-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
flux exec --jobid doesn't work for job owner in system instance #6548
Comments
@grondo mentioned munge as an idea for enhancing message credentials in this case. I wonder if we could amend the subprocess protocol to allow a signing method from flux-security to be used on the |
Another use case for a signing method in libsubprocess would be to allow sysadmins to use I'm not sure if the same signing method could be used for the |
I can't think of why not if we stick with If not configured |
Well, I hadn't thought very far on this one, only that the IMP is a separate process while the job shell subprocess server implements the exec protocol directly. If we have some way for the IMP to extract the signature when it is invoked by libsubprocess that would be sufficient, but I'm having trouble at the moment envisioning how that would actually happen. (It differs from the job execution case where the IMP extracts J with the signature from the KVS out of band) Edit: Thinking about it for one second longer, this would require an extension on the subprocess server side to invoke the IMP and pass the credential via a new protocol between invoker and IMP. Therefore, once the credential is available, we could open a separate issue to add a new subcommand to the IMP to accept this mode of invoking a command with a uid transition. |
Ah right, I didn't think that through either! That makes perfect sense to me. |
Problem: intuitively you'd expect
flux exec --jobid ID
to work in the system instance when the invoking user is the same as the job owner of ID, but it does not.The reason is noted in the code:
The method used to check if the instance is to be trusted is
Discussion began in
The text was updated successfully, but these errors were encountered: