-
Notifications
You must be signed in to change notification settings - Fork 245
SDN-5342: Signer username validation #2560
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SDN-5342: Signer username validation #2560
Conversation
@pperiyasamy: This pull request references SDN-5342 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
326b533
to
868580a
Compare
/retest |
868580a
to
123242b
Compare
/retest |
/assign @martinkennelly |
/testwith openshift/cluster-network-operator/master/e2e-aws-ovn-ipsec-upgrade openshift/machine-config-operator#4854 |
pre-merge tested it, sent CSR manually via kubectl for signing, CNO rejected that CSR which was expected.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is there a e2e test somewhere to validate this code works for ipsec?
Looks good to me - nice PR! I like switching to ocp crypto lib too! Was there a reason you switched in this PR?
Signed-off-by: Periyasamy Palanisamy <[email protected]>
Signed-off-by: Periyasamy Palanisamy <[email protected]>
Signed-off-by: Periyasamy Palanisamy <[email protected]>
Signed-off-by: Periyasamy Palanisamy <[email protected]>
123242b
to
c88f5d8
Compare
This is being tested in the ipsec install CI lanes while configuring IPsec in the ipsec init container here, so i think we may not need an e2e test specifically for this.
This is just to reuse |
/retest-required |
@pperiyasamy How can i validate this works in the CI? link? |
@pperiyasamy can you point me to the jobs that execute it? e2e-ovn-ipsec-step-registry && e2e-metal-ipi-ovn-ipv6-ipsec ? And post install, can you point me to the origin tests ? I want to educate myself. |
@martinkennelly currently these jobs only verifies the ipsec deployment and runs regular e2e test suite but doesn't run ipsec specific tests. IPsec tests are run with CI lane introduced with this PR openshift/release#61740. |
ack - do you think its valuable to at least do a run-with command to the bot in-order to test that PR with this? |
Peri, the e2e test suite thats run for the current ip sec jobs would verify this PR is working because intra node traffic wouldnt work if this PR failed right? |
yes @martinkennelly , this particular PR change is already validated in e2e-ovn-ipsec-step-registry job, otherwise ipsec pods would have crashed.
|
/lgtm |
/retest |
/retest-required |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: martinkennelly, pperiyasamy, trozet The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@pperiyasamy this is a step in the right direction, but I don't think it encompasses everything we need for SDN-5342. In that JIRA it talks about including the kubelet certificate in the CSR so that we can then compare the can confirm the identity, rather than just someone sending us a valid node name. |
/retest-required |
/retest-required |
/retest-required |
@pperiyasamy: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/retest-required |
a1283bf
into
openshift:master
[ART PR BUILD NOTIFIER] Distgit: cluster-network-operator |
In CNO we have an approver that signs certs automatically, without checking any identity information, so this PR enhances the signer to check on CSR's user name that is populated by API server upon receiving CSR request from the nodes. So it's sufficient to verify the user name before signing the CSR.
It also adds required unit tests to test signer controller, it needed to change from using
kubernetes.Clientset
tocnoclient.Client
for accessing CSR's UpdateApproval API. This needs to be tested on OCP cluster.cc @kyrtapz @trozet @jcaamano