Closed Gerrit91 closed 3 years ago
This is an issue for gardener-extension-provider-metal
Right, we could possibly fix it there, but one question that comes to my mind is... if routing with a a "non-existing" source address that does not exist should also be prevented through the switch config of the leaves?
No this is not possible, as there is no possibility to have CIDR-Filters for EVPN Type-5 routes at the leaves for firewall ports.
What bothers me in the scenario you described: what happens with the shoot spec ... at the moment the old address will still be there.
We implemented a check in cloud-api that prevents a user from removing an IP... but if a user does that with metalctl, I think he broke something.
Closing this: cluster will get into error state in this scenario and directly using metalctl
is potentially unsafe in various situations.
Mh. I don't know. Don't really like the fact that it's generally possible to disguise behind IPs that are not even allocated in the metal-api, probably from other projects, too. I always thought that from the metal-stack perspective a user should be able to create his own firewalls and that the user is free to access it through SSH or console if he so desires. But now it sounds like accessing a firewall is more of a "provider admin" thing because malicious users could do evil things.
Maybe the check in the cloud-api prevents this scenario for most of the time, but to me this still leaves a bad aftertaste. 🤔
Don't know if this project is the right place, but when you delete an Egress IP from a cluster via metal-api the IP can still be used for outgoing requests:
But in a cluster container: