You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Generate and pass Kubeconfig as a part of Context for each execution of a Kubernetes-related executor.
Modify plugin manager to run plugins in a restricted environment.
It doesn't influence the way how we run source and executor plugins. Each plugin will be ran in a single subprocess, in a single restricted subdirectory.
Modify plugin manager to run plugins in a restricted environment.
So I tried to use chroot for command execution, but it is not doable since,
This needs root permissions that means we need to remove less privileged user in Docker file and use root user
Once we do that, helm or other vuln tools will probably start to complain about that.
I proposed to ignore this feature for now since we have only official plugins and do not accept custom ones, wdyt? @mszostok@pkosiec@josefkarasek ?
Kubect Krew Plugin manager has same situation, and whenever I install kubectl plugin, it warns me like "the tool I download that they haven't assessed it, and the risk is your own". Maybe we should use same strategy, instead of escalating Docker's privilege.
Acceptance Criteria
Handle Kubeconfig passing for executors:
Modify plugin manager to run plugins in a restricted environment.It doesn't influence the way how we run source and executor plugins. Each plugin will be ran in a single subprocess, in a single restricted subdirectory.use mocked file system (?) (https://github.com/spf13/afero)rbac
property is optionalRelates to #841 and #840. Depending which tasks will be done earlier, ensure a proper Kubeconfig is passed.
Resources:
Related issues & reason
Notes
Strategy for RBAC isolation:
kubectl
is bind to 2 different channels andgroup
strategy is used, we simply start 2kubectl
processes.The text was updated successfully, but these errors were encountered: