Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Citadel can no longer run in a single namespace in 1.3.0 due to listing of namespaces #17309

Closed
eoftedal opened this issue Sep 23, 2019 · 3 comments
Assignees

Comments

@eoftedal
Copy link

Bug description
In 1.3.0 running Citadel in a specific namespace without cluster wide roles no longer works.

istio.io/istio/security/pkg/k8s/controller/workloadsecret.go:231: Failed to list *v1.Namespace: namespaces is forbidden: User \"system:serviceaccount:my-namespace:istio-citadel-service-account\" cannot list namespaces at the cluster scope: no RBAC policy matched

It seems to try to list namespaces cluster wide, even though it was started with --listened-namespaces=

Affected product area (please put an X in all that apply)

[ ] Configuration Infrastructure
[ ] Docs
[x] Installation
[ ] Networking
[ ] Performance and Scalability
[ ] Policies and Telemetry
[ ] Security
[ ] Test and Release
[ ] User Experience
[ ] Developer Infrastructure

Expected behavior
Tested with 1.2.5 an 1.2.6, where Citadel works as expected. This seems to be a breaking change from 1.2.6 to 1.3.0.

Steps to reproduce the bug
Setup the policies for istio citadel to only be Roles in a namespace (my-namespace) instead of ClusterRoles. Start Citadel with --listened-namespaces=my-namespace.

Version (include the output of istioctl version --remote and kubectl version)
1.3.0 of istio

How was Istio installed?
Only Citadel was installed. The sample yaml files were modified to use Roles instead of ClusterRole in order to only run citadel in a single namespace.

Environment where bug was observed (cloud vendor, OS, etc)
Openshift

@howardjohn
Copy link
Member

howardjohn commented Oct 1, 2019

Root cause is #15503, from some comments there looks like this is intended replaces listened namespaces long term?

@incfly
Copy link

incfly commented Oct 1, 2019 via email

@incfly
Copy link

incfly commented Mar 20, 2020

Closing as above

@incfly incfly closed this as completed Mar 20, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants