Uploaded image for project: 'OpenShift API for Data Protection'
  1. OpenShift API for Data Protection
  2. OADP-486

Velero service account permissions are too permissive for SCCs

XMLWordPrintable

    • False
    • Hide

      None

      Show
      None
    • False
    • Passed
    • 0
    • 0
    • 0
    • None

      Currently the velero service account permissions are granted `*` on verbs/resources/groups to basically give it cluster-admin. This is too permissive as it accidentally grants the service account `use` verb on all SCCs which causes restic to be assigned to the wrong SCC in environments where customers have a custom SCCs.

      We want to restrict this permission set down to only grant the relevant verbs on these resources, not `use`.

      For QE verification, `oc get clusterroles <oadp-operator installed cluster role for velero> -o yaml` and verify we no longer see:

      ```

                  - apiGroups:
                      - '*'
                    resources:
                      - '*'
                    verbs:
                      - '*'
      ```

              rhn-engineering-dymurray Dylan Murray
              rhn-engineering-dymurray Dylan Murray
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: