You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently the example kustomize for Kubeflow is using the setup for kind and vcluster which contains logic for configuring m2m tokens with the self-signed OIDC Issuer served in-cluster behind kubernetes api. This configuration logic depends on a K8s Job that will get the JWKS and embed it in RequestAuthentication called m2m-token-issuer.
This embedding of JWKS is volatile because of two points:
user can accidentally overwrite the RequestAuthentication rendering the setup not usable
the JWKS can change and this also has to be covered
The alternative is to embed the kubernetes CA in Istio container but this is even more tricky:
@kromanow94 Yes that sound reasonable. Just make sure that the imagepullpolicy is ifnotpresent and the resource is only changed if needed. So kubectl apply instead of kubectl delete and create. The documentation must be updated as well.
Description
Currently the
example
kustomize for Kubeflow is using the setup forkind
andvcluster
which contains logic for configuring m2m tokens with the self-signed OIDC Issuer served in-cluster behind kubernetes api. This configuration logic depends on a K8s Job that will get the JWKS and embed it inRequestAuthentication
calledm2m-token-issuer
.This embedding of JWKS is volatile because of two points:
RequestAuthentication
rendering the setup not usableThe alternative is to embed the kubernetes CA in Istio container but this is even more tricky:
Todo
Change the Job to CronJob and make it run every 5 minutes.
The text was updated successfully, but these errors were encountered: