Skip to content

Commit

Permalink
Add limitations for having OIDC and Istio enabled (#5940)
Browse files Browse the repository at this point in the history
* Add limitations for having OIDC and Istio enabled

* Fix list
  • Loading branch information
creydr authored Apr 12, 2024
1 parent 6dfdbfb commit b820198
Showing 1 changed file with 26 additions and 0 deletions.
26 changes: 26 additions & 0 deletions docs/eventing/experimental-features/sender-identity.md
Original file line number Diff line number Diff line change
Expand Up @@ -234,3 +234,29 @@ Send events to the Broker using OIDC authentication:
"name": "authenticated"
}
```

## Limitations with Istio

You might experience issues with the [eventing integration with Istio](https://github.com/knative-extensions/eventing-istio) and having the `authentication-oidc` feature flag enabeled, when the JWKS URI is represented via an IP. E.g. like in the following case:

```
$ kubectl get --raw /.well-known/openid-configuration | jq
{
"issuer": "https://kubernetes.default.svc",
"jwks_uri": "https://172.18.0.3:6443/openid/v1/jwks",
...
}
```

In this case you need to add the [`traffic.sidecar.istio.io/excludeOutboundIPRanges: <JWKS IP>/32`](https://istio.io/latest/docs/reference/config/annotations/#SidecarTrafficExcludeOutboundIPRanges) annotation to the pod templates of the following deployments:

- `imc-dispatcher`
- `mt-broker-ingress`
- `mt-broker-filter`

For example:

```
$ kubectl -n knative-eventing patch deploy imc-dispatcher --patch '{"spec":{"template":{"metadata":{"annotations":{"traffic.sidecar.istio.io/excludeOutboundIPRanges":"172.18.0.3/32"}}}}}'
deployment.apps/imc-dispatcher patched
```

0 comments on commit b820198

Please sign in to comment.