-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: describe the default Workload Identity ACL policy #17245
Conversation
Workload Identities have an implicit default policy. This policy can't currently be described via HCL because it includes task interpolation for Variables and access to the Services API (which doesn't exist as its own ACL capbility). Describe this in our WI documentation. Fixes: #16277
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, although which a clarifying suggestion around the service registration detail.
described in [Task Access to Variables][]. The implicit policy also allows | ||
access to list or read any Nomad service registration as with the [List Services | ||
API][] or [Read Service API][]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
described in [Task Access to Variables][]. The implicit policy also allows | |
access to list or read any Nomad service registration as with the [List Services | |
API][] or [Read Service API][]. | |
described in [Task Access to Variables][]. The implicit policy also allows | |
access to list or read any Nomad service registration in the same namespace | |
as the job, as with the [List Services API][] or [Read Service API][]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looking at the code I don't think that's the case? The template
block uses the job's namespace but we don't enforce that as an ACL policy. So if a workload uses the Task API it can read services in another namespace.
The current code assumes that if you have a valid WI claim that we don't need to check the namespace (ref service_registration_endpoint.go#L220
). Which seems like it could have been a regression in behavior. But if I look at the original auth code from 1.3.0 (ref service_registration_endpoint.go#L437-L477
) where we only had a node secret and not a WI, that's always been the policy.
I don't think this is unintentional either, as we have #14177 open which is saying "hey let's make sure the template
block can do that too!"
Workload Identities have an implicit default policy. This policy can't currently be described via HCL because it includes task interpolation for Variables and access to the Services API (which doesn't exist as its own ACL capbility). Describe this in our WI documentation. Fixes: #16277
) Workload Identities have an implicit default policy. This policy can't currently be described via HCL because it includes task interpolation for Variables and access to the Services API (which doesn't exist as its own ACL capbility). Describe this in our WI documentation. Fixes: #16277 Co-authored-by: Tim Gross <[email protected]>
Workload Identities have an implicit default policy. This policy can't currently be described via HCL because it includes task interpolation for Variables and access to the Services API (which doesn't exist as its own ACL capbility). Describe this in our WI documentation.
Fixes: #16277