-
Notifications
You must be signed in to change notification settings - Fork 280
Description
/kind feature
Describe the solution you'd like
The current implementation of identityRef in OpenStackCluster requires secrets containing credentials (e.g., clouds.yaml) to reside in the same namespace as the OpenStackCluster resource. This limitation poses challenges in environments with namespace-based access control, where sensitive credentials need to remain centralized and secure while still being usable by resources in other namespaces.
To address this, I propose introducing an OpenStackClusterIdentity custom resource, similar to AWSClusterStaticIdentity or AzureClusterIdentity. This resource would allow for centralized credential management while providing fine-grained access control across namespaces.
Proposed Implementation:
1. New CRD: Create OpenStackClusterIdentity to reference credentials stored in a secret, allowing usage across namespaces with access controls.
2. Identity Reference: Update OpenStackCluster.spec.identityRef to reference the new resource instead of secrets directly.
3. Access Control: Implement validation in the CAPO controller to restrict usage based on namespaces or roles.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status