-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OIDC: Tolerate extra service-account key set items #14175
OIDC: Tolerate extra service-account key set items #14175
Conversation
When reading the kOps "service-account" key set in preparation for publishing the OIDC JWKS file (such as to S3 alongside the discovery document), in some cases the set contains items that either lack an X.509 certificate or contain such a certificate issued for a subject with common name other than "service-account." Ignore these extra key set items and instead only project JWKS keys for those with an X.509 certificate with the expected subject common name.
/cc @olemarkus |
/lgtm |
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This test looks sane, but I wonder if you can still end up in issues elsewhere. Especially if certificate rotation works.
I would assume that kops get keypairs
still fails as well, so this wouldn't be a full fix of #14174.
This would at least unblock deployment and it can be iterated later. |
Yeah. I just wanted to unlink the issue so it doesn't get closed. /approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: olemarkus The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Yes, that's true. I didn't realize that kops get keypairs fails until after I had proposed this fix for the failure in kops update cluster, and I neglected to change the "Fixes" comment. I expect that there are several more places that read key pairs that will need similar treatment. |
…-upstream-release-1.24 Automated cherry pick of #14175: OIDC: Tolerate extra service-account key set items
Please see #14370 for making kops get keypairs more tolerant as well. |
When reading the kOps "service-account" key set in preparation for publishing the OIDC JWKS file (such as to S3 alongside the discovery document), in some cases the set contains items that either lack an X.509 certificate or contain such a certificate issued for a subject with common name other than "service-account." Ignore these extra key set items and instead only project JWKS keys for those with an X.509
certificate with the expected subject common name.
Refs: #14174