-
Notifications
You must be signed in to change notification settings - Fork 260
fix: check authz for evaluation endpoints #3438
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: Mark Phelps <[email protected]>
Signed-off-by: Mark Phelps <[email protected]>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #3438 +/- ##
==========================================
+ Coverage 64.63% 64.66% +0.03%
==========================================
Files 174 174
Lines 13916 13918 +2
==========================================
+ Hits 8994 9000 +6
+ Misses 4231 4227 -4
Partials 691 691
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
Signed-off-by: Mark Phelps <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we need to update the authz engine to support requesting at least read flag in the requested namespace here. Or go as far as the authz engine supporting request more than one resource to do flag and segment.
by blanket disabling it you let anyone with authn but no authz read from any namespace.
I made a PR on this PR ☝️ |
@markphelps is it any reason why ofrep and evaluation endpoints should not have authz? |
Signed-off-by: Mark Phelps <[email protected]>
Signed-off-by: Mark Phelps <[email protected]>
I guess I could undo that change for now? although we skipped evaluation server-side authz on purpose it seems when we initially implemented it. I think it gets harder for bulk eval as idk if we wanna check each flag? |
What is it? I don't see any restrictions for a specific flag during CRUD. We could have another action like |
My gut leans on adding a new action / verb as @erka suggests here, specifically for evaluations (eval + ofrep, but not necessarily snapshot data). I think maybe read flag / segment might still make sense for the eval snapshot data endpoint though. |
@markphelps @GeorgeMac Let's move this discussion to another issue or PR. I believe it's the best to resolve the original issue right now. |
@erka @GeorgeMac are we good to merge this to unblock the user in Discord? I agree we should prob discuss evaluation server side authz in another issue |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes @markphelps 👍
* main: fix: check authz for evaluation endpoints (#3438) chore(deps): bump github.com/twmb/franz-go from 1.17.0 to 1.17.1 (#3446) chore(deps): bump github.com/Masterminds/semver/v3 from 3.2.1 to 3.3.0 (#3447) chore(deps): bump github.com/mattn/go-sqlite3 from 1.14.22 to 1.14.23 (#3448) chore(deps): bump go.opentelemetry.io/otel/sdk/metric (#3445) chore(deps): bump github.com/aws/aws-sdk-go-v2/service/s3 (#3449) chore(deps): bump alpine from 3.20.2 to 3.20.3 in /build (#3450) chore(deps-dev): bump vite from 5.4.2 to 5.4.3 in /ui (#3441) chore(deps-dev): bump @tailwindcss/forms from 0.5.8 to 0.5.9 in /ui (#3440) docs: add lzakharov as a contributor for code (#3437) Enable pgx simple protocol if prepared statements disabled (#3436) chore: prep for 1.49.1 (#3434)
Reported in Discord: https://discord.com/channels/960634591000014878/1281742374275649569
A user reported that with authz enabled evaluation for client side SDKs did not work. This fixes that and adds more testing
Also disables authz checking for ofrep server endpoints