ No permission errors | ❌ Frequent errors if misconfigured | |
| Audit Trail | ❌ Difficult - too broad to audit | ✅ Clear - explicit user-defined permissions | ✅ Clear - roles match deployed resources |
| Compliance | ❌ May violate least-privilege | ✅ Aligns with organizational policies | ✅ Aligns with least-privilege principle |
| Multi-Tenancy | ✅ Good - user can scope appropriately | ✅ Good - scoped to specific resources | |
| Best For | Dev/test environments | Highly regulated environments | Production environments with ease of use |
Done Criteria
- Explored all three options
- Document your findings in this ticket
- Decide on one option to implement (in the team)
- Update the follow up issue about the implementation task Implement Permission Strategy for Deployers with ApplySet #821
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
area/ipceiImportant Project of Common European InterestImportant Project of Common European Interestkind/tasksmall task, normally part of feature or epicsmall task, normally part of feature or epicneeds/refinementDiscuss with the team and gain a shared understandingDiscuss with the team and gain a shared understanding
Type
Projects
Status
🍺 Done