Skip to content

Commit 04d9969

Browse files
authored
Merge pull request #1447 from sunilarjun/v2.9.1-impersonation
V2.9.1 impersonation - v2.6 addition
2 parents bd3447e + a025bee commit 04d9969

File tree

2 files changed

+11
-5
lines changed

2 files changed

+11
-5
lines changed

shared-files/_cni-popularity.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
<!-- releaseTask -->
2-
The following table summarizes different GitHub metrics to give you an idea of each project's popularity and activity levels. This data was collected in March 2024.
2+
The following table summarizes different GitHub metrics to give you an idea of each project's popularity and activity levels. This data was collected in August 2024.
33

44
| Provider | Project | Stars | Forks | Contributors |
55
| ---- | ---- | ---- | ---- | ---- |
6-
| Canal | https://github.com/projectcalico/canal | 714 | 100 | 20 |
6+
| Canal | https://github.com/projectcalico/canal | 715 | 100 | 20 |
77
| Flannel | https://github.com/flannel-io/flannel | 8.7k | 2.9k | 235 |
8-
| Calico | https://github.com/projectcalico/calico | 5.8k | 1.3k | 353 |
9-
| Weave | https://github.com/weaveworks/weave/ | 6.6k | 668 | 87 |
10-
| Cilium | https://github.com/cilium/cilium | 19.4k | 2.8k | 775 |
8+
| Calico | https://github.com/projectcalico/calico | 5.8k | 1.3k | 354 |
9+
| Weave | https://github.com/weaveworks/weave/ | 6.6k | 667 | 87 |
10+
| Cilium | https://github.com/cilium/cilium | 19.4k | 2.9k | 796 |

versioned_docs/version-2.6/reference-guides/rancher-manager-architecture/communicating-with-downstream-user-clusters.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,12 @@ You will need to use a context defined in this kubeconfig file to access the clu
8282

8383
## Impersonation
8484

85+
:::caution Known Issue
86+
87+
Service account impersonation (`--as`) used by lower privileged user accounts to remove privileges is not implemented and is a [feature](https://github.com/rancher/rancher/issues/41988) being tracked.
88+
89+
:::
90+
8591
Users technically exist only on the upstream cluster. Rancher creates [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) that refer to Rancher users, even though there is [no actual User resource](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#users-in-kubernetes) on the downstream cluster.
8692

8793
When users interact with a downstream cluster through the authentication proxy, there needs to be some entity downstream to serve as the actor for those requests. Rancher creates service accounts to be that entity. Each service account is only granted one permission, which is to **impersonate** the user they belong to. If there was only one service account that could impersonate any user, then it would be possible for a malicious user to corrupt that account and escalate their privileges by impersonating another user. This issue was the basis for a [CVE](https://github.com/rancher/rancher/security/advisories/GHSA-pvxj-25m6-7vqr).

0 commit comments

Comments
 (0)