Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable and remove use of local/shared key auth for SAs #4122

Open
wants to merge 9 commits into
base: master
Choose a base branch
from

Conversation

fahlmant
Copy link
Collaborator

Which issue this PR addresses:

https://issues.redhat.com/browse/ARO-14659

What this PR does / why we need it:

As part of security wave, all SAs need to disable local/shared key auth.

Copy link
Contributor

@kimorris27 kimorris27 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do you plan to test this with a full service dev RP before merge? I'm not sure if it's worth the effort.

@fahlmant fahlmant force-pushed the ARO-14659 branch 3 times, most recently from 5261d3b to d01e9bb Compare March 20, 2025 13:56
@fahlmant
Copy link
Collaborator Author

@kimorris27 No, I ran a INT Release pipeline against the PR to ensure that the version upload works as expected, so I agree a full deployment test is overkill.

@github-actions github-actions bot added the needs-rebase branch needs a rebase label Mar 20, 2025
Copy link

Please rebase pull request.

@github-actions github-actions bot removed the needs-rebase branch needs a rebase label Mar 20, 2025
Comment on lines +21 to +23
d.log.Infof("instantiating blobs client using SAS token for ensure static web content is enabled")
serviceUrl := fmt.Sprintf("https://%s.blob.%s", *d.config.Configuration.RPVersionStorageAccountName, d.env.Environment().StorageEndpointSuffix)
blobsClient, err := azblob.NewBlobsClientUsingEntra(serviceUrl, tokenCredential, d.env.Environment().ArmClientOptions())
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe instead of constructing the blobsClient in the SaveVersion function, we should construct it in the deployer similar to what we do for clusterKeyvault, from a consistency perspective. Then we don't have to pass a token everywhere.

Thoughts? Non-blocking, just a comment.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same would apply for uploadBlobsClient below as well.

Comment on lines 38 to 45
d.log.Infof("instantiating blobs client using SAS token to upload content")
containerUrl := fmt.Sprintf("https://%s.blob.%s/%s", *d.config.Configuration.RPVersionStorageAccountName, d.env.Environment().StorageEndpointSuffix, "$web")
uploadBlobsClient, err := azblob.NewBlobsClientUsingEntra(containerUrl, tokenCredential, d.env.Environment().ArmClientOptions())
if err != nil {
d.log.Errorf("failure to instantiate blobs client using SAS: %v", err)
return err
}

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why is there a separate blobs client. Can we not use the previous one? Is there something special about the new service URL containing the $web container, even though we reference it in upload buffer

rbac.RoleStorageBlobDataContributor,
"parameters('globalDevopsServicePrincipalId')",
resourceTypeStorageAccount,
storageAccountName,
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we want to set the role at the scope of the $web container instead of the whole storage account?

az role assignment create \
    --role "Storage Blob Data Contributor" \
    --assignee <email> \
    --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>"

https://learn.microsoft.com/en-us/azure/storage/blobs/assign-azure-role-data-access?tabs=azure-cli#assign-an-azure-role

@fahlmant fahlmant force-pushed the ARO-14659 branch 3 times, most recently from 2d78714 to de10843 Compare March 25, 2025 21:08
@fahlmant fahlmant force-pushed the ARO-14659 branch 9 times, most recently from 63ec987 to b9d3e6c Compare April 1, 2025 17:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants