K8s Web Deployer Authorization #992

Open
opened 2026-02-18 18:47:58 +00:00 by srw · 0 comments
Owner

Currently the web deployer relies on being deployed with a copy of the kubeconfig and uses this to authenticate to the k8s api.

This is an anti-pattern for a few reasons-- namely these credentials can control the entire cluster and they rotate approximately every 12 months, which would require a periodic re-deployment of the deployer.

This should be replaced using in cluster auth mechanics (RBAC)

  • dedicated service account, default to laconic but with some ability to override
  • role for namespaced permissions, this should account for #982
  • role binding to ServiceAccount
Currently the web deployer relies on being deployed with a copy of the kubeconfig and uses this to authenticate to the k8s api. This is an anti-pattern for a few reasons-- namely these credentials can control the entire cluster and they rotate approximately every 12 months, which would require a periodic re-deployment of the deployer. This should be replaced using in cluster auth mechanics (RBAC) - dedicated service account, default to _laconic_ but with some ability to override - role for namespaced permissions, this should account for https://git.vdb.to/cerc-io/stack-orchestrator/issues/982 - role binding to ServiceAccount
srw added the
Priority
Critical
label 2026-02-18 18:54:06 +00:00
srw changed title from Web Deployer Authorization to K8s Web Deployer Authorization 2026-02-18 18:56:08 +00:00
srw added the
K8s
label 2026-02-18 19:03:48 +00:00
Sign in to join this conversation.
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: cerc-io/stack-orchestrator#992
No description provided.