This repository has been archived by the owner on Jul 11, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 277
Destination endpoints for a service that maps to multiple ServiceAccounts doesn't honor TrafficTarget policy #1658
Labels
area/control-plane
Related to OSM's control plane
area/SMI
SMI implementation related
kind/bug
Something isn't working
priority/P1
P1 priority
size/XL
20 days (4 weeks)
Milestone
Comments
nshankar13
added
area/control-plane
Related to OSM's control plane
area/SMI
SMI implementation related
labels
Sep 2, 2020
@shashankram Do you think P1 or P2 fits better here? It looks like it's possible to workaround the issue, but I can see where this definitely needs to get fixed soon anyway. |
The only workaround is to not have such a scenario :-) |
@michelleN as FYI the new proposal for traffic split and client/server config that @ksubrmnn is working on will handle this case as well. Once the changes are made we will need to validate this scenario |
This was referenced Feb 12, 2021
snehachhabria
added a commit
to snehachhabria/osm
that referenced
this issue
Feb 16, 2021
…olicy This PR ensures that the endpoints built for a service in EDS honor SMI traffic target policies. Only those destinations endpoints are programmed on the envoy, if its destination pod has a service account specified as a destination in any of of the applicable traffic targets. Resolves issue openservicemesh#1658 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
snehachhabria
added a commit
to snehachhabria/osm
that referenced
this issue
Feb 16, 2021
…olicy This PR ensures that the endpoints built for a service in EDS honor SMI traffic target policies. Only those destinations endpoints are programmed on the envoy, if its destination pod has a service account specified as a destination in any of of the applicable traffic targets. Resolves issue openservicemesh#1658 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
snehachhabria
added a commit
to snehachhabria/osm
that referenced
this issue
Feb 17, 2021
…olicy This PR ensures that the endpoints built for a service in EDS honor SMI traffic target policies. Only those destinations endpoints are programmed on the envoy, if its destination pod has a service account specified as a destination in any of of the applicable traffic targets. Resolves issue openservicemesh#1658 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
snehachhabria
added a commit
to snehachhabria/osm
that referenced
this issue
Feb 17, 2021
…olicy This PR ensures that the endpoints built for a service in EDS honor SMI traffic target policies. Only those destinations endpoints are programmed on the envoy, if its destination pod has a service account specified as a destination in any of of the applicable traffic targets. Resolves issue openservicemesh#1658 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
snehachhabria
added a commit
to snehachhabria/osm
that referenced
this issue
Feb 17, 2021
…olicy This PR ensures that the endpoints built for a service in EDS honor SMI traffic target policies. Only those destinations endpoints are programmed on the envoy, if its destination pod has a service account specified as a destination in any of of the applicable traffic targets. Resolves issue openservicemesh#1658 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
snehachhabria
added a commit
to snehachhabria/osm
that referenced
this issue
Feb 17, 2021
…olicy This PR ensures that the endpoints built for a service in EDS honor SMI traffic target policies. Only those destinations endpoints are programmed on the envoy, if its destination pod has a service account specified as a destination in any of of the applicable traffic targets. Resolves issue openservicemesh#1658 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
area/control-plane
Related to OSM's control plane
area/SMI
SMI implementation related
kind/bug
Something isn't working
priority/P1
P1 priority
size/XL
20 days (4 weeks)
Bug description:
Consider the following example:
src=SvcAccount-A, dst=SvcAccount-1
*Note: there is no traffic split configured
OSM will translate the TrafficTarget policy to
src=Service-A, dst=Service-X
.When EDS resolves the endpoints for the destination
Service-X
, it will receive the endpoints for both Pod-1 and Pod-2. However sincePod-2, SvcAccount-2
is not allowed to be accessed byService-A, SvcAccount-A
, traffic fromService-A, SvcAccount-A
toPod-2, Svc-Account-2
should be denied. Currently, the destination endpoints for a service do not take into consideration the traffic target policies.Affected area (please mark with X where applicable):
Expected behavior:
Based on the above example:
Steps to reproduce the bug (as precisely as possible):
Use the above example.
How was OSM installed?:
osm install
Anything else we need to know?: n/a
Environment:
osm version
):kubectl version
):The text was updated successfully, but these errors were encountered: