vault-kv relation is broken when not using network spaces
Bug #1843809 reported by
Cory Johns
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kubernetes Control Plane Charm |
Fix Released
|
Undecided
|
Cory Johns | ||
vault-charm |
In Progress
|
Undecided
|
Cory Johns |
Bug Description
https:/
Changed in charm-kubernetes-master: | |
status: | New → In Progress |
Changed in vault-charm: | |
status: | New → In Progress |
Changed in charm-kubernetes-master: | |
assignee: | nobody → Cory Johns (johnsca) |
Changed in vault-charm: | |
assignee: | nobody → Cory Johns (johnsca) |
Changed in charm-kubernetes-master: | |
status: | In Progress → Fix Committed |
milestone: | none → 1.16 |
Changed in charm-kubernetes-master: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
In the following change /github. com/openstack- charmers/ charm-interface -vault- kv/pull/ 5/files
https:/
This check is not robust enough: in_network( bound_cidr, addr)):
if not (addr and is_address_
continue
In the cases of CMR and on AWS where instances may be on different CIDRs for internal networks, it is not safe to assume the local instance's space binding will be on the same CIDR as the remote's ingress address.
Per cory_fu:
[The bigger issue is] get_api_url() needs to be called with vault's ingress address for the specific relation that it's be advertised on, rather than assuming it's going to be one of the extra-bindings spaces.
The vault charm needs to set it's ingress address appropriately for the given relation. The setting of the ingress address may be spaces aware.
Another way to look at this, the vault-kv change has it the wrong way around, the ingress setting that is important is on the vault side not the client side.