Skip to content

add enable_sds_k8s_sa_jwt flag to meshconfig#729

Merged
istio-testing merged 3 commits intoistio:release-1.1from
quanjielin:quanlinjwt1211
Dec 11, 2018
Merged

add enable_sds_k8s_sa_jwt flag to meshconfig#729
istio-testing merged 3 commits intoistio:release-1.1from
quanjielin:quanlinjwt1211

Conversation

@quanjielin
Copy link
Copy Markdown
Contributor

istio/istio#9035

This flag is used by secret discovery service(SDS).
If set to true, envoy will fetch normal k8s service account JWT(this is fallback from k8s trustworthy jwt, which is only available for k8s 1.12 or higher) from '/var/run/secrets/kubernetes.io/serviceaccount/token'
(https://kubernetes.io/docs/tasks/access-application-cluster/access-cluster/#accessing-the-api-from-a-pod)and pass to sds server, which will be used to generate key/cert eventually.

This isn't supported for non-k8s case.

@googlebot googlebot added the cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA. label Dec 11, 2018
@quanjielin quanjielin changed the base branch from master to release-1.1 December 11, 2018 18:53
@quanjielin
Copy link
Copy Markdown
Contributor Author

/cc @wattli

@istio-testing
Copy link
Copy Markdown
Collaborator

@quanjielin: GitHub didn't allow me to request PR reviews from the following users: wattli.

Note that only istio members and repo collaborators can review this PR, and authors cannot review their own PRs.

Details

In response to this:

/cc @wattli

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@quanjielin
Copy link
Copy Markdown
Contributor Author

/assign @diemtvu for owner approval

@istio-testing
Copy link
Copy Markdown
Collaborator

@quanjielin: GitHub didn't allow me to assign the following users: for, owner, approval.

Note that only istio members and repo collaborators can be assigned.
For more information please see the contributor guide

Details

In response to this:

/assign @diemtvu for owner approval

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

// for k8s service account trustworthy JWT(which is avaialbe for k8s 1.12 or higher), so that K8s API server
// mounts k8s service account JWT to envoy container, which will be used to generate key/cert eventually.
// This isn't supported for non-k8s case.
bool enable_sds_token_mount = 23;
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are these 2 flags independent?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

rename and update comment based on offline chat, PTAL, thanks!

Copy link
Copy Markdown
Contributor

@diemtvu diemtvu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

// If set to true, envoy will fetch normal k8s service account JWT from '/var/run/secrets/kubernetes.io/serviceaccount/token'
// (https://kubernetes.io/docs/tasks/access-application-cluster/access-cluster/#accessing-the-api-from-a-pod)
// and pass to sds server, which will be used to request key/cert eventually.
// If both enable_sds_token_mount and sds_use_k8s_sa_jwt are set to true, enable_sds_token_mount(trustworthy jwt) takes precedence.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Or simply say this flag is ignored if enable_sds_token_mount is set.

@istio-testing
Copy link
Copy Markdown
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: diemtvu, quanjielin

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@istio-testing istio-testing merged commit b197843 into istio:release-1.1 Dec 11, 2018
@quanjielin quanjielin deleted the quanlinjwt1211 branch December 11, 2018 22:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants