Replies: 5 comments 16 replies
-
Treat this flags as feature gates. In regard #3655. Security constraints are not implemented yet. But they will be by In regard #3609. It is just precaution. Let admin decide 😆 In regard #3538. This
Kubernetes features - Kubernetes flags, they are in
While
It's just one flag. We need Overall, I like feature flags. Though, |
Beta Was this translation helpful? Give feedback.
-
Just to share my perspective here, my use case is a very private CI environment. Adding manual config in the UI to enable these features would add some friction for me. Also, I agree with @zc-devs that the env variables can allow for a more fine grained approach than a blanket trusted switch. For example, an instances may need to allow setting security context but may not need secret access. In that case, we can have tighter controls using env vars.
This ideas concerns me a bit. If we adopt an "and" logic where in order to enable secret access (for example) you need both the env variable AND the repo to be trusted. I will probably wind up needing to make all of my repo's trusted. However, that will likely lead to a situation where I'm granting too many privileges and opening up additional security holes. In the end, my feelings are that we need more granular control at the repo level (i.e. not just a single trusted switch) if we go with an "and" relationship between env vars and repo level permissions. |
Beta Was this translation helpful? Give feedback.
-
Yes. "My" feature gates are per instance. Matrix is per repo.
If you were talking about
Apart from me, it is explained by @dominic-p in #3758 (comment) and @everflux in #3537 (comment).
I think this is a problem by itself. Why do I have to gain "root" access on the repos, if I want just enable some subset of features?
As I sad I do not consider Edit: just to be more clear. In my thoughts, |
Beta Was this translation helpful? Give feedback.
-
I started working on this in #4025. My roadmap:
|
Beta Was this translation helpful? Give feedback.
-
After my first PR to this we need to revisit it. The main problem: You can now add repo/org agents and then, the admin agent should be able to control which repos get privileged access. @anbraten suggests to fully remove the privileged part from the server and let the agent do everything. Problem: You maybe have multiple repos running on the same agent, some privileged, some not. An option to merge these could be to set a list of repo IDs on the agent, so these repos are allowed to run privileged and the other ones not. What do you think about this? If we decide here, I'm happy to continue my work on it. |
Beta Was this translation helpful? Give feedback.
-
#3655:
#3609:
@qwerty287 wrote (#3655 (comment)):
Beta Was this translation helpful? Give feedback.
All reactions