Password leakage risk #13
Loading…
Add table
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Relying on grains to determine server roles could risk leaking passwords if a minion is compromised - an attacker could alter the grains file on the minion, run highstate and the roles would be applied before the grains file is properly updated.
The fix is to directly rely on pillar data instead of using pillar data to fill grain data and basing roles off the resulting grain data. This could cause complications with some of the build states since they should ideally be run prior to the relevant maintain states, though there are only a few servers that have build states.
fixed with
57f6066c45
This also creates an issue with role desync between pillars and states - since pillars are currently still relying on grain data to determine roles.
Unfortuantely pillar files can't use pillar data to determine roles (for obvious reasons), so an alternative solution needs to be implemented - see #14