-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable access via ssh-oidc and cloud.egi.eu #54
Conversation
Terraform Format and Style 🖌
|
deployment/playbook.yaml
Outdated
|
||
- role: 'grycap.motley-cue' | ||
ssh_oidc_my_vo: false | ||
ssh_oidc_other_vos: cloud.egi.eu |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we be more specific on the role from the VO?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Checking: fedcloud-eu/vault-doc#2
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is that issue related to the role restriction in motley-cue? I understand this is independent to secrets but a matter of how the entitlement is configured ssh-oidc
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, the variable ssh_oidc_other_vos: cloud.egi.eu
in the Ansible role above will be translated into:
authorised_vos = ['urn:mace:egi.eu:group:cloud.egi.eu:role=member#aai.egi.eu']
inside a file /etc/motley_cue/motley_cue.conf
on the target VM via:
- https://github.com/marcvs/contextualise_ssh_server/blob/v0.8.6/contextualise_ssh_server/motley_cue.template.conf#L127
- https://github.com/grycap/ansible-role-motley-cue/blob/950d21af0724550dc17dd8019165ca2a4e2a7b93/tasks/main.yml#L101-L119
- https://github.com/grycap/ansible-role-motley-cue/blob/950d21af0724550dc17dd8019165ca2a4e2a7b93/tasks/main.yml#L79-L82
The solution is to configure /etc/motley_cue/motley_cue.conf
on the target VM with this instead:
authorised_vos = ['urn:mace:egi.eu:group:cloud.egi.eu:role=auditor#aai.egi.eu']
I think the best way to accomplish this is to update this task in Ansible:
To make the role=member#aai.egi.eu
part of the entitlement configurable instead of hard coded.
What do you think?
If you agree, I will open a PR in https://github.com/grycap/ansible-role-motley-cue/
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Here it is: grycap/ansible-role-motley-cue#13
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok, I have now applied the changes required:
- restrict access to members of the
cloud.egi.eu
VO with theauditor
role. - once logged in, these members can use unrestricted
sudo
Please let me know your thoughts.
Terraform Format and Style 🖌
|
Terraform Format and Style 🖌
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Terraform Format and Style 🖌
|
Terraform Format and Style 🖌
|
Terraform Format and Style 🖌
|
Terraform Format and Style 🖌
|
Terraform Format and Style 🖌
|
Terraform Format and Style 🖌
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's try
Terraform Format and Style 🖌
|
Summary
Would you be happy granting access via
ssh-oidc
?Is this something to consider not only for this but for other EGI managed VMs?
Related issue :