Skip to content

OS-capacity exporter should not be exposed#2219

Merged
oneswig merged 2 commits intostackhpc/2025.1from
os-capacity-binding
Mar 26, 2026
Merged

OS-capacity exporter should not be exposed#2219
oneswig merged 2 commits intostackhpc/2025.1from
os-capacity-binding

Conversation

@oneswig
Copy link
Copy Markdown
Member

@oneswig oneswig commented Mar 19, 2026

The os-capacity exporter has access to admin cloud credentials and provides details of current utilisation for all OpenStack tenancies. Currently this exporter binds to all interfaces on hosts where it is deployed, which may lead to leakage of potentially important data on an unauthenticated port.

Bind the exporter only to the Internal API network, from where it is usually scraped.

The os-capacity exporter has access to admin cloud credentials and
provides details of current utilisation for all OpenStack tenancies.
Currently this exporter binds to all interfaces on hosts where it
is deployed, which may lead to leakage of potentially important
data on an unauthenticated port.

Bind the exporter only to the Internal API network, from where it
is usually scraped.

Signed-off-by: Stig Telfer <stig@stackhpc.com>
@oneswig oneswig requested a review from a team as a code owner March 19, 2026 22:09
Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request correctly identifies a security risk with the os-capacity-exporter and aims to mitigate it by restricting the listen address. However, the implementation is likely to cause the service to fail because the port is missing from the listen address. I've added a specific comment with a suggested fix.

@oneswig oneswig merged commit 5c2428c into stackhpc/2025.1 Mar 26, 2026
21 of 22 checks passed
@oneswig oneswig deleted the os-capacity-binding branch March 26, 2026 16:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

good first issue Good for newcomers security Relates to security such as CVEs

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants