-
Notifications
You must be signed in to change notification settings - Fork 687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ambassador doesn't like Istio mTLS secrets #1475
Comments
+1, my team ran into this on Friday -- is the Istio mutual TLS scenario described in the documentation no longer supported? |
This is related to #1255 |
Upon some investigation I also discovered some inconsistencies between how Istio stores secret
Given all this, looks like the mutual TLS between Ambassador and Istio is completely broken at the moment. There is an easy temporary workaround though: just create secret manually, copy key and cert from the |
Thank you for reporting this issue. It appears I did not completely check the correctness of the change to the documentation before publishing it. Short term, the solution is to simply rollback to the old method of mounting the secret in a volume in the Ambassador container and use it there. Long term, we should work on getting this to work using a The documentation rollback is happening now and should be completed soon. You can then follow that document to enable mTLS between Ambassador and Istio. I apologize for the inconvenience this has caused and appreciate the effort put in to reporting this issue. |
Changed the title to reflect that this is distinct from #1255. |
I am also stuck with the same issue, could you elaborate the steps, how we can do that |
To give more details about my configuration:
ambassador-service.yaml:
I am getting configuration error in ambassador dashboard: CONFIGURATION ERRORS
|
As I mentioned, just creating secret without dot in the name (e.g. |
I forgot to mention I was using ambassador version 0.73.0, which does the behave similarly like 0.50.1. Anyway reverting back to 0.50.1 and steps you have mentioned worked for me. There are no errors coming in ambassador logs. But none of the deployed services I am able to access. I am using EKS to deploy the services along with istio and ambassador. Can you guys point out the probable configuration mistakes:
|
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
I believe the issue is still there. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Describe the bug
The Ambassador with Istio guide (https://www.getambassador.io/user-guide/with-istio) suggests to use the following annotation to attach Istio secrets:
Which does not work with the following error:
Upon inspection of the source code https://github.com/datawire/ambassador/blob/528b16c14d26cece0be7719403debf6577e2e097/ambassador/ambassador/ir/ir.py#L291 it looks like the secret name
istio.default
is parsed incorrectly because the routine assumes that secret name is everything before dot (e.g.istio
).To Reproduce
Just try to follow the guide: https://www.getambassador.io/user-guide/with-istio
It cannot work because
istio.default
secret name will be parsed asistio
.Expected behavior
If you want to have namespace qualification for secrets, than I think it should be possible to do dot escaping, something like
istio\.default
to support cases where secret has dot in its name.Versions (please complete the following information):
The text was updated successfully, but these errors were encountered: