Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make reading secrets explicit in permission verbs. #2919

Open
fspmarshall opened this issue Aug 13, 2019 · 3 comments
Open

Make reading secrets explicit in permission verbs. #2919

fspmarshall opened this issue Aug 13, 2019 · 3 comments
Labels
rbac Issues related to Role Based Access Control

Comments

@fspmarshall
Copy link
Contributor

Read permissions are currently scoped to one of two verbs, VerbRead and VerbReadNoSecrets. This is potentially confusing, and has lead to issues where resources which did not contain secrets were scoped to VerbRead, making it difficult to add secrets to the resource later without complex migration. It also increases the likelihood of unintentionally granting access to secrets since this naming scheme makes access to secretes "opt out" as opposed to "opt in".

Proposed Solution:

Introduce VerbReadWithSecrets to replace the current behavior of VerbRead, and deprecate VerbReadNoSecrets since "no secrets" should always be the default behavior.

@fspmarshall fspmarshall added this to the 4.2 "Alameda" milestone Aug 13, 2019
@klizhentas
Copy link
Contributor

@benarent we should make sure that it's not a customer impacting change - to my knowledge read no secrets was never exposed, so safe to replace, but we should check this.

@benarent
Copy link
Contributor

benarent commented Nov 1, 2019

Apologies for not reviewing this sooner. @fspmarshall Do you have any scenarios in which you can see customers already interacting with this? I take this was from your work with backup and restore?

@fspmarshall
Copy link
Contributor Author

I take this was from your work with backup and restore?

Yeah, this came up originally when dealing with adding the ability to export user authentication data.

Do you have any scenarios in which you can see customers already interacting with this?

I doubt removing VerbReadNoSecrets will be an issue, it has been left undocumented (probably deliberately). Changing the default behavior of VerbRead to not imply access to secrets might affect existing users tho. We'd need to figure out exactly which APIs needed to be rescoped under VerbReadWithSecrets before we could be certain. Deciding the the correct scoping isn't trivial since VerbReadNoSecrets hasn't been used consistently, and I haven't had the time to give it the serious attention it requires.

At a guess, this change is most likely to affect people using remote tctl execution (#2991).

@benarent benarent removed this from the 4.3 "Concord" milestone Dec 24, 2019
@zmb3 zmb3 added the rbac Issues related to Role Based Access Control label Jan 31, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
rbac Issues related to Role Based Access Control
Projects
None yet
Development

No branches or pull requests

4 participants