Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1759182: Block all externalIPs by default #714

Closed
wants to merge 2 commits into from

Conversation

abhat
Copy link
Contributor

@abhat abhat commented Jan 13, 2020

Only allow external IPs to be configured by cluster administrators and block normal users to set external IPs on a Service.

@openshift-ci-robot
Copy link

@abhat: This pull request references Bugzilla bug 1759182, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

Bug 1759182: Block all externalIPs by default

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot openshift-ci-robot added bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Jan 13, 2020
@abhat
Copy link
Contributor Author

abhat commented Jan 14, 2020

/retest

@abhat
Copy link
Contributor Author

abhat commented Jan 14, 2020

/test e2e-aws-operator

@abhat abhat requested review from danwinship and removed request for squeed January 15, 2020 03:12
@abhat
Copy link
Contributor Author

abhat commented Jan 15, 2020

/test e2e-aws

@abhat
Copy link
Contributor Author

abhat commented Jan 15, 2020

/test e2e-aws-upgrade

@danwinship
Copy link
Contributor

So what's the deal with this vs openshift/origin#24390 ? Are they both needed?

@abhat
Copy link
Contributor Author

abhat commented Jan 15, 2020

Yes, this one is the actual change that will create the ExternalIPRangerAdmissionConfig. The other origin PR only fixes the typo for the module on which the Install method is called. restrictedendpoints vs externaliprange

@abhat
Copy link
Contributor Author

abhat commented Jan 16, 2020

/hold

@openshift-ci-robot openshift-ci-robot added do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. and removed size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Jan 16, 2020
@abhat
Copy link
Contributor Author

abhat commented Jan 20, 2020

/test e2e-aws-operator

@sttts
Copy link
Contributor

sttts commented Jan 21, 2020

Looks good to me. It needs some peer from sdn team to lgtm.

@danwinship
Copy link
Contributor

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Jan 21, 2020
@sttts
Copy link
Contributor

sttts commented Jan 21, 2020

/approve

@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: abhat, danwinship, sttts

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 21, 2020
@abhat
Copy link
Contributor Author

abhat commented Jan 21, 2020

/hold cancel

@openshift-ci-robot openshift-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jan 21, 2020
@ashcrow
Copy link
Member

ashcrow commented Feb 5, 2020

https://bugzilla.redhat.com/show_bug.cgi?id=1759182#c12 indicates verification did not pass yet.

@abhat
Copy link
Contributor Author

abhat commented Feb 5, 2020

Right, I am trying to root cause why the ExternalIPRangerAdmissionConfig is not correctly registered in the scheme.

@bparees
Copy link
Contributor

bparees commented Feb 19, 2020

At this point we are only accepting critical bug fixes for 4.1. This does not seem to meet that target, do you want to close it (and the BZ) or make a case for why it is critical?

@bparees bparees added the priority/awaiting-more-evidence Lowest priority. Possibly useful, but not yet enough support to actually get it done. label Feb 19, 2020
@abhat
Copy link
Contributor Author

abhat commented Feb 19, 2020

There is a security implication associated with this bug. In 4.1, we didn't have a field in the spec for ExternalIPCIDR, which meant that an arbitrary non-admin user can set external IP on services to any arbitrary IP. We plugged part of the hole by adding a custom RBAC checker. But for the RBAC checker to be "effective" we need this change. IMO, it's critical if we will continue to support 4.1.x. If 4.1.x will be EOL soon, we can close out the bug and the PR.

@bparees
Copy link
Contributor

bparees commented Feb 19, 2020

If 4.1.x will be EOL soon, we can close out the bug and the PR.

https://access.redhat.com/support/policy/updates/openshift

4.1 ends maintenance support when 4.4 GAs.

@jwforres
Copy link
Member

@abhat please see https://bugzilla.redhat.com/show_bug.cgi?id=1759182#c13 I tend to agree with Scott. But the BZ has no severity assigned, so would like @danwinship and/or @knobunc to ack this is important enough to be backported at this time.

@abhat
Copy link
Contributor Author

abhat commented Mar 25, 2020

Closing this since we don't see much value in porting/adding fixes for 4.1

@abhat abhat closed this Mar 25, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged. priority/awaiting-more-evidence Lowest priority. Possibly useful, but not yet enough support to actually get it done. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

7 participants