Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Kubernetes 1.24 and kind v0.19.0 #280

Merged
merged 2 commits into from
Jun 14, 2023

Conversation

rnaveiras
Copy link
Contributor

@rnaveiras rnaveiras commented Jun 13, 2023

Ensure that we test all the components against Kubernetes 1.24. We should aim for Kubernetes 1.27 in the future, but this is a good step forward as many behaviour changes are related to this version.

https://kubernetes.io/blog/2022/05/03/kubernetes-1-24-release-announcement/

In particular, we are looking at one change that directly impacts Vault. Service Account Tokens in Kubernetes v1.24, non-expiring service account tokens are no longer auto-generated.

You can read further details here:
https://eng.d2iq.com/blog/service-account-tokens-in-kubernetes-v1.24/

How come this is working? without additional changes?

With any vault version before 1.9, this should break all the integration tests because the jwt iss validation will fail.

You can read more details about this here https://developer.hashicorp.com/vault/docs/auth/kubernetes#kubernetes-1-21

You need to enable disable_iss_validation=true on those versions for the auth/kubernetes/config configuration.

From Vault 1.9.0, disable_iss_validation and issuer are deprecated, and the default for disable_iss_validation has changed to true for new Kubernetes auth mounts.

Ensure that we test all the components against Kubernetes 1.24. In the future
we should aim for GKE 1.27, but this is a good step forward as they are
many deprecations related with this version.

https://kubernetes.io/blog/2022/05/03/kubernetes-1-24-release-announcement/

In particulary, we are looking at one change that has direct impact with
Vault. Service Account Tokens in Kubernetes v1.24, non-expiring service
account tokens are no longer auto-generated.

You can read further details here:
https://eng.d2iq.com/blog/service-account-tokens-in-kubernetes-v1.24/
@rnaveiras rnaveiras force-pushed the rnaveiras-k8s-1.24-and-vault branch from 667d538 to 2849e9d Compare June 13, 2023 14:44
Avoid configuration behaviour that change across vault versions
@rnaveiras rnaveiras force-pushed the rnaveiras-k8s-1.24-and-vault branch from 2849e9d to ba76f66 Compare June 13, 2023 15:22
@rnaveiras rnaveiras marked this pull request as ready for review June 13, 2023 15:22
$ source <(setup-envtest use -i -p env 1.22.x)
$ # configure envtest to use k8s 1.24.x binaries
$ setup-envtest use -p path 1.24.x
$ source <(setup-envtest use -i -p env 1.24.x)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not a big deal, but I'd love it if this weren't so bash centric 🥺

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

haha, I feel the same way. let's see what I can do in the following PR's

@rnaveiras rnaveiras merged commit b2e8ab9 into master Jun 14, 2023
@rnaveiras rnaveiras deleted the rnaveiras-k8s-1.24-and-vault branch June 14, 2023 06:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants