-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Generate an ignition-auth key and provide it to the MCS
#1740
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This is an optional hardening for access to Ignition; the installer generates a random key (separately for master/worker pool) and installs it into the `openshift-machine-config-operator` namespace. If the MCS finds an `ignition-auth` secret with the `master/worker` keys, it will use it: openshift/machine-config-operator#736 This PR just generates those secrets, so we can land it before the MCO PR as well.
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: cgwalters If they are not already assigned, you can assign the PR to them by writing The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
|
||
| // Generate generates a new IgnitionAuth | ||
| func (a *IgnitionAuth) Generate(dep asset.Parents) error { | ||
| a.Master = utilrand.String(64) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just to double check, is there any need to utilrand.Seed before or between generations?
|
/hold We will evaluate this for 4.2 |
|
Unit failure: |
|
@cgwalters: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
I would love to see a overall design doc where this fits in. Otherwise this is no being actively worked on... Feel free to reopen. /close |
|
@abhinavdahiya: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Yep that's fine - see openshift/machine-config-operator#784 for a new approach that while not quite as strong, it also doesn't have the ergonomic hit for UPI scenarios that would be required with this PR. |
This is an optional hardening for access to Ignition; the installer
generates a random key (separately for master/worker pool) and installs
it into the
openshift-machine-config-operatornamespace. If the MCSfinds an
ignition-authsecret with themaster/workerkeys, it will use it:openshift/machine-config-operator#736
This PR just generates those secrets, so we can land it before the
MCO PR as well.