Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Potential security risk using Openshift Connection Service #224

Open
DamianBacalov opened this issue Jan 30, 2025 · 0 comments
Open

Potential security risk using Openshift Connection Service #224

DamianBacalov opened this issue Jan 30, 2025 · 0 comments

Comments

@DamianBacalov
Copy link

When using the Task "Execute OC command" with Openshift Connection Service, the module uses the kubeconfig placed in the home folder. This is a security risk for several reasons:
. The information is not deleted when the execution ends. This means that the kubeconfig has all the service accounts credentials on it and anyone can create a pipeline to see it.
. If two pipelines starts in parallel the second pipeline overwrites the information causing the first one will be using a wrong connection
. In the previous scenario, one pipeline could starts deploying objects in one cluster and ends in another cluster

The solution could be to use a kubeconfig placed in the same cloned folder (which is exclusive for the execution).

I think the problem is in the file "src/oc-auth.ts" line 135. I'm attaching a screenshot.

Thanks!
D.

Image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant