added warning for configuration-snippets usage (#10492)
This commit is contained in:
parent
cbed4c6831
commit
3732fc6ab6
2 changed files with 15 additions and 2 deletions
|
@ -316,7 +316,8 @@ nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||||
more_set_headers "Request-Id: $req_id";
|
more_set_headers "Request-Id: $req_id";
|
||||||
```
|
```
|
||||||
|
|
||||||
Since version 1.9.0 this annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
|
!!! attention
|
||||||
|
Since version 1.9.0, `"configuration-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
|
||||||
|
|
||||||
### Custom HTTP Errors
|
### Custom HTTP Errors
|
||||||
|
|
||||||
|
@ -428,6 +429,9 @@ metadata:
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
!!! attention
|
||||||
|
Since version 1.9.0, `"server-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
|
||||||
|
|
||||||
!!! attention
|
!!! attention
|
||||||
This annotation can be used only once per host.
|
This annotation can be used only once per host.
|
||||||
|
|
||||||
|
@ -505,6 +509,9 @@ nginx.ingress.kubernetes.io/auth-snippet: |
|
||||||
```
|
```
|
||||||
> Note: `nginx.ingress.kubernetes.io/auth-snippet` is an optional annotation. However, it may only be used in conjunction with `nginx.ingress.kubernetes.io/auth-url` and will be ignored if `nginx.ingress.kubernetes.io/auth-url` is not set
|
> Note: `nginx.ingress.kubernetes.io/auth-snippet` is an optional annotation. However, it may only be used in conjunction with `nginx.ingress.kubernetes.io/auth-url` and will be ignored if `nginx.ingress.kubernetes.io/auth-url` is not set
|
||||||
|
|
||||||
|
!!! attention
|
||||||
|
Since version 1.9.0, `"auth-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
|
||||||
|
|
||||||
!!! example
|
!!! example
|
||||||
Please check the [external-auth](../../examples/auth/external-auth/README.md) example.
|
Please check the [external-auth](../../examples/auth/external-auth/README.md) example.
|
||||||
|
|
||||||
|
@ -895,6 +902,9 @@ nginx.ingress.kubernetes.io/modsecurity-snippet: |
|
||||||
Include /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf
|
Include /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf
|
||||||
```
|
```
|
||||||
|
|
||||||
|
!!! attention
|
||||||
|
Since version 1.9.0, `"modsecurity-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
|
||||||
|
|
||||||
### Backend Protocol
|
### Backend Protocol
|
||||||
|
|
||||||
Using `backend-protocol` annotations is possible to indicate how NGINX should communicate with the backend service. (Replaces `secure-backends` in older versions)
|
Using `backend-protocol` annotations is possible to indicate how NGINX should communicate with the backend service. (Replaces `secure-backends` in older versions)
|
||||||
|
@ -984,3 +994,6 @@ metadata:
|
||||||
proxy_pass 127.0.0.1:80;
|
proxy_pass 127.0.0.1:80;
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
!!! attention
|
||||||
|
Since version 1.9.0, `"stream-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
|
|
@ -263,7 +263,7 @@ Enables Ingress to parse and add *-snippet annotations/directives created by the
|
||||||
Warning: We recommend enabling this option only if you TRUST users with permission to create Ingress objects, as this
|
Warning: We recommend enabling this option only if you TRUST users with permission to create Ingress objects, as this
|
||||||
may allow a user to add restricted configurations to the final nginx.conf file
|
may allow a user to add restricted configurations to the final nginx.conf file
|
||||||
|
|
||||||
**This option will be defaulted to false in the next major release**
|
**This option is defaulted to false since v1.9.0**
|
||||||
|
|
||||||
## annotations-risk-level
|
## annotations-risk-level
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue