Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add permissions to get secrets to pv-controller. #11581

Merged
merged 2 commits into from
Nov 4, 2016

Conversation

jsafrane
Copy link
Contributor

Glusterfs and Ceph provisioners needs to read any(!) secret on the system.

Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1388316

Glusterfs provisioner needs to read any(!) secret on the system.
@jsafrane jsafrane added this to the 1.4.0 milestone Oct 26, 2016
@jsafrane
Copy link
Contributor Author

[test]

// Glusterfs & Ceph provisioner
{
Verbs: sets.NewString("get"),
Resources: sets.NewString("secrets"),
Copy link
Contributor

@liggitt liggitt Oct 27, 2016

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this concerns me. what's the status on the work to mitigate this exposure?

  • only work off of storageclass objects, not PV annotations (I see the upstream PRs... are you picking those back into 1.4?)
  • require the targeted secret to be a specific type, indicating intent on the secret-creator's part to have it be used by the provisioner?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

opened kubernetes/kubernetes#35675 to require the targeted secret to be a specific type

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

only work off of storageclass objects, not PV annotations

Yes, StorageClass only. Kubernetes master (upcoming 1.5) does not use PV annotations and all the necessary patches were ported to Origin 1.4. I don't think we used PV annotations in "vanilla" Kubernetes 1.4.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can you pick 35675 as part of this, and keep an eye on new PV provisioners upstream to make sure they follow that restriction?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sure, I'll incorporate 35675 into this PR it when it's merged.

@jsafrane
Copy link
Contributor Author

Added kubernetes/kubernetes#35675 and tested locally.

@liggitt
Copy link
Contributor

liggitt commented Oct 31, 2016

Just noticed your comment about ceph provisioners. I didn't catch that in my upstream pull. Is that using a different method to look up secrets? If so, can you unify that with the others and add the type restriction for PV lookup?

@jsafrane
Copy link
Contributor Author

Just noticed your comment about ceph provisioners. I didn't catch that in my upstream pull. Is that using a different method to look up secrets? If so, can you unify that with the others and add the type restriction for PV lookup?

Not sure what you mean, Ceph is already handled well in this PR:

https://github.com/openshift/origin/pull/11581/files#diff-713034e6da86ab87b08bd96b86c77b01R284

pkg/volume/rbd = Ceph RBD plugin

@liggitt
Copy link
Contributor

liggitt commented Nov 1, 2016

huh, I was confused by the presence of both cephfs and rbd packages upstream

@liggitt
Copy link
Contributor

liggitt commented Nov 2, 2016

thanks. regarding the bz comment (this not really *required* in Origin in 3.4), can this wait until we pick up a rebase post-1.4?

@jsafrane
Copy link
Contributor Author

jsafrane commented Nov 2, 2016

can this wait until we pick up a rebase post-1.4?

No, I'd like it in 1.4 as it is a prerequisite for CNS (https://www.redhat.com/en/technologies/storage/use-cases/container-native-storage)

@liggitt
Copy link
Contributor

liggitt commented Nov 2, 2016

if we've already picked back changes that make the provisioner read secrets, then I guess I want the type restriction as well, so LGTM

@liggitt
Copy link
Contributor

liggitt commented Nov 2, 2016

#10773 flake
[test]

@liggitt
Copy link
Contributor

liggitt commented Nov 3, 2016

[merge]

@openshift-bot
Copy link
Contributor

Evaluated for origin merge up to 1b980ad

@openshift-bot
Copy link
Contributor

openshift-bot commented Nov 3, 2016

continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/11104/) (Base Commit: 75ed7e1) (Image: devenv-rhel7_5315)

@jsafrane
Copy link
Contributor Author

jsafrane commented Nov 3, 2016

[test]

4 similar comments
@jsafrane
Copy link
Contributor Author

jsafrane commented Nov 3, 2016

[test]

@jsafrane
Copy link
Contributor Author

jsafrane commented Nov 3, 2016

[test]

@jsafrane
Copy link
Contributor Author

jsafrane commented Nov 3, 2016

[test]

@childsb
Copy link
Contributor

childsb commented Nov 3, 2016

[test]

@childsb
Copy link
Contributor

childsb commented Nov 4, 2016

#10773 flake
[test]

@openshift-bot
Copy link
Contributor

Evaluated for origin test up to 1b980ad

@openshift-bot
Copy link
Contributor

continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/11104/) (Base Commit: 54f5f92)

@openshift-bot openshift-bot merged commit 7d44ade into openshift:master Nov 4, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants