Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue #6921: Unbreak compute engine url signing #158

Merged
merged 1 commit into from
Oct 10, 2023

Conversation

kaovilai
Copy link
Contributor

@kaovilai kaovilai commented Oct 5, 2023

Fix vmware-tanzu/velero#6921
Signed-off-by: Tiger Kaovilai tkaovila@redhat.com

@kaovilai kaovilai changed the title Unbreak compute engine url signing #6921 Unbreak compute engine url signing Oct 5, 2023
@codecov-commenter
Copy link

codecov-commenter commented Oct 5, 2023

Codecov Report

Merging #158 (6dfc7c1) into main (343aa79) will decrease coverage by 0.12%.
The diff coverage is 0.00%.

@@            Coverage Diff             @@
##             main     #158      +/-   ##
==========================================
- Coverage   29.26%   29.15%   -0.12%     
==========================================
  Files           3        3              
  Lines         516      518       +2     
==========================================
  Hits          151      151              
- Misses        353      355       +2     
  Partials       12       12              
Files Coverage Δ
velero-plugin-for-gcp/object_store.go 13.02% <0.00%> (-0.14%) ⬇️

Copy link

@Langleu Langleu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

as bug reporter, can confirm this fixes the issues around workload identities.
Thanks a lot! 🚀

@kaovilai kaovilai changed the title Unbreak compute engine url signing Issue #6921: Unbreak compute engine url signing Oct 5, 2023
Signed-off-by: Tiger Kaovilai <tkaovila@redhat.com>

Remove doc assumptions that `GKE Workload Identity` = `Workload Identity Federation` and cannot generate signed URLs

Signed-off-by: Tiger Kaovilai <tkaovila@redhat.com>
@@ -175,8 +175,6 @@ This involves creating an external credential file and using it as `--secret-fil

#### Option 3: Using GKE Workload Identity

Keep in mind that [Workforce Identity Federation Users cannot generate signed URLs](https://cloud.google.com/iam/docs/federated-identity-supported-services#:~:text=workforce%20identity%20federation%20users%20cannot%20generate%20signed%20URLs.). This means, if you are using Workforce Identity Federation, you will not be able to run `velero backup logs`, `velero backup download`, `velero backup describe` and `velero restore describe`.
Copy link
Collaborator

@blackpiglet blackpiglet Oct 8, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Per the conversation in issue vmware-tanzu/velero#6921, I think this information is still true for most Workload Identity scenarios, especially for the programmatic way, so I think we still need to keep this line, and we just need to add a note for the exception scenario.

By the way, the scenario mentioned in the issue vmware-tanzu/velero#6921 looks like not a Workload Identity one, it's more like a file-less authentication scenario.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it's workload identities, typical use case of trust relationship between k8s SA and IAM SA and they can indeed create signed URLs etc. . With workload identities we could always do backups, snapshots, describe, download, logs, restore, everything you expect to be able to do with Velero.

We have been using workload identities with Velero since v1.5.2 and v1.1.0 for the GCP plugin and on multiple clusters and never had an issue up until now with the regression due to workforce support.

@shubham-pampattiwar shubham-pampattiwar merged commit 59afdf2 into vmware-tanzu:main Oct 10, 2023
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
5 participants