Closed Bug 1218555 Opened 9 years ago Closed 9 years ago

Limit scopes for index.taskcluster.net

Categories

(Taskcluster :: Services, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: dustin, Assigned: dustin)

References

Details

yMbwoZvhRout3T_Fr7h4Ng - ### Imported: index.taskcluster.net
                         Credentails for `index.taskcluster.net`
    *

That's too broad.  Figure out what API calls index is making (if any) and set up scopes for those calls.
Agree... It does forward requests for artifacts...

Note: I changed it to use tc-index yesterday.
Yep, my read says it only needs queue:get-artifact:* (since it builds signed URLs for queue.getLatestArtifact).  Concur?  Anything else I could do to verify that before cutting it down?
Flags: needinfo?(jopsen)
Also needs azure table access, so:
  queue:get-artifact:*
  auth:azure-table-access:taskclusterindexv1/IndexedTasks
  auth:azure-table-access:taskclusterindexv1/Namespaces

The component uses these to get temp SAS creds from auth, so it doesn't actually have azure credentials
hardcoded into it's heroku config (this is very nice, and reduces both config and attack surface).
Flags: needinfo?(jopsen)
landed
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
Component: Authentication → Services
You need to log in before you can comment on or make changes to this bug.