Skip to content

Conversation

@liggitt
Copy link
Contributor

@liggitt liggitt commented Mar 3, 2015

No description provided.

@liggitt
Copy link
Contributor Author

liggitt commented Mar 3, 2015

[test]

@liggitt
Copy link
Contributor Author

liggitt commented Mar 3, 2015

@pmorie can you take a look at the secrets usage to make sure I'm not doing anything insane. The interesting commit is the last one - the rest is the rebase and auth changes in other pulls I'm basing off of.

I'm decently satisfied with the registry/router/deployer setups for the moment.

The next step is to get a command that can turn a .kubeconfig or similar into a secret, for use with things like the Jenkins pod that need API credentials. The namespace defaulting would help a lot there, so our jenkins example could pre-set a volumemount and volume which referenced a secret named "jenkins-secret", and tell them to create such a secret in the namespace prior to creating the Jenkins pod.

@pmorie
Copy link
Contributor

pmorie commented Mar 3, 2015

@liggitt started taking a look tonight on my phone, need a real screen for
a diff this robust

On Mon, Mar 2, 2015 at 10:54 PM, Jordan Liggitt notifications@github.com
wrote:

@pmorie https://github.com/pmorie can you take a look at the secrets
usage to make sure I'm not doing anything insane. The interesting commit is
the last one - the rest is the rebase and auth changes in other pulls I'm
basing off of.

I'm decently satisfied with the registry/router/deployer setups for the
moment.

The next step is to get a command that can turn a .kubeconfig or similar
into a secret, for use with things like the Jenkins pod that need API
credentials. The namespace defaulting would help a lot there, so our
jenkins example could preset a volumemount and volume which referenced a
secret named "jenkins-secret", and tell them to create such a secret in the
namespace prior to creating the Jenkins pod.


Reply to this email directly or view it on GitHub
#1208 (comment).

@smarterclayton
Copy link
Contributor

Jeff added just such a command upstream yesterday (as a pull).

@liggitt
Copy link
Contributor Author

liggitt commented Mar 5, 2015

rebased

@liggitt liggitt changed the title WIP - Make router, registry, deployer use secrets Make router, registry, deployer use secrets Mar 5, 2015
@smarterclayton
Copy link
Contributor

Isn't this going to break as soon as we add service accounts?

@liggitt
Copy link
Contributor Author

liggitt commented Mar 9, 2015

yeah, started this before we talked through service account mapping to secrets

@smarterclayton
Copy link
Contributor

Up to you whether you want to land it now or hold it. If it substantially reduces confusion I'm all for doing it now.

----- Original Message -----

yeah, started this before we talked through service account mapping to
secrets


Reply to this email directly or view it on GitHub:
#1208 (comment)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: mount_path -> mountPath

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed

@pmorie
Copy link
Contributor

pmorie commented Mar 9, 2015

@smarterclayton @liggitt I don't think just service accounts would affect this - you would consume the secrets in the same way unless there was a LOAS daemon that decorated your requests to the master with auth. Am I missing something?

@liggitt
Copy link
Contributor Author

liggitt commented Mar 10, 2015

@pmorie we're talking about restricting a pod's access to a secret unless it is assigned a service account which also has access to the secret. double references aren't ideal, but we're having a hard time figuring out a different way to subdivide secret ACL within a namespace

@smarterclayton
Copy link
Contributor

If secret is the reference and service account is the check, then it's probably ok to put the volumes in now. I don't think the current setup will match the experience we want for end users (expose secret when it's added to the account).

On Mar 10, 2015, at 4:52 AM, Jordan Liggitt notifications@github.com wrote:

@pmorie we're talking about restricting a pod's access to a secret unless it is assigned a service account which also has access to the secret. double references aren't ideal, but we're having a hard time figuring out a different way to subdivide secret ACL within a namespace


Reply to this email directly or view it on GitHub.

@openshift-bot
Copy link
Contributor

continuous-integration/openshift-jenkins/test FAILURE (https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_openshift3/1792/)

@openshift-bot
Copy link
Contributor

Evaluated for origin up to bf8c15f

@openshift-bot
Copy link
Contributor

Origin Action Required: Pull request cannot be automatically merged, please rebase your branch from latest HEAD and push again

@liggitt
Copy link
Contributor Author

liggitt commented Jun 2, 2015

closing, will rework with service accounts

@liggitt liggitt closed this Jun 2, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants