Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cis: Update CIS publisher rules to match production #537

Draft
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

floatingatoll
Copy link
Contributor

@floatingatoll floatingatoll commented Jul 27, 2021

We found in IAM-866 that the CIS publisher rules don't seem to line up with what we're expecting CIS to do. #523 offers up a set of fixes that we should check against the work done with the LDAP-to-CIS scripts during IAM work week, so this PR starts from that point and opens up with review requests to get the ball rolling.

(CI is temporarily broken; #529, #530)

TODO

  • first round of reviews
  • verify list of identity subentries is complete
  • TBD

Copy link

@gcoxmoz gcoxmoz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm leaving a weak r+ here.

The LDAP changes make sense: ldap OR mozilliansorg can create ssh_public_keys and pgp_public_keys, but only LDAP can update them later. That makes it so CIS could make a dummy initial value, but LDAP is the clear source of truth and thus can overwrite later.

As to identities, allowing LDAP to assert ongoing ownership over subentries it owns, makes sense. The reluctance I have is, I can't assert that the list of subentries under identities is complete. But, under the guise of "if it's wrong, it'll probably just fail to update and someone will notice," I'm r+'ing it. I think it's actually complete, so, r+

@floatingatoll
Copy link
Contributor Author

The reluctance I have is, I can't assert that the list of subentries under identities is complete.

Added to (a new) WIP list.

@floatingatoll
Copy link
Contributor Author

I think it's actually complete, so, r+

Thanks for the link. Agreed, added r+.

@dividehex Do you see any issues with these changes that might not be obvious to either of us? This is low likelihood, but there's not many folks with domain knowledge, so I thought I'd ask.

This set of changes realigns the permissions granted to LDAP and
DinoPark with the capabilities present and used in production today.
(For example, DinoPark has no UI to modify SSH or PGP keys.)

These were prepared in #523 to allow LDAP to update LDAP keys that can't
be set by any other CIS integration, and this commit contains that work.
@floatingatoll
Copy link
Contributor Author

Note that the tests appear to be failing due to some sort of mismatch between the expectations of the tests, and the reality of our permissions, so that's either a good sign (these changes are to a meaningful file) and/or a bad sign (these changes require code spelunking and test review).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants