Skip to content

Conversation

@iamemilio
Copy link

Support for user CA certs on the openstack platform

@openshift-ci-robot openshift-ci-robot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Jan 27, 2020
@iamemilio
Copy link
Author

/cc @mandre @eparis @deads2k @sdodson

@iamemilio
Copy link
Author

/label platform/openstack

@openshift-ci-robot
Copy link

@iamemilio: The label(s) platform/openstack cannot be applied, because the repository doesn't have them

Details

In response to this:

/label platform/openstack

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@eparis
Copy link
Member

eparis commented Jan 27, 2020

/lgtm
since its what we already implemented

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Jan 27, 2020
@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: eparis, iamemilio

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 27, 2020
@openshift-merge-robot openshift-merge-robot merged commit ff86e73 into openshift:master Jan 27, 2020
@cgwalters
Copy link
Member

Thanks so much for writing this - even after-the-fact it's quite useful as it serves as a central reference point for the change, is useful to docs writers and release notes, etc.


1. It is possible to give services authorization/credentials that they dont need and shouldnt have, and this may pose a security risk.

> To prevent this, we make sure that only services that need the CA cert get access to it, and the cert we pass them only has the CA cert in it.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is just the serve cert, right? There's no way to leverage that for privilege escalation is there, even if it was world-readable? If this was about client TLS certs/keys, that would be different, but as far as I can tell client-side auth is not covered in this enhancement.


### Upgrade / Downgrade Strategy

This should not affect the Upgrade/Downgrade functionality.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Well, it will break downgrade if you go from a 4.4 cluster that depends on this functionality to a 4.3 cluster that does not support it. That's generally true of features that add core functionality, but maybe still worth calling out here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants