security-policy-migrate

command module
v0.0.0-...-a3054f2 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Oct 7, 2021 License: Apache-2.0 Imports: 18 Imported by: 0

README

security-policy-migrate

Build and Test Release

A tool to convert the Istio v1alpha1 authentication policy to the v1beta1 version.

The tool helps you to upgrade the old Istio cluster (<= 1.5) to a newer version (>= 1.6) by migrating the deprecated v1alpha1 authentication policy to the corresponding v1beta1 versions.

Usage

  1. Download the current latest release of the tool on github:

    curl -L -s https://github.com/istio-ecosystem/security-policy-migrate/releases/latest/download/convert.tar.gz --output convert.tar.gz
    
  2. Extract the tool from the downloaded file:

    tar -xvf convert.tar.gz && chmod +x convert
    
  3. Confirm the k8s cluster to be converted, the tool should be used with (old) Istio cluster that has v1alpha1 authentication policy:

    kubectl config current-context
    
  4. Run the tool in the k8s cluster and store the beta policy in beta-policy.yaml:

    ./convert > beta-policy.yaml
    

    You could also use the flag --per-namespace to store policies per-namespace so that you could verify and apply the generated policies gradually per-namespace:

    mkdir beta-policy-dir
    ./convert --per-namespace beta-policy-dir
    ls beta-policy-dir
    
  5. Check the command output and make sure there are no errors, otherwise fix all errors and re-run the tool again.

  6. Dry-run the beta policy to make sure it will be accepted:

    kubectl apply --dry-run=server -f beta-policy.yaml
    
  7. Before applying in a real cluster, double check the beta policies again to make sure it is correct.

Rollback

To rollback the generated beta policy in case it is not working as expected, you just delete the beta policy from your cluster if you are using Istio 1.5, then re-apply your alpha policy.

Istio 1.5 is a transitive version that supports both alpha and beta policy. The beta version takes precedence over the alpha version.

If you are using dual control plane upgrade, first switch back to the old control plane (e.g. 1.4) and then re-apply the alpha policy.

Supported Policy

This tool supports converting v1alpha1 authentication policy with the following limitations:

The tool may also fail due to other issues (e.g. missing or unmatched service definition). Detail error message will be generated, you should fix the error and re-run the tool.

If you are sure and confident that the error could be ignored safely, you can run the tool with --ignore-error to generate the beta policy ignoring errors.

The tool also provides the flag --context and --kubeconfig to allow using with a specific cluster or config.

Policy difference

Please be noted that the beta policy is very different from the alpha ones, some typical differences are listed below (not a full list):

  • JWT policy denial message

    • In alpha policy, the HTTP code 401 will be returned with the body "Origin authentication failed."
    • In beta policy, the HTTP code 403 will be returned with the body "RBAC: access denied"
  • Service name (alpha) v.s. Workload selector (beta)

    • In alpha policy, service name is used to select where to apply the policy
    • In beta policy, workload selector is used to select where to apply the policy
  • etc.

Common Errors

The following table lists common errors that could be returned by the tool together with the suggestions to fix the error:

Error Message Why it happens Suggestions
found duplicate target my-service Multiple duplicate targets are specified in the same v1alpha1 Policy. Fix the v1alpha1 Policy to not use duplicate target name
failed to convert target (my-service) to workload selector: could not find port The v1alpha1 Policy is using port-level configuration but the port could not be found in the corresponding service definition. This usually means there is either a typo in your existing v1alpha1 Policy probably or it is out-dated and inconsistent with the k8s Service. The policy may not work as expected already, fix the policy to use the correct service name or port number. If the policy is correct, fix the corresponding k8s Service definition. If the target is not needed, remove it from the v1alpha1 Policy.
failed to convert target (my-service) to workload selector: could not find port name Similar to the case above, but the mismatch is in the service name. See above.
failed to convert target (my-service) to workload selector: could not find service Similar to the case above, but more specifically the corresponding k8s service could not be found at all. See above, make sure the k8s Service exist and it matches to your v1alpha1 policy.
triggerRule is not supported with multiple JWT issuer This happens when you used the triggerRule field with multiple issuers. The semantics could be very complicated depending on your actual use case and the tool does not support this kind of conversion. If your issuers are using the same triggerRule, you could manually convert them to a single AuthorizationPolicy easily. If these issuers are using different triggerRule, you could potentially use the "request.auth.claims[iss]" condition to distinguish them if your JWT token includes the proper "iss" claim.
triggerRule.regex ("some-regex") is not supported The v1beta1 AuthorizationPolicy no longer supports regex matching. Consider convert the regex to prefix/suffix/exact matching.
JWT is never supported in peer method The v1alpha1 Policy is using JWT method in its peer method lists. This is not supported in v1alpha1 Policy and should not be used in the first place.

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL