redis-operator: Default user with too many privileges
Expected behaviour
There needs to be an admin user for the use in administrative operations. And we could make the default user -@dangerous.
Actual behaviour
The default user is has global privileges and this might cause issue if there is compromize of the application
Steps to reproduce the behaviour
Login to the shell redis-cli with connection to the master redis pod using default user and issue…
FLUSHALL
This will delete everything. !!!DANGEROUS!!!
About this issue
- Original URL
- State: closed
- Created 2 years ago
- Comments: 26 (17 by maintainers)
For example also how a MySQL operator manages their users and databases, see here.
To post my 2 cents here… I haven’t read the whole thread, but wouldn’t it be possible to introduce CRD’s for this purpose? For example, a
RedisFailoverUser.Personally I’m not a fan of “authv2” and introducing a CRD aligns with decoupled user management of the RedisFailover CRD. This way you’re very easily able to deploy a new user, w/o updating the RedisFailover manifest.
Thanks @samof76,
I am still thinking about this feature but I have quick notes for the moment:
redisops-admin, the user to manage the instances by the operator, and the other users.authfield