Skip to content

Conversation

@Pikabooboo
Copy link
Collaborator

Restrict service account permission in manger config

Ⅰ. Describe what this PR does

Security issue over SA mounting

Ⅱ. Does this pull request fix one issue?

NONE

Ⅲ. List the added test cases (unit test/integration test) if any, please explain if no tests are needed.

Ⅳ. Describe how to verify it

Run the test setup to see if there still remain code scanning alerts.

Ⅴ. Special notes for reviews

Restrict service account permission in manger config
@Pikabooboo Pikabooboo requested review from RongGu and cheyang December 4, 2025 12:44
@fluid-e2e-bot
Copy link

fluid-e2e-bot bot commented Dec 4, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign zwwhdls for approval by writing /assign @zwwhdls in a comment. For more information see:The Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@gemini-code-assist
Copy link
Contributor

Summary of Changes

Hello @Pikabooboo, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request implements a crucial security fix by modifying the manager's configuration to prevent the automatic mounting of service account tokens. This action directly mitigates a potential security vulnerability related to unauthorized access or misuse of service account credentials, enhancing the overall security posture of the system.

Highlights

  • Security Enhancement: This pull request addresses a security concern by restricting service account permissions within the manager configuration.
  • Service Account Token Mounting: The change explicitly disables the automatic mounting of service account tokens by setting automountServiceAccountToken: false in the manager's pod specification.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@sonarqubecloud
Copy link

sonarqubecloud bot commented Dec 4, 2025

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request aims to enhance security by disabling the automatic mounting of Service Account tokens in the manager's pod configuration. While this is a valid security hardening technique, in this case, it will prevent the controller manager from accessing the Kubernetes API, which is essential for its operation (e.g., for leader election). This would cause the controller to fail. My review includes a critical comment to remove this change to ensure the controller remains functional. A more robust solution that balances security and functionality would involve more significant changes and could be tackled in a future pull request.

cpu: 100m
memory: 20Mi
terminationGracePeriodSeconds: 10
automountServiceAccountToken: false
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

critical

Setting automountServiceAccountToken: false will break the controller-manager as it needs to communicate with the Kubernetes API server for tasks like leader election. The kube-rbac-proxy sidecar also needs API access. Without a service account token, both will fail.

To resolve this critical issue, I recommend removing this line. This will restore the default behavior and allow the controller to function correctly.

While disabling automount is a good security practice, it requires explicitly mounting the token for containers that need it. This is a more involved change that can be addressed separately. For now, the safest option is to revert this line.

@codecov
Copy link

codecov bot commented Dec 4, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 57.56%. Comparing base (1e1ac17) to head (8c71469).

Additional details and impacted files
@@           Coverage Diff           @@
##           master    #5379   +/-   ##
=======================================
  Coverage   57.56%   57.56%           
=======================================
  Files         447      447           
  Lines       31013    31013           
=======================================
  Hits        17854    17854           
  Misses      11545    11545           
  Partials     1614     1614           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

cpu: 100m
memory: 20Mi
terminationGracePeriodSeconds: 10
automountServiceAccountToken: false
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please disable automountServiceAccountToken specifically for sample yaml, not the controller yaml.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants