-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Enhancement]: Enable root password configuration at startup #33058
Comments
The suggestion from @timheuer would also reduce the frequency of questions like issues/33495. |
put password in config or file seems to be a very dangerous behaviour. |
A few other db providers do this. Environment variables over file-based configs |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Any chance of considering a design here? |
Is the Milvus docker container supposed to be used in a production environment? If so, what are the best practices for locking it down so only authorized apps can make requests? |
The docs only seem to hint at 'change the password' as a solution, but this isn't ideal either versus having a config-based setup that is not a globally-known default. We'd prefer a design consistent with other container runtimes/apps that follow patterns where an ENV variable can be set with a password that upon startup the container knows to use that instead of a default, if set. Something like |
@timheuer I thought we just need to change a little bit code here the default username password is a constant at we need to change it to component_param.go as a config similar to AuthorizationEnabled anyone want to take this feature? |
@xiaofan-luan Not a Go developer so the repo is not entirely intuitive to me and I've had onramp issues already with the devcontainer, but with your pointers, is it as simple as this? (of course no tests changed)? Is anyone on core team able to make the change to ensure better security for the container? |
@SimFG could you have on this? |
@timheuer I looked at your commit and it basically meets the requirements. I will modify it slightly and submit a PR. |
You are quick! |
- issue: #33058 Signed-off-by: SimFG <[email protected]>
Amazing thank you @xiaofan-luan and @SimFG! How long from a merge to when it shows up in a docker image we can start consuming. And I assume the pattern to follow of setting an env to |
@timheuer The PR has been merged into the master branch, and will be picked to the 2.4 branch today. What version of milvus are you using now? If you want to include this PR, you can only use the latest master dev image. |
default root password - issue: #33058 - pr: #34752 set log level - issue: #34756 - pr: #34757 --------- Signed-off-by: SimFG <[email protected]>
Thanks @SimFG I confirmed functionality with |
@timheuer We should release version 2.4.7 next week, which will have this improvement |
Thanks @SimFG! Can you help me understand your docker tagging though? 2.4-latest I would have assumed is the same as at least v2.4.6, but the hashes are different (and release date of 2.4-latest is a week older than v2.4.6) |
@SimFG |
@timheuer 2.4-latest is expected to be the dev image of the latest 2.4 branch, but due to some problems with the internal pipeline, there may be some problems with the update. Version 2.4.6 is our official version for the public |
Thanks for update @SimFG -- you mentioned that |
@timheuer no, the |
Thanks @SimFG it sounds like if we want to snap to validated images we'll have to use |
Thanks @SimFG I'll await the 2.4.7 official image to make our product change. I'd ask that you may reconsider container tagging here. By definition it would seem odd that |
@timheuer I quite agree with your view. @xiaofan-luan what do you think? |
For milvus, every 2.4-branch/2.3-brnch is ready to production. but we recommend to use release tag in production because for each of the release QA team will run a full regression and we don't have guarantee on branches. Generally speaking, we conurrently maintain multiple developing branch and only tags is the actaul release version. As you said, 2.4 branch is 2.4-dev-latest actually |
So @xiaofan-luan if I understand you correctly, there is not a 'release' docker image that is semver-compliant. You can't grap a release |
Exactly. The 2.4 branch functions as the development branch for 2.4. We continuously merge bug fixes and small features into this branch. Once we believe it has reached a stable state and includes all intended features, the maintainer team will create a 2.x.y tag. This tagged version will then be released using all the deployment methods. Mean time, master works as the dev branch of 2.5. Once 2.5.0 released, master moved to 2.6 latest dev and 2.5 branch becomes active maintained branch. We maintain 3 different branch at the same: |
Thank you for the explanation @xiaofan-luan. I think I'm mostly concerned about the tagged Docker images on Docker Hub and not about the branching strategy. I know that it would appear they are tied 1:1, but as a consumer of the Docker images, I'm not concerned myself with source-branch strategy. My main feedback is there is a tagged Docker image that is called I now understand your method as of now though and will NOT use |
2.4 latest is the daily build image that mainly for test purpose and user who need instant fix |
I understand now @xiaofan-luan I just disagree with the tagging strategy based on how others in the Docker ecosystem do it. Per this strategy there is no production image that is major.minor I can rely on and continue to get production updates. I had incorrectly assumed that Using RabbitMQ (https://hub.docker.com/_/rabbitmq/tags?page=&page_size=&ordering=&name=3.13) as another example, I'll await the official |
@timheuer, |
Nice. Verified it works for me. @SimFG seems good to close this I think then. |
On initial startup, the environment variable |
you can use modify password to update root password |
I only found a way to modify it through the RPC interface, and now there is no way to modify it through the command line? client.update_password(
user_name='user_1',
old_password='P@ssw0rd',
new_password='P@ssw0rd123'
) Expect to have a command-line tool, like 'delete user`: update user ... I commited an issue in the CLI repository,zilliztech/milvus_cli#87 |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Is there an existing issue for this?
What would you like to be added?
When using standalone, it would be helpful to set the root password to something other than default using an environment value and/or config. like MILVUS_ROOT_PASSWORD. This would enable the standalone container to start in a more secure manner and configurable, rather than having to start a Milvus instance, then have a separate client use the default admin password, and update itself. Saving a step.
Why is this needed?
The default password for root is well documented. Not having a way to change this in config for startup of the standalone leaves an opening for even authenticated commands to just guess at the default (it's the equivalent of admin/admin). Other containers I've worked with enable setting the root password as a configurable aspect in environment variables so that it is secure at startup.
Anything else?
No response
The text was updated successfully, but these errors were encountered: