Skip to content
This repository has been archived by the owner on Jul 11, 2023. It is now read-only.

certificates: Envoy xDS Certs should have a ServiceIdentity in the CN; not ServiceAccount #3186

Closed
Tracked by #3701
draychev opened this issue Apr 16, 2021 · 3 comments
Assignees
Labels
area/identity size/M 7 days (~1.5 week)
Milestone

Comments

@draychev
Copy link
Contributor

From a comment/proposal @shashankram made on #3170 (review):

*Directly retrieve the ServiceIdentity from the proxy XDS cert.

This issue is to treat the Envoi xDS certificate's CN as a ServiceIdentity, not specifically Kubernetes Service Account. In reality the xDS Cert CN would still be derived from a Kubernetes Service Account, but this is merely an implementation detail.

@draychev
Copy link
Contributor Author

draychev commented Apr 22, 2021

Another thought - we may need to create EndpointIdentity and have that be different that ServiceIdentity

So xDS certificate --> EndpointIdentity (or ProxyIdentity)
Service certificate --> ServiceIdentity

@shashankram
Copy link
Member

Another thought - we may need to create EndpointIdentity and have that be different that ServiceIdentity

So xDS certificate --> EndpointIdentity (or ProxyIdentity)
Service certificate --> ServiceIdentity

As it stands today, both XDS cert and workload certs are based on service-account.namespace. The only additional info in the XDS cert is the proxy metadata (Proxy UUID, Kind).

I am inclined to keep this simple:

  • XDS cert: proxy-uuid.kind.svc-account.namespace.cluster.local
  • Client/Service certs: svc-account.namespace.cluster.local

This will allow the controller to correctly assign service identities that could be derived from the XDS cert.

@shashankram
Copy link
Member

Resolved by #3657

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
area/identity size/M 7 days (~1.5 week)
Projects
None yet
Development

No branches or pull requests

2 participants