-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Grid proxy #242
Grid proxy #242
Conversation
4728dd4
to
06ce6ac
Compare
} | ||
] | ||
|
||
proxy_pass = os.environ.get('VOMSPROXY_PASS') |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Even if we are inside the function that creates the voms_proxy
side card, we could use the voms_
prefix wherever we call the variable proxy_xxx
, for more clarity, what do you think? i.e. voms_proxy_pass
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Absolutely agree, that's a relic from when the field was just called proxy
!
kubernetes: add sidecar for proxy proxy: change field from proxy to voms_proxy proxy: change env variable of proxy password kubernetes: change field name from proxy to voms-proxy
* Used to securely read the password and the virtual organisation (VO).
5de0b1a
to
cf3b991
Compare
cf3b991
to
f2d0796
Compare
Sidecar container that creates a proxy certificate when user specifies
proxy: true
in reana.yaml. The pem files needed to create the certificate is added to reana secrets as files, the password is added as an environment variablereana-client secrets-add --env VOMSPROXY_PASS=
--file userkey.pem
--file usercert.pem
The security context was before set on pod level to self.kubernetes_uid (default 1000). To read the pem files inside of reana secrets we need root privileges. Set the security context on container level instead at
reana_job_controller/kubernetes_job_manager.py
. Set the job container to self.kubernetes_uid and leave the sidecar as root.closes reanahub/reana#256