-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The apiserver read-only API leaks bearer tokens #7963
Comments
The read-only port is only available within the cluster, which is currently assumed to be a secured, trusted network. We are working on removing the read-only port from the apiserver (e.g. #5921) which should take care of this. |
The read-only port is going away in days; that should take care of this specific problem but not necessarily the general case. @erictune the intention is to solve this with permissions? |
At least that will mean that you need cluster admin access (read/write) to see the cluster secrets (right now anyone who can reach the read-only endpoint can escalate to having read-write access to the cluster). Until we have a permissions model in the master, I think that's the best we can do. |
After #5921 is done, then we won't have anything called readonly. All Once we merge REST Policy, we will have differentiated permissions for On Tue, May 12, 2015 at 3:29 PM, Robert Bailey notifications@github.com
|
@lavalamp can you update the status on this? |
This will be fixed when #8155 merges. |
From a minion:
curl http://kubernetes-master:7080/api/v1beta3/secrets
will return the bearer tokens for all service accounts.
I'm not sure if this is already taken care of as part of #5921.
The text was updated successfully, but these errors were encountered: