-
Notifications
You must be signed in to change notification settings - Fork 248
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support fetching from protected assets with Azure Storage #2011
Comments
The code as written currently hard fails if e.g. it fails to get Azure credentials. If those URLs could have been used in the past (as e.g. public read), then spec gating or not, we should have any failure in the new path be at most a warning and have Ignition still fallback to anonymous HTTP fetches. In fact, I think just doing that fallback should be sufficient to make this not spec gating. |
@jlebon Ah, yeah that makes sense, okay I can add that change here shortly and will link a pr. |
Feature Request
Environment
What hardware/cloud provider/hypervisor is being used to run Ignition?
Azure
Desired Feature
Support fetching the Ignition config from an Azure Storage blob that is protected in access by a managed identity. See: https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/tutorial-linux-managed-identities-vm-access?pivots=identity-linux-mi-vm-access-storage
See:
Initial implementation in: #1923
Details that remain to be figured out:
The main difference here (compared to AWS S3 support for example) is that this is not using a special URI but regular HTTP URLs, so there is no immediate way of differentiating support / request for that feature.
Tracker for testing: coreos/fedora-coreos-tracker#1871
Other Information
See:
The text was updated successfully, but these errors were encountered: