Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

better flesh out operator privileges in other Silos #1681

Open
Tracked by #849
davepacheco opened this issue Sep 7, 2022 · 3 comments
Open
Tracked by #849

better flesh out operator privileges in other Silos #1681

davepacheco opened this issue Sep 7, 2022 · 3 comments
Milestone

Comments

@davepacheco
Copy link
Collaborator

#1340 proposed that users with fleet-level privileges would have no privileges to access siloed resources in Silos other than their own. (This phrasing wasn't really fleshed out until RFD 297, but I believe that's essentially what #1340 meant.) The principle was essentially: we shouldn't be deciding who's allowed to cross Silo lines -- if an operator wants to access another Silo, they can do that, but they do it by having an account in that Silo's IdP, which makes it noisy and auditable.

RFD 309 raises a number of user stories that cast some doubt on this approach. To be clear, I'm not sure yet what the right answer is, but there are enough questions that I think we want to revisit this before committing too far one way or the other.

CC @plotnick @rmustacc @kc8apf

@zephraph
Copy link
Contributor

I don't think it's quite clear to me how 309 casts doubt on the separation. We've always acknowledged that operators are going to need some lens into silo resources to be able to debug escalated issues, but my understand is that we still want to preserve the separation so that operators don't have unnecessary access to what might be confidential details.

#3092 is an example of where we're bending the boundaries a bit by making project/instance names visible to the operator. While this gives operators more insight into silo specific resources it does so to aid in establishing shared communication between the operator and the developer. I chose very specifically to only display the minimal context that the operator needs in this case.

@davepacheco
Copy link
Collaborator Author

I understood #1340 (and my summary in this comment) to be proposing that Fleet Administrators would have no privileges to see just about anything inside other Silos. Not the list of projects, instances, or anything like that. I agree that's too rigid and RFD 309 explains why. This ticket is about figuring out what these boundaries really are and ideally what principles guide them: e.g., provide access when there's particular value provided by a holistic, cross-Silo view; or where it's not even possible to correlate things without it: e.g., if a Fleet Admin can see sleds but not instances, and the Silo Admin can see instances but not sleds, then literally nobody can tell you what instances are on what sleds.

@davepacheco
Copy link
Collaborator Author

When we do this, we should re-evaluate:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants