Skip to content
This repository was archived by the owner on Jul 11, 2023. It is now read-only.

ref: use binary flag to enable use of MeshRootCertificate #4871

Merged
merged 5 commits into from
Jul 5, 2022

Conversation

jaellio
Copy link
Contributor

@jaellio jaellio commented Jul 1, 2022

Description:

  • Uses a binary flag to enable the use of MeshRootCertificate.
  • Updates the MRC id to be the MRC name
  • Passes vault token secret reference options to the controller, injector, and bootstrap

Testing done:

  • CI
  • Demo
    • verified the ability to use a secret to store the vault token and set the osm.vault.secret.name and osm.vault.secret.key on install

Affected area:

Functional Area
Certificate Management [ x ]

Please answer the following questions with yes/no.

  1. Does this change contain code from or inspired by another project? no

    • Did you notify the maintainers and provide attribution?
  2. Is this a breaking change? no

  3. Has documentation corresponding to this change been updated in the osm-docs repo (if applicable)? docs: add vault token secret reference osm-docs#407

@@ -44,14 +44,16 @@ var getCA func(certificate.Issuer) (pem.RootCertificate, error) = func(i certifi
// NewCertificateManager returns a new certificate manager, with an MRC compat client.
// TODO(4713): Use an informer behind a feature flag.
func NewCertificateManager(ctx context.Context, kubeClient kubernetes.Interface, kubeConfig *rest.Config, cfg configurator.Configurator,
providerNamespace string, options Options, msgBroker *messaging.Broker, ic *informers.InformerCollection, checkInterval time.Duration) (*certificate.Manager, error) {
if err := options.Validate(); err != nil {
providerNamespace string, certOptions *CertProviderOptions, msgBroker *messaging.Broker, ic *informers.InformerCollection, checkInterval time.Duration) (*certificate.Manager, error) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: instead of fiddling with the options maybe have 2 functions:

NewCertificateManagerFromMRC (takes options as a param, along with informers)

NewLegacyCertificateManager`. (doesn't take options, no ctx, etc)

@codecov-commenter
Copy link

codecov-commenter commented Jul 1, 2022

Codecov Report

Merging #4871 (bbbc59d) into main (3bf989a) will decrease coverage by 0.06%.
The diff coverage is 58.42%.

@@            Coverage Diff             @@
##             main    #4871      +/-   ##
==========================================
- Coverage   68.78%   68.71%   -0.07%     
==========================================
  Files         220      220              
  Lines       15911    15908       -3     
==========================================
- Hits        10944    10931      -13     
- Misses       4915     4925      +10     
  Partials       52       52              
Flag Coverage Δ
unittests 68.71% <58.42%> (-0.07%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

Impacted Files Coverage Δ
pkg/certificate/fake_manager.go 67.69% <ø> (-1.43%) ⬇️
cmd/osm-bootstrap/osm-bootstrap.go 45.72% <12.50%> (-1.56%) ⬇️
cmd/osm-controller/osm-controller.go 15.41% <15.78%> (+0.50%) ⬆️
pkg/certificate/providers/config.go 81.36% <100.00%> (+2.13%) ⬆️
pkg/certificate/providers/options.go 100.00% <100.00%> (ø)
pkg/certificate/manager.go 76.70% <0.00%> (-0.81%) ⬇️
pkg/certificate/certificate.go 94.87% <0.00%> (ø)
... and 1 more

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 3bf989a...bbbc59d. Read the comment docs.

@jaellio jaellio force-pushed the revertMRCOnInstall branch from 5db50ff to bbbc59d Compare July 1, 2022 22:18
@jaellio jaellio marked this pull request as ready for review July 1, 2022 22:45
use MRC name for the issuer ID.

Signed-off-by: jaellio <[email protected]>
@jaellio jaellio force-pushed the revertMRCOnInstall branch from bbbc59d to 96df713 Compare July 5, 2022 13:41
@jaellio jaellio force-pushed the revertMRCOnInstall branch from 51aab9a to 6afb77d Compare July 5, 2022 15:01
Copy link
Contributor

@keithmattix keithmattix left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM pending CI

@jaellio jaellio force-pushed the revertMRCOnInstall branch 4 times, most recently from da93696 to 9227ca9 Compare July 5, 2022 16:32
requirements to helm template

Signed-off-by: jaellio <[email protected]>
@jaellio jaellio force-pushed the revertMRCOnInstall branch from 9227ca9 to d5b6645 Compare July 5, 2022 16:52
Copy link
Member

@shashankram shashankram left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good overall, other than the comment I left.

Comment on lines 170 to 173
# -- Experimental values. Behavior is not supported.
experimental:
# -- Enable the MeshRootCertificate to configure the OSM certificate provider.
enableMeshRootCertificate: false
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd rather have this as a part of the featureFlags spec, which is the way we have been exposing experimental features.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That makes sense to me. Should the flag be added to the MeshConfig?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Only if you want it to be dynamically (post pod startup) configurable.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i'd vote no on that

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I originally hesitated to add it as a part of the featureFlag spec since I thought all values in that spec supported dynamic configuration. I've added enableMeshRootCertificate to the featureFlag spec and did not include it in the MeshConfig

}
return vaultClient, id, nil

return vaultClient, mrc.Name, nil
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At this point, i would change the func signature to (issuer, error), and let the manager set the ID on it's own

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated the signature to no longer return the issuer id.

- Allows manager to set issuer ID
- Removes unnecessary newline

Signed-off-by: jaellio <[email protected]>
@jaellio jaellio force-pushed the revertMRCOnInstall branch from 8323bfb to b5855b0 Compare July 5, 2022 20:03
@jaellio jaellio mentioned this pull request Jul 5, 2022
@jaellio jaellio merged commit aa1abf1 into openservicemesh:main Jul 5, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants