Open cfergeau opened 5 years ago
After further discussion, I was pointed out at https://libvirt.org/aclpolkit.html which may be usable to restrict what can be done with the libvirt API, and also at https://github.com/openshift/cloud-credential-operator which manages fine-grained credentials in the AWS case (but probably not going to be applicable to libvirt).
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
/remove-lifecycle stale
/lifecycle frozen
README.md says to modify libvirtd.conf:
and the libvirtd systemd service:
This is roughly equivalent to asking people to configure remote password-less root access to the host!
If you can connect to qemu:///system, you can for example create a storage pool with:
and then read/write to any file in /etc (for example /etc/shadow). We could restrict this libvirtd access to connections from the cluster, but I don't think we want the anything running in the cluster to be able to escape into the host. We could use qemu+ssh:// and ssh keys, or qemu+tls:// and client certificates, and protect these secrets from most of the cluster, but I'm not familiar at all with openshift security, so I don't know if this is acceptable or not.