This example demonstrates a simple application that is using Universal Workload Identity with Tornjak and SPIRE to manage credentials stored securely in Vault. There are two, independent web applications:
Access to this DB instance is never provided to the sample applications during
the application deployment, but instead,
it is dynamically obtained from the secure Vault by the sidecar
, based on
the application (workload) identity verified by OIDC.
This document describes the following steps:
- Building the demo application
- Setting up Tornjak/SPIRE environment
- Setting up Vault instance with OIDC enablement
- Pushing the DB credentials to Vault
- Configuring and deploying the sample application
- Validating the application(
- Cleanup
This step is optional. You don't need to build your own images. Instead, you can use the images publically available, stored in Docker Hub tsidentity organization.
To build your own images, You can change it to your own image repositity in Makefile
To build and push the images to the repository:
make all
You can also build individual components e.g.
make bin/python
make container-python
This demo example can be running on any Kubernetes platform (Kind, Minikube, OpenShift, IBM Cloud, AWS EKS, Azure etc.)
Install the Tornjak/SPIRE environment with OIDC Discovery for your platform, as specified in our tutorial
Setup Tornjak with OIDC and Vault instance, by following the tutorial.
Create a vault instance per instructions here.
Once Vault instance is up, setup the following environment variables:
- OIDC_URL
- ROOT_TOKEN
- VAULT_ADDR
Then run the config/vault-oidc.sh script.
This script will setup the permissions for accessing the secrets.
To change the policy role requirements, update the sub
in bound_claims
:
"bound_claims": {
"sub":"spiffe://openshift.space-x.com/region/*/cluster_name/*/ns/*/sa/*/pod_name/apps-*"
},
For example to restrict the access to US regions, and my-app-sa ServiceAccount
you can do a following:
"bound_claims": {
"sub":"spiffe://openshift.space-x.com/region/us-*/cluster_name/*/ns/*/sa/my-app-sa/pod_name/apps-*"
},
Now we can push our secret files to Vault. For this example we will be using two files:
- config.json
- config.ini
Where the userid and password must match the DB values used in our sample configuration config/db-node.yaml
where, for example, we can have config.json:
{
"host" : "db",
"port" : "3306",
"user" : "root",
"password" : "testroot",
"database" : "testdb",
"multipleStatements": true,
"debug": false
}
Insert it into Vault as keys:
vault kv put secret/db-config/config.json @config.json
# retrieve it to test:Β
vault kv get -format=json secret/db-config/config.json
The second file needed is config.ini:
[mysql]
host=db
port=3306
db=testdb
user=root
passwd=testroot
Since this file is not in JSON format, we can use a trick to encode it and store its encoded value as a key:
SHA64=$(openssl base64 -in config.ini )
vault kv put secret/db-config/config.ini sha="$SHA64"
# then to retrieve it:
vault kv get -field=sha secret/db-config/config.ini | openssl base64 -d
First we need to deploy the MySQL database for storing the entries used by
py
and node
applications.
Deploy DB service:
kubectl apply -f config/db-node.yaml
Before we run an application, we have to provide the Vault in the deployment file config/apps.yaml and update the value for VAULT_ADDR environment variable to correspond with the VAULT_ADDR used above.
In addition we can run a specific script to help with the resources retrieval:
config/apps.yaml
bash
spec:
...
template:
...
spec:
initContainers:
- name: sidecar
command: ["/usr/local/bin/run-sidecar-alt.sh", "/path/to/inputfile"]
...
python
spec:
...
template:
...
spec:
initContainers:
- name: sidecar
command: ["python3", "/usr/local/bin/sidecar-script-alt.py", "/path/to/inputfile"]
...
In a similar way we can create a ConfigMap that would help us with the inputfile
:
---
apiVersion: v1
kind: ConfigMap
metadata:
name: path-to-inputfile
data:
inputfile.txt: |
db-config/config.ini
db-config/config.json
Start the deployment:
kubectl -n default create -f config/apps.yaml
When deployed, the sidecar
containerInit would run first, obtain the JWT token with
SPIFFE ID and pass it to Vault with a request to get the secure files.
Once the files are received, they are mounted to common directory available to
other containers in the pod, and the sidecar
container exits.
Then, node
and py
start, and they can use these securely stored and transmitted files.
Deploy Node App service
kubectl apply -f config/app-node.yaml
Deploy Pyton App service
kubectl apply -f config/app-python.yaml
Now we need to access the applications. This process depends on the underlining platform. Here we provide examples for Minikube, Kind and OpenShift in IBM Cloud. Check with your service provider how to access the running containers via services.
Click to view Minikube steps
Execute the following command to get the URL of the Node App:
minikube service app-node -n default --url
We should see:
π Starting tunnel for service app-node.
|-----------|----------|-------------|------------------------|
| NAMESPACE | NAME | TARGET PORT | URL |
|-----------|----------|-------------|------------------------|
| default | app-node | | http://127.0.0.1:59980 |
|-----------|----------|-------------|------------------------|
http://127.0.0.1:59980
β Because you are using a Docker driver on darwin, the terminal needs to be open to run it.
Execute the following command to get the URL of the Python App:
minikube service app-py -n default --url
We should see:
π Starting tunnel for service app-py.
|-----------|--------|-------------|------------------------|
| NAMESPACE | NAME | TARGET PORT | URL |
|-----------|--------|-------------|------------------------|
| default | app-py | | http://127.0.0.1:60042 |
|-----------|--------|-------------|------------------------|
http://127.0.0.1:60042
β Because you are using a Docker driver on darwin, the terminal needs to be open to run it.
Click to view Kind steps
--- ** TODO: These need to be updated ** --- On kind, we can use port-forwarding to get HTTP access to applications:kubectl -n default port-forward spire-server-0 10000:10000
Forwarding from 127.0.0.1:10000 -> 10000 Forwarding from [::1]:10000 -> 10000
Now you can test the connection to Tornjak server by going to http://127.0.0.1:10000 in your local browser.
Click to view OpenShift steps
First obtain the ingress name using ibmcloud cli:
$ # first obtain the cluster name:
$ ibmcloud ks clusters
$ # then use the cluster name to get the Ingress info:
$ ibmcloud ks cluster get --cluster <cluster_name> | grep Ingress
Ingress Subdomain: space-x04-9d995xxx4-0000.eu-de.containers.appdomain.cloud
Ingress Secret: space-x04-9d995xxx4-0000
Ingress Status: healthy
Ingress Message: All Ingress components are healthy
Build an ingress file, using the Ingress Subdomain information obtained above. Use any arbitrary prefix to distinguish the applications. For example:
host: tsi-vault.my-tsi-cluster-9d995c4a8c7c5f281ce13xxxxxxxxxxx-0000.eu-de.containers.appdomain.cloud
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: apps-ingress
namespace: default
spec:
rules:
- host: py.space-x04-9d995xxx4-0000.eu-de.containers.appdomain.cloud
http:
paths:
- pathType: Prefix
path: "/"
backend:
service:
name: apps
port:
number: 8000
- host: node.space-x04-9d995xxx4-0000.eu-de.containers.appdomain.cloud
http:
paths:
- pathType: Prefix
path: "/"
backend:
service:
name: apps
port:
number: 8001
Then access the service using the provided host values:
Remove minikube instance
minikube delete