diff options
author | Seena Fallah <seenafallah@gmail.com> | 2024-05-19 12:03:12 +0200 |
---|---|---|
committer | Seena Fallah <seenafallah@gmail.com> | 2024-05-19 12:03:12 +0200 |
commit | 63508ccb96a34f7e81384ee4bdb64f66def9f909 (patch) | |
tree | 55df14169ed181b74e26b672988f6ab5441ef20b /src/rgw | |
parent | Merge pull request #55008 from NitzanMordhai/wip-nitzan-clear-data-digest-for... (diff) | |
download | ceph-63508ccb96a34f7e81384ee4bdb64f66def9f909.tar.xz ceph-63508ccb96a34f7e81384ee4bdb64f66def9f909.zip |
rgw: eliminate vault token perm for group read
Typically, the HashiCorp Vault token is refreshed by another process,
such as the Vault Agent. This process needs ownership of the file to
write the new token. Since Ceph primarily runs with its own user,
it cannot access the token file unless it has group read permissions.
This requires either assigning the correct group to the file by the
Vault Agent or ensuring Ceph is part of the appropriate group.
By eliminating the restriction on group read permissions, this can be achievable.
Fixes: https://tracker.ceph.com/issues/66121
Signed-off-by: Seena Fallah <seenafallah@gmail.com>
Diffstat (limited to 'src/rgw')
-rw-r--r-- | src/rgw/rgw_kms.cc | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/rgw/rgw_kms.cc b/src/rgw/rgw_kms.cc index ea30ff868fd..a0ec644c35c 100644 --- a/src/rgw/rgw_kms.cc +++ b/src/rgw/rgw_kms.cc @@ -221,9 +221,9 @@ protected: return -ENOENT; } - if (token_st.st_mode & (S_IRWXG | S_IRWXO)) { + if (token_st.st_mode & (S_IWGRP | S_IXGRP | S_IRWXO)) { ldpp_dout(dpp, 0) << "ERROR: Vault token file '" << token_file << "' permissions are " - << "too open, it must not be accessible by other users" << dendl; + << "too open, the maximum allowed is 0740" << dendl; return -EACCES; } @@ -257,7 +257,7 @@ protected: int res; string vault_token = ""; if (RGW_SSE_KMS_VAULT_AUTH_TOKEN == kctx.auth()){ - ldpp_dout(dpp, 0) << "Loading Vault Token from filesystem" << dendl; + ldpp_dout(dpp, 20) << "Loading Vault Token from filesystem" << dendl; res = load_token_from_file(dpp, &vault_token); if (res < 0){ return res; |