Skip to content

Authenticating microservices requests in Kubernetes #326

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 21 commits into from

Conversation

amitsaha
Copy link
Collaborator

@amitsaha amitsaha commented Nov 8, 2020

This PR creates the content for the article "Authenticating microservices requests in Kubernetes".

@amitsaha amitsaha closed this Nov 8, 2020
@amitsaha amitsaha reopened this Nov 8, 2020
Copy link
Contributor

@danielepolencic danielepolencic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I feel like some of these comments are tiny, I can just amend them myself. I'm creating more work for you here.
I will raise a PR against your repo with some of the changes.
I think we could have saved the back and forth with a local branch.
Maybe next time.

Approving, but raising a PR on yours.


How would the secret store decide to authenticate or deny the request?

A popular approach is to request and pass identity tokens to every call within services. So instead of
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I know this sounds weird, but I have a single sentence per paragraph.

The content is spaced and easier to read.

Copy link
Collaborator Author

@amitsaha amitsaha Nov 11, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What if we have a linter rule to detect this? How do you want to cover multi-sentence items in a list?


- You could use static tokens that don’t expire (and perhaps hardcoding them in the applications that
communicate with each other and removing the need for an authorisation server at all)
- You could use oAuth by setting up an internal oAuth server
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All bullet points should terminate with a full stop.


## Setting up

You will need access to a Kubernetes cluster with the ServiceAccountVolume projection feature enabled.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ServiceAccountVolume projection -> link to the official docs.

@amitsaha
Copy link
Collaborator Author

I feel like some of these comments are tiny, I can just amend them myself. I'm creating more work for you here.
I will raise a PR against your repo with some of the changes.
I think we could have saved the back and forth with a local branch.
Maybe next time.

Approving, but raising a PR on yours.

Thanks, did you raise a PR already? I cannot see any.

@danielepolencic
Copy link
Contributor

I did not. I think it's easier if you push a local branch and we work together on that

@amitsaha
Copy link
Collaborator Author

amitsaha commented Nov 11, 2020 via email

@danielepolencic
Copy link
Contributor

We can merge this PR, but then I'm not sure how I will able to comment on it.
I think you could push the branch as a local branch.
If you can, add the amendments (which otherwise I will have to re-do).

@amitsaha
Copy link
Collaborator Author

amitsaha commented Nov 11, 2020 via email

@danielepolencic
Copy link
Contributor

that's ok.

But once you have the changes, can you push the same branch to this repo as well?
We close the current PR and raise a local one.

@amitsaha
Copy link
Collaborator Author

Closing this in favor of #327

@amitsaha amitsaha closed this Nov 11, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants