-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Too open permissions for mounted secrets #58
Comments
I'm certain that I made a similar comment long before we released v2, but I can't seem to find that now. I agree that we need to rethink this model. Related (discussion against storing slugs separate from image): deis/controller#324 |
@bacongobbler Do you have any ideas how to mitigate this issue? Maybe there is a way to umount those credentials after Maybe I miss something but I wonder if this would be better if |
Hi. After a little dig into the Workflow I discovered that every application container that is running on
deis/slugrunner
has an object store credentials volume attached to it. I know that aslugrunner
need an access to S3 storage to download a slug tarball, but shouldn't this be considered as a security issue that every user on this container (including application itself) has a read access to those files?We thought that we could use a
defaultMode
option in Kubernetes that restrict permissions for mounted volumes to aroot
user, but it seems that both the init and execution processes of theslugrunner
are running as userslug
.The text was updated successfully, but these errors were encountered: