You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're running into an issue with the Task Pods not having enough permissions, the situation is this:
User with Developer Role creates a Task to sync production to development environment
Lagoon creates a Task Pod within development environment which wants to ssh into production environment
Problem is that the Task Pod is running with the guest role which cannot access the production environment and therefore fails.
We could solve this with giving the guest role ssh access to the production environment, but this is not the idea of RBAC.
We could also create a new role for the default-user and give that role ssh production access, the problem is that this role will also be used by the CLI pod and there is the risk that somebody with just development access has access to the CLI pod and "steals" the credentials of the CLI pod and can access the production environment.
Therefore our current idea to solve this would be:
When Lagoon creates the Task Pod it also gets a JWT Token from the API which has maintainer role access and is valid only for a couple of minutes. This JWT is then used by the Task Pod to authenticate itself against the SSH Service (instead of the SSH Key) and gets access to the production environment.
Update the Task Pod Creator of Lagoon to get a JWT Token from the API with Maintainer permission and inject it into the Task Pod (The pod will then use it to get access to the production environment)
The text was updated successfully, but these errors were encountered:
We're running into an issue with the Task Pods not having enough permissions, the situation is this:
Problem is that the Task Pod is running with the
guest
role which cannot access the production environment and therefore fails.We could solve this with giving the guest role ssh access to the production environment, but this is not the idea of RBAC.
We could also create a new role for the default-user and give that role ssh production access, the problem is that this role will also be used by the CLI pod and there is the risk that somebody with just development access has access to the CLI pod and "steals" the credentials of the CLI pod and can access the production environment.
Therefore our current idea to solve this would be:
When Lagoon creates the Task Pod it also gets a JWT Token from the API which has maintainer role access and is valid only for a couple of minutes. This JWT is then used by the Task Pod to authenticate itself against the SSH Service (instead of the SSH Key) and gets access to the production environment.
I think these are the needed tasks:
The text was updated successfully, but these errors were encountered: