-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't include probeToken in responses if user doesn't have pt.view permission #2477
Comments
Right, so we can easily filter this out of responses from |
I guess permission on namespaces would solve this... |
We could set up the token as a Secret for the scope agent? (in launch-generator) |
Other hacky solutions:
|
Hacks continued
|
If this was very general it would be pretty cool if you had permissions to
|
Which you could hack by getting the first half and then the 2nd half of the token somehow... we should have warnings about exec/attach permissions, that is essentially giving view-token and thus admin rights. |
Ooops didn't mean to close this. |
In light of weaveworks/scope#2106 (scope can expose passwords and tokens for all your services) we should probably include a permission to use scope at all? |
No. If we do anything here it should be a permission that controls whether a user can see env vars, command line args, etc. This is something that would be enforced in the scope app rather than probe, since we do still want probes to send all info as some users (e.g.) need to be able to see it. |
Cool. This feels like a good way forward then.
|
Probe gives a good indication about where to filter w/ |
Scope report censoring PR weaveworks/scope#3571 implements the Scope part of #2477 (comment). After that one's done and merged, we can add a small conditional wrapper in |
☂️ issue: #2125
The text was updated successfully, but these errors were encountered: