-
Notifications
You must be signed in to change notification settings - Fork 592
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide the OIDC token of the ContainerSource as a volume #7322
Comments
Hello there, I would love to help out, can you tell me more on what needs to be done? @creydr |
Hello @JRS296, Alternatively we could have simply created a service account token secret, and let the API server take care about the token management, but since this will only expose long lived tokens, we use the Kuberntes TokenAPI to get a time bound token (#7175). A good starting point is probably the controller for the container source in pkg/reconciler/containersource. There you would need to request a Token from the OIDC library (#7175), create a secret with this token and mount it to the container sources deployment ( This also relates to #7323 which has to achieve something similar and thus the logic for the token & secret update should be reusable. Does this help? |
Sounds good 👍 |
Hi @JRS296, |
Oh that's alright @creydr 👍 |
Done via #7444 |
Problem
As the Eventing OIDC feature track describes, the ContainerSource controller will add a volume to its managing container, which contains the token for authentication.
This will be a token for the ContainerSources identity (from
.status.auth.serviceAccountName
) and issued for the sinks audience (.status.sinkAudience
).The token will not be injected as a env var for security reasons and as it would not be refreshable without a pod restart.
The ContainerSource controller will take care of the token handling & refreshing.
For the ContainerSource controller, this means:
/oidc/token
Additonal Information
AuthStatus
#7228The text was updated successfully, but these errors were encountered: