Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support gcp workload identity federation #359

Conversation

akhil-rane
Copy link
Contributor

@akhil-rane akhil-rane commented Jun 29, 2021

To enable short-lived credentials in gcp cluster using workload identity
federation, we need to make following set of changes

  • update golang.org/x/oauth2 to a version that supports workload identity
  • add kubernetes service account names to gcp credentials request manifest
    which can be used by ccoctl tool to create gcp service accounts with
    limited access

ref: https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity

x-ref: https://issues.redhat.com/browse/CCO-105

@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Jun 29, 2021
@codecov
Copy link

codecov bot commented Jun 29, 2021

Codecov Report

Merging #359 (0b8fff7) into master (33bfc5c) will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #359   +/-   ##
=======================================
  Coverage   46.03%   46.03%           
=======================================
  Files          74       74           
  Lines        7751     7751           
=======================================
  Hits         3568     3568           
  Misses       3692     3692           
  Partials      491      491           

@akhil-rane akhil-rane force-pushed the support_gcp_workload_identity branch 2 times, most recently from 44113d3 to 7297380 Compare June 30, 2021 17:24
@akhil-rane
Copy link
Contributor Author

/test verify

@openshift-ci openshift-ci bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jul 13, 2021
For enabling short-lived credentials in gcp cluster using workload
identity, we need ccoctl tool to know the kubernetes service account
names from the credentials request manifest so that it can create
gcp service accounts that can be impersonated only by specific
kubernetes service accounts.
@akhil-rane akhil-rane force-pushed the support_gcp_workload_identity branch from 7297380 to 0b8fff7 Compare July 14, 2021 03:00
@openshift-ci openshift-ci bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jul 14, 2021
@akhil-rane akhil-rane changed the title WIP: Support gcp workload identity federation Support gcp workload identity federation Jul 14, 2021
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Jul 14, 2021
@akhil-rane
Copy link
Contributor Author

@joelddiaz this looks good for a quick review

@akhil-rane
Copy link
Contributor Author

/test e2e-gcp

Comment on lines +20 to +21
serviceAccountNames:
- cloud-credential-operator
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm assuming this is more of an example of the kinds of changes that need to be made across the various repos, and CCO - as presently written - will not actually make use of these creds when in Manual mode. Correct?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thats right

@joelddiaz
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jul 16, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 16, 2021

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: akhil-rane, joelddiaz

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jul 16, 2021
@openshift-merge-robot openshift-merge-robot merged commit 0ee1808 into openshift:master Jul 16, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants