[openstack-dev] Implications of switching to entry points for scheduler filtering/weighing
Sandy Walsh
sandy.walsh at rackspace.com
Thu Jan 3 16:57:02 UTC 2013
On 01/03/2013 12:39 PM, Doug Hellmann wrote:
>
>
> On Thu, Jan 3, 2013 at 11:28 AM, Mark McLoughlin <markmc at redhat.com
> <mailto:markmc at redhat.com>> wrote:
>
> On Thu, 2013-01-03 at 10:51 -0400, Sandy Walsh wrote:
> >
> > Yep, having the shared filters/weighers sounds cool.
> >
> > Is there a security concern about using the entry-point mechanism for
> > allowing untrusted code access to the rich scheduler data (host &
> > request info)?
> >
> > For example, someone installs a sneaky python package on a scheduler
> > node that has an entry-point that the scheduler uses. We wouldn't want
> > that to suddenly being included in the filter chain.
> >
> > The old filter driver mechanism, while clunky, was at least
> explicit. Or
> > am I missing something here?
>
> Sure, it's very important that unprivileged users can't make the
> scheduler (or any other service) load untrusted code.
>
> However, in a sanely configured system, only root or the user which the
> scheduler is running as can register an entry point. You basically need
> to be able to install a python egg in the scheduler's python path.
>
>
> If the plugins are enabled explicitly through a config file, it is also
> possible to avoid loading extra modules just because they are
> discovered. Scanning the list of registered entry points doesn't require
> loading their code.
Thanks Doug, that's what I was looking for. Hopefully that's the default
behaviour? It would be pretty easy to trick trick someone to install a
"utility" python library.
More information about the OpenStack-dev
mailing list