Skip to content

Commit

Permalink
Merge pull request #1445 from rancher/release/v2.9
Browse files Browse the repository at this point in the history
Merge release/v2.9 into main
  • Loading branch information
btat authored Aug 26, 2024
2 parents dadc85b + 04d9969 commit 07741df
Show file tree
Hide file tree
Showing 12 changed files with 67 additions and 7 deletions.
3 changes: 2 additions & 1 deletion docs/faq/deprecated-features.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,8 @@ Rancher will publish deprecated features as part of the [release notes](https://

| Patch Version | Release Date |
|---------------|---------------|
| [2.9.0](https://github.com/rancher/rancher/releases/tag/v2.9.0) | July 31, 2024 |
| [2.9.1](https://github.com/rancher/rancher/releases/tag/v2.9.1) | Aug 26, 2024 |
| [2.9.0](https://github.com/rancher/rancher/releases/tag/v2.9.0) | Jul 31, 2024 |

### What can I expect when a feature is marked for deprecation?

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,8 @@ In order to deploy and run the adapter successfully, you need to ensure its vers

| Rancher Version | Adapter Version |
|-----------------|:----------------:|
| v2.9.0 | v104.0.0+up4.0.0 |
| v2.9.1 | v104.0.0+up4.0.0 |
| v2.9.0 | v104.0.0+up4.0.0 |

### 1. Gain Access to the Local Cluster

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -89,6 +89,12 @@ We recommend exporting the kubeconfig file so that if Rancher goes down, you can

## Impersonation

:::caution Known Issue

Service account impersonation (`--as`) used by lower privileged user accounts to remove privileges is not implemented and is a [feature](https://github.com/rancher/rancher/issues/41988) being tracked.

:::

Users technically exist only on the upstream cluster. Rancher creates [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) that refer to Rancher users, even though there is [no actual User resource](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#users-in-kubernetes) on the downstream cluster.

When users interact with a downstream cluster through the authentication proxy, there needs to be some entity downstream to serve as the actor for those requests. Rancher creates service accounts to be that entity. Each service account is only granted one permission, which is to **impersonate** the user they belong to. If there was only one service account that could impersonate any user, then it would be possible for a malicious user to corrupt that account and escalate their privileges by impersonating another user. This issue was the basis for a [CVE](https://github.com/rancher/rancher/security/advisories/GHSA-pvxj-25m6-7vqr).
Expand Down
1 change: 1 addition & 0 deletions docs/reference-guides/rancher-webhook.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ Each Rancher version is designed to be compatible with a single version of the w

| Rancher Version | Webhook Version | Availability in Prime | Availability in Community |
|-----------------|-----------------|-----------------------|---------------------------|
| v2.9.1 | v0.5.1 | ✓ | ✓ |
| v2.9.0 | v0.5.0 | ✗ | ✓ |

## Why Do We Need It?
Expand Down
30 changes: 27 additions & 3 deletions src/pages/versions.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,12 +18,12 @@ Here you can find links to supporting documentation for the current released ver
<th>Community</th>
</tr>
<tr>
<td><b>v2.9.0</b></td>
<td><b>v2.9.1</b></td>
<td><a href="https://ranchermanager.docs.rancher.com/v2.9">Documentation</a></td>
<td><a href="https://github.com/rancher/rancher/releases/tag/v2.9.0">Release Notes</a></td>
<td><center>N/A</center></td>
<td><a href="https://github.com/rancher/rancher/releases/tag/v2.9.1">Release Notes</a></td>
<td><center>N/A</center></td>
<td><center>&#10003;</center></td>
<td><center>&#10003;</center></td>
</tr>
</table>

Expand Down Expand Up @@ -88,6 +88,30 @@ Here you can find links to supporting documentation for the current released ver

### Past Versions

Here you can find links to supporting documentation for previous versions of Rancher v2.9, and their availability for [Rancher Prime](/v2.9/getting-started/quick-start-guides/deploy-rancher-manager/prime) and the Community version of Rancher:

<table>
<tr>
<th>Version</th>
<th>Documentation</th>
<th>Release Notes</th>
<th>Support Matrix</th>
<th>Prime</th>
<th>Community</th>
</tr>

<tr>
<td><b>v2.9.0</b></td>
<td><a href="https://ranchermanager.docs.rancher.com/v2.9">Documentation</a></td>
<td><a href="https://github.com/rancher/rancher/releases/tag/v2.9.0">Release Notes</a></td>
<td><center>N/A</center></td>
<td><center>N/A</center></td>
<td><center>&#10003;</center></td>
</tr>
<tr>
</tr>
</table>

Here you can find links to supporting documentation for previous versions of Rancher v2.8, and their availability for [Rancher Prime](/v2.8/getting-started/quick-start-guides/deploy-rancher-manager/prime) and the Community version of Rancher:

<table>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,12 @@ You will need to use a context defined in this kubeconfig file to access the clu

## Impersonation

:::caution Known Issue

Service account impersonation (`--as`) used by lower privileged user accounts to remove privileges is not implemented and is a [feature](https://github.com/rancher/rancher/issues/41988) being tracked.

:::

Users technically exist only on the upstream cluster. Rancher creates [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) that refer to Rancher users, even though there is [no actual User resource](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#users-in-kubernetes) on the downstream cluster.

When users interact with a downstream cluster through the authentication proxy, there needs to be some entity downstream to serve as the actor for those requests. Rancher creates service accounts to be that entity. Each service account is only granted one permission, which is to **impersonate** the user they belong to. If there was only one service account that could impersonate any user, then it would be possible for a malicious user to corrupt that account and escalate their privileges by impersonating another user. This issue was the basis for a [CVE](https://github.com/rancher/rancher/security/advisories/GHSA-pvxj-25m6-7vqr).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -81,6 +81,12 @@ You will need to use a context defined in this kubeconfig file to access the clu

## Impersonation

:::caution Known Issue

Service account impersonation (`--as`) used by lower privileged user accounts to remove privileges is not implemented and is a [feature](https://github.com/rancher/rancher/issues/41988) being tracked.

:::

Users technically exist only on the upstream cluster. Rancher creates [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) that refer to Rancher users, even though there is [no actual User resource](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#users-in-kubernetes) on the downstream cluster.

When users interact with a downstream cluster through the authentication proxy, there needs to be some entity downstream to serve as the actor for those requests. Rancher creates service accounts to be that entity. Each service account is only granted one permission, which is to **impersonate** the user they belong to. If there was only one service account that could impersonate any user, then it would be possible for a malicious user to corrupt that account and escalate their privileges by impersonating another user. This issue was the basis for a [CVE](https://github.com/rancher/rancher/security/advisories/GHSA-pvxj-25m6-7vqr).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,12 @@ We recommend exporting the kubeconfig file so that if Rancher goes down, you can

## Impersonation

:::caution Known Issue

Service account impersonation (`--as`) used by lower privileged user accounts to remove privileges is not implemented and is a [feature](https://github.com/rancher/rancher/issues/41988) being tracked.

:::

Users technically exist only on the upstream cluster. Rancher creates [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) that refer to Rancher users, even though there is [no actual User resource](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#users-in-kubernetes) on the downstream cluster.

When users interact with a downstream cluster through the authentication proxy, there needs to be some entity downstream to serve as the actor for those requests. Rancher creates service accounts to be that entity. Each service account is only granted one permission, which is to **impersonate** the user they belong to. If there was only one service account that could impersonate any user, then it would be possible for a malicious user to corrupt that account and escalate their privileges by impersonating another user. This issue was the basis for a [CVE](https://github.com/rancher/rancher/security/advisories/GHSA-pvxj-25m6-7vqr).
Expand Down
3 changes: 2 additions & 1 deletion versioned_docs/version-2.9/faq/deprecated-features.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,8 @@ Rancher will publish deprecated features as part of the [release notes](https://

| Patch Version | Release Date |
|---------------|---------------|
| [2.9.0](https://github.com/rancher/rancher/releases/tag/v2.9.0) | July 31, 2024 |
| [2.9.1](https://github.com/rancher/rancher/releases/tag/v2.9.1) | Aug 26, 2024 |
| [2.9.0](https://github.com/rancher/rancher/releases/tag/v2.9.0) | Jul 31, 2024 |

### What can I expect when a feature is marked for deprecation?

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,8 @@ In order to deploy and run the adapter successfully, you need to ensure its vers

| Rancher Version | Adapter Version |
|-----------------|:----------------:|
| v2.9.0 | v104.0.0+up4.0.0 |
| v2.9.1 | v104.0.0+up4.0.0 |
| v2.9.0 | v104.0.0+up4.0.0 |

### 1. Gain Access to the Local Cluster

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -89,6 +89,12 @@ We recommend exporting the kubeconfig file so that if Rancher goes down, you can

## Impersonation

:::caution Known Issue

Service account impersonation (`--as`) used by lower privileged user accounts to remove privileges is not implemented and is a [feature](https://github.com/rancher/rancher/issues/41988) being tracked.

:::

Users technically exist only on the upstream cluster. Rancher creates [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) that refer to Rancher users, even though there is [no actual User resource](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#users-in-kubernetes) on the downstream cluster.

When users interact with a downstream cluster through the authentication proxy, there needs to be some entity downstream to serve as the actor for those requests. Rancher creates service accounts to be that entity. Each service account is only granted one permission, which is to **impersonate** the user they belong to. If there was only one service account that could impersonate any user, then it would be possible for a malicious user to corrupt that account and escalate their privileges by impersonating another user. This issue was the basis for a [CVE](https://github.com/rancher/rancher/security/advisories/GHSA-pvxj-25m6-7vqr).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ Each Rancher version is designed to be compatible with a single version of the w

| Rancher Version | Webhook Version | Availability in Prime | Availability in Community |
|-----------------|-----------------|-----------------------|---------------------------|
| v2.9.1 | v0.5.1 | &check; | &check; |
| v2.9.0 | v0.5.0 | &cross; | &check; |

## Why Do We Need It?
Expand Down

0 comments on commit 07741df

Please sign in to comment.