Page MenuHomePhabricator

(2019-09) Create secteam groups in admin.yaml and define permissions
Closed, InvalidPublic0 Estimated Story Points

Description

Security-Team is currently keeping evidence in a few location, but mostly consolidated on mwlog* for now. This is owned by root at the moment which limits the team as only one member can fully manage the data. We also need a GID that we can use to manage files in general and settings etc. Additionally members of secteam who do engineering within prod (of which there is one atm) need a subset of commands.

In my mind this comes with:

secteam
secteam-admin (commands to be run generally such as tcpdump)
secteam-root (not sure if there is anything here at the moment)

Event Timeline

chasemp created this task.

Change 510753 had a related patch set uploaded (by Rush; owner: cpettet):
[operations/puppet@production] admin: add secteam and secteam-admin for T223463

https://gerrit.wikimedia.org/r/510753

Change 510753 had a related patch set uploaded (by Rush; owner: cpettet):
[operations/puppet@production] admin: add secteam and secteam-admin for T223463

https://gerrit.wikimedia.org/r/510753

Is this SRE-Access-Requests? I'm not giving anyone rights they don't have. Security-Team is shell only and no sudo, secteam-admin is me only and I already have root.

Is this SRE-Access-Requests? I'm not giving anyone rights they don't have. Security-Team is shell only and no sudo, secteam-admin is me only and I already have root.

mutante: regarding the question: it's always SRE-access-requests .. the difference you point out just changes it from "has to be in the meeting or not" imho
chasemp:  kk, then I'll proceed w/o a meeting based on no change in priv and leave the tag for posterity/discovery

Quick example on use cases and such, last week in {T224725} there were some artifacts that members of secteam wanted to help verify/collab on but without shell or a predefined mechanism it's difficult. (i.e. root@clouddb1001:/srv/labsdb/s53220__quickstatements_p)

pinged @MoritzMuehlenhoff to get feedback, esp on the list of perms for secteam-admin and he graciously agreed to look at things tomorrow

Change 521483 had a related patch set uploaded (by Jbond; owner: John Bond):
[operations/puppet@production] admin: new user group secteam-users

https://gerrit.wikimedia.org/r/521483

Change 521484 had a related patch set uploaded (by Jbond; owner: John Bond):
[operations/puppet@production] admin: new group add secteam-admin

https://gerrit.wikimedia.org/r/521484

Change 521483 merged by Jbond:
[operations/puppet@production] admin: new user group secteam-users

https://gerrit.wikimedia.org/r/521483

@chasemp I have gone ahead and created the secteam-users group (renamed from secteam to match our convention) so you can go ahead an start using that one. There where some additional comments around the secteam-admins group and as this is a downgrade in your permissions it was deemed that this change was low priority and we had some time to ensure we get this right. Please let us know if we have got the priority wrong.

@jbond - @chasemp is on sabbatical until September, so it'll probably be a little while before this can be tested and confirmed. So yes, this entire task is fairly low priority at the moment.

akosiaris changed the task status from Open to Stalled.Jul 15 2019, 1:41 PM
akosiaris lowered the priority of this task from Medium to Low.
akosiaris subscribed.

Setting stalled and low priority per comments above. @sbassett feel free to unstall when ready.

RobH renamed this task from Create secteam groups in admin.yaml and define permissions to (2019-09) Create secteam groups in admin.yaml and define permissions.Jul 30 2019, 8:10 PM
RobH assigned this task to sbassett.

Hey, @chasemp, is this in your radar (lot of time passed since last update)? If yes, but "there is need of some discussion and work not involving SRE", I would remove the SRE-Access-Requests so it doesn't appear on clinic duty dashboard. If no, maybe this should be closed and a different task should be open with further actionables (technically, the title has been already fullfilled, secteam-users exist on production). If yes, but SREs are blocking work, please let us know how. Cheers!

herron subscribed.

Removing the SRE-Access-Requests project tag for now. Please update and re-add if/when any further action is needed. Thanks!

Apologies @jcrespo and @herron for the lag here. I was away (thanks for updating the task @sbassett) and then this fell to the bottom of the pile due to fires forever and ever it feels like. I'll cleanup, revisit, and add the tags as appropriate.

Change 510753 abandoned by Rush:
[operations/puppet@production] admin: add secteam and secteam-admin for T223463

Reason:
Nothing here for the moment, so setting aside until there is.

https://gerrit.wikimedia.org/r/510753

Change 521484 abandoned by Rush:
[operations/puppet@production] admin: new group add secteam-admin

Reason:
Nothing here actionable atm.

https://gerrit.wikimedia.org/r/521484

chasemp changed the task status from Declined to Resolved.Sep 28 2020, 6:43 PM
sbassett changed the task status from Resolved to Invalid.Dec 3 2021, 6:45 PM

Huh, given that both relevant patches were never merged, I'm going to set this to invalid for now, since it definitely was not resolved and wasn't really declined either. I think invalid makes the most sense given that it is not clear if this is even needed anymore or if an alternative approach might be required.