Replies: 2 comments 4 replies
-
Hi @spunkedy, thanks for the insightful issue. As a general guidance, we consider Livebook to be single user. The way runtimes execute mean we can’t really provide any kind of safety for multiple users in the same Livebook. So any feature within that scope wouldn’t be considered. I assume the app deployment bits are solved with the new deployment feature and we will have more news on this soon. Regarding docker images, the musl compiler from alpine is generally an issue. We could try ubi, so something exploring that is welcome, but remember that it is ultimately a dev environment (or at the very least a compilation environment), so we need a more fully featured OS environment. We will probably not going the OIDC route, but we may support zero trust auth and reading headers from Google IAP and similar for identity claims (so you would need to put auth in the front). I am not sure if there is a canonical solution here (perhaps joken) but exploration in this direction is very welcome! |
Beta Was this translation helpful? Give feedback.
-
Updates: we have initial support for identity providers here: https://github.com/livebook-dev/livebook/tree/main/lib/livebook/zta Cloudflare currently supported with Google IAP currently as a WIP. See the README on how to setup it. Pull requests for other providers (such as AWS Identity) are welcome. |
Beta Was this translation helpful? Give feedback.
-
I just got permission to be able to contribute to this project.
I have fallen in love with livebook, and have started encouraging it's use quite a bit at my work.
I am trying to use this in a high security environment. I am currently able to deploy this with helm behind cloudflare zerotrust with it auto loading the
LB_
secrets injected from vault.To make the security use case easy, these features would be great:
If any of these things are desirable for this project, I don't mind creating pull requests for the desired implementation.
Identity Claims
I was looking through the code base, and the user_plug
sub
/email
etcjoken
via an environment feature flag. We could pull the identity from the payload and have it be the source of identity enforcementAudit Trail
Something like:
App only execution role
Being able to have a set of people developing code books, and be able to deploy them via kino apps. Then only allow a certain group to be able to run this.
This doesn't have to be coupled to the identity portion, but could be. Having a reverse proxy in front of livebook we could allow for users that come in through the proxy to set a http header and feature flag being able to turn this feature on and off
OIDC service accounts
having aws secret key/id's can lead to being forced to rotate often. One of the nice ways around this is to push the identity chain as a part of the runtime.
This already works with :ex_aws_sts
if it's something we find interesting for the aws s3 integration I can investigate the complexity of being able to feature flag this for implicit trust.
Docker image lock downs
Having a hardened image / minimal image would be a plus for more restricted environments.
for example, at the time of writing this:
Going to something like ubi or even alpine would limit the vulnerability scope
including limiting the run user as well
summary
Let me know if any of these would be welcome discussions / contributions and I don't mind doing the work for these as they would benefit some of the work I would use them with.
Beta Was this translation helpful? Give feedback.
All reactions