Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Key Manager V1: Introduce ACL resources for secrets and containers #812

Closed
kayrus opened this issue Jul 30, 2019 · 2 comments · Fixed by #956
Closed

Key Manager V1: Introduce ACL resources for secrets and containers #812

kayrus opened this issue Jul 30, 2019 · 2 comments · Fixed by #956

Comments

@kayrus
Copy link
Collaborator

kayrus commented Jul 30, 2019

Additional resources have to be introduced to cover the ACL functionality:

  • openstack_keymanager_secret_access_v1
  • openstack_keymanager_container_access_v1

Refs:

@jtopjian @ozerovandrei do you approve additional resources or should they be embedded in the source resources?

UPD: the default ACL, applied on the secret/container is https://docs.openstack.org/api-guide/key-manager/acls.html#default-acl :

{
  "read": {
    "project-access": true
  }
}
@kayrus
Copy link
Collaborator Author

kayrus commented Aug 9, 2019

@jtopjian @ozerovandrei I analyzed the potential use cases. If we create an additional resource, which will set the ACLs, then there is a probability that there will be a gap between the secret creation and setting up the ACLs. During this gap the secret can be accessed by other users. This is different to manila shares ACLs, where the resource permissions are limited by default.

The barbican secret API allows to create the secret without the payload, then if there is no payload, it can be uploaded, but not updated. Using this behavior we can embed the ACL parameter into the secret resource and set ACLs during the resource creation:

  • create the secret without the payload
  • set the ACLs
  • upload the payload

Thoughts?

@ozerovandrei
Copy link
Member

@kayrus I guess that we could sacrifice the features that will come in case of decoupled resource (such as count, etc.) because of the security reasons that you explained.

So I think that we can embed ACLs safely.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants