-
Notifications
You must be signed in to change notification settings - Fork 150
Add console extension manifests #229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add console extension manifests #229
Conversation
|
/hold WIP. Need to make sure we know where these will live in the API, if the group is correct, and if any will be converted into top-level config/operator config items instead of custom resources. |
|
@jwforres fyi |
50b85e8 to
0e8c775
Compare
| description: | ||
| type: string | ||
| description: Description of the CLI download (can include markdown) | ||
| link: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Possibly needs to be links [ ]
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
abbe2b0 to
098b938
Compare
098b938 to
8e3b3f9
Compare
|
|
8e1966f to
fac016f
Compare
fac016f to
dd39149
Compare
|
/retest flake details: |
|
I spoke with @enj about the permissions aspect of this. He indicated it is not a blocker, but I can understand his concerns about doing this which largely fall in two areas:
My view on the way forward is: Proceed with this as is (Granting permission to all authenticated users) for now. I don't want to see the UI team have to go implement a more complicated config controller flow right this minute, and @spadgett expressed some legitimate concerns about the quality of user experience we could provide if we did so (though i think it might be worth probing what options exist there a bit more, in terms of forcing browser refreshes or something, as suggested by @enj). But file away a tech debt card to refactor this in the future(to use a config controller or other operator logic pattern) so we can eventually remove this permission. Ideally if the additional 4.2 runway allows it, fix it in 4.2, but worst case, keep it on the roadmap, don't view this as the long term solution. |
For context, the exploit resulted in full cluster compromise via discovery, i.e. an API that is by definition read only and "safe" (because it is just metadata about what APIs are available on the cluster). It had nothing to do with the data itself and was a by product of the complexity of the underling wiring (and CRDs are very complex under the hood). That complexity combined with a missing error check is what led to the CVE. Do I think another similar CVE is likely? No. Would I like to assume it will happen and take precautions? Yes.
Sounds reasonable. @spadgett @benjaminapetersen I am trusting you guys to make an honest attempt at an architecture that does not involve assigning RBAC to all authenticated users. |
|
/retest |
dd39149 to
7d24200
Compare
|
/retest |
|
/hold cancel |
7d24200 to
260818b
Compare
spadgett
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: benjaminapetersen, spadgett The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Adds 3 new CRDs for console extensions:
Related to Console PRs: