Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Calculate namespace prefix before tainting route entries #21470

Merged
merged 6 commits into from Jun 27, 2023

Conversation

VioletHynes
Copy link
Contributor

@VioletHynes VioletHynes commented Jun 27, 2023

This is essentially the 'fix' code we used as part of resolving a recent sev 1, where we pre-calculate the namespace path, as we do in the other place we call c.router.Taint(ctx, path). The PR for that change is here: #15067 . I added debug logging for when we taint mounts like this, and added it to the other place we pre-calculate namespace prefixes.

There may be more adjustments/improvements we want to make to add additional safety to tainting, such as preventing the root "sys/" from ever being tainted, but if we did want to add those, we can do as part of a different PR. I wanted to keep this PR with a small scope, specifically targeting the fix.

@VioletHynes VioletHynes marked this pull request as ready for review June 27, 2023 14:34
vault/auth.go Outdated Show resolved Hide resolved
vault/mount.go Outdated Show resolved Hide resolved
vault/auth.go Outdated Show resolved Hide resolved
vault/mount.go Outdated Show resolved Hide resolved
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport/1.13.x Backport changes to `release/1.13.x` backport/1.14.x Backport changes to `release/1.14.x`
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants