Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Blocking user-data #129

Open
jqport opened this issue Feb 23, 2018 · 4 comments
Open

Blocking user-data #129

jqport opened this issue Feb 23, 2018 · 4 comments

Comments

@jqport
Copy link

jqport commented Feb 23, 2018

Hi,

When using kube2iam in a multi-tenant environment it can be useful to block access to the user-data endpoint so random users in containers cannot read start-up scripts. Would you be open to a PR that would block off access to that endpoint?

If you don't mind me adding this PR; would you like it as a toggle or just as another handler like security-credentials?

@jtblin
Copy link
Owner

jtblin commented Mar 26, 2018

Sorry for the lag, good point. It sounds like it should be on by default to enhance security but could be toggled off if needed. PR welcome :)

@dasgoll
Copy link

dasgoll commented Mar 26, 2018

@jqport
A silly question, when you say "user-data endpoint" what exactly do you mean ?

@jqport
Copy link
Author

jqport commented Mar 26, 2018

@jtblin Sounds good, I'll toss up a PR soon-ish.

@dasgoll No such thing as a silly question. I meant the user-data endpoint for AWS's magic ip [http://169.254.169.254/latest/user-data] (you can read more about using user-data to configure ec2 instances here: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/user-data.html).

@rmt
Copy link

rmt commented Jul 16, 2018

#137 seems to address this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants