-
Notifications
You must be signed in to change notification settings - Fork 327
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No whitelist or domains configured -> allow all #82
Comments
hmm, should it default open or default closed? Although I do tend to agree with you I'm reluctant to change the behavior. I don't want to break existing setups. There's general sense that the In either case the current behavior should be documented, perhaps in the config. |
I personally don't care which state it is, but I agree, allowAllUsers exists to allow all users, so it does't make sense. My vote is pick a state, make sure the config errors if both are true on startup, and bump the major version or something. |
IMO Vouch should default to disallow all until properly configured with a whitelist OR
I understand. For the configurations where In these configurations I think it is likely the admin does not realize Vouch is effectively in "allow all". Vouch pushes the client through the authentication flow, and it is reasonable to assume during testing that this authentication "did" something. People are much less likely to test authenticating with a disallowed user.
I agree that the configuration parameters are not clear. To be honest I still don't understand |
I'll second this. The default fallback behavour you raised in this issue really makes me uneasy. Leave out some configuration options, and it defaults to wide open?! I would expect this to be fixed with urgency, even if it breaks existing deployments. Similarly I was quite surprised that the default oauth scope was
However this felt like a hack to achieve something which I feel should be default behaviour. If I'm protecting some of my endpoints with vouch, I'd expect to make the concious decision to enable a level of oauth which gives me any write access to my user's profiles. |
thanks @vulcan25 Could you open a separate issue for the github scopes issue? I'm happy to work with you on exploring better default scopes. |
There has been a clear log.warn in for 9 months...
https://github.com/vouch/vouch-proxy/blob/master/handlers/auth.go#L166 I feel like that's a good compromise. closing |
vouch-proxy/handlers/handlers.go
Line 345 in a832330
The above appears to allow all users when neither a whitelist or domains are configured. Given the purpose of Vouch, configurations like that are almost certainly unintentional. There is the
allowAllUsers
variable for that.bnfinet if you agree this should change I'm happy to take a stab at it and send a pull request.
The text was updated successfully, but these errors were encountered: