-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Privilege escalation by calling SubmitJobs? #188
Comments
➤ Andrew Cone commented: robertdavidsmith perhaps you have thoughts on this? |
➤ JamesMurkin commented: Hey so I agree this is a weird and something we want to remove asap (once we migrate an internal user off it). However I don't think we want to make the user have CreateQueue perms, at minimum we would need to introduce a new permission that controlled it, I'll explain why.
Giving SubmitAnyJobs to users currently is quite "safe" in that at worst they can use up other peoples queue "share". Whereas giving them CreateQueue would allow them to completely change all queues in Armada itself. Either we:
|
➤ robertdavidsmith commented: On balance I think giving users a special "allow auto creation" perm is the best idea, as this whole thing is really "wacky" and best kept on a tight leash. JamesMurkin is currently researching if we can bin auto-creation altogether, which would be even better. That would involve finding an alternative for GR's internal use case. So suggest parking until James has an answer on this. |
SubmitJobs
calls a private helpergetQueueOrCreate
which will create a queue if it doesn't exist. The user can do this if:autoCreateQueues
is set totrue
inconfig.yaml
permissions.SubmitAnyJobs
I think the user should also need
permissions.CreateQueue
to create a queue, or elseautoCreateQueues
renders that privilege meaningless. Thoughts?steffnova
┆Issue is synchronized with this Jira Task by Unito
The text was updated successfully, but these errors were encountered: