Skip to content

Conversation

@liggitt
Copy link
Member

@liggitt liggitt commented Jan 30, 2017

We have multiple features that depend on this API:

SubjectAccessReview

The API has been in use since 1.3 in beta status (v1beta1) with negligible changes:

  • Added a status field for reporting errors evaluating access
  • A typo was discovered in the SubjectAccessReviewSpec Groups field name

This PR promotes the existing v1beta1 API to v1, with the only change being the typo fix to the groups field. (fixes #32709)

Because the API does not persist data (it is a query/response-style API), there are no data migration concerns.

This positions us to promote the features that depend on this API to stable in 1.7

cc @kubernetes/sig-auth-api-reviews @kubernetes/sig-auth-misc

The authorization.k8s.io API group was promoted to v1

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Jan 30, 2017
@k8s-reviewable
Copy link

This change is Reviewable

@k8s-github-robot k8s-github-robot added kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API kind/new-api size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels Jan 30, 2017
@liggitt liggitt added release-note Denotes a PR that will be considered when it comes time to generate release notes. and removed release-note-label-needed labels Jan 30, 2017
cmdArgs += fmt.Sprintf("--%s=%s ", f.Name, f.Value)
})
return fmt.Sprintf("\n// This file was automatically generated by informer-gen with arguments: %s\n\n", cmdArgs)
return fmt.Sprintf("\n// This file was automatically generated by informer-gen\n\n")
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ncdc I don't care, do you?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, I already gave the ok in #40700

AddInternalObjectsToScheme: authorization.AddToScheme,
},
announced.VersionToSchemeFunc{
v1.SchemeGroupVersion.Version: v1.AddToScheme,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

need to fix up the version preference order above.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed

@deads2k
Copy link
Contributor

deads2k commented Jan 30, 2017

Is there a simple way for you to confirm that the preference order is correct in discovery?

@deads2k
Copy link
Contributor

deads2k commented Jan 30, 2017

minor (but important) comment. lgtm otherwise.

@liggitt liggitt force-pushed the v1-sar branch 3 times, most recently from e7b5b11 to 752978f Compare January 30, 2017 22:09
@liggitt
Copy link
Member Author

liggitt commented Jan 30, 2017

@k8s-bot bazel test this

@timothysc timothysc removed their assignment Jan 31, 2017
@liggitt liggitt force-pushed the v1-sar branch 6 times, most recently from db5b393 to 40ef8f7 Compare February 1, 2017 14:16
@liggitt
Copy link
Member Author

liggitt commented Feb 1, 2017

@mikedanese, any clue what the issue is causing this bazel error:

W0201 14:25:24.575] ERROR: /workspace/k8s.io/kubernetes/BUILD.bazel:35:1: Target '//pkg:all-srcs' is not visible from target '//:all-srcs'. Check the visibility declaration of the former target if you think the dependency is legitimate.
W0201 14:25:24.894] ERROR: Analysis of target '//hack:verify-boilerplate' failed; build aborted.
W0201 14:25:24.894] ____Elapsed time: 13.606s
W0201 14:25:24.895] ERROR: Couldn't start the build. Unable to run tests.
W0201 14:25:24.897] make: *** [bazel-test] Error 1
I0201 14:25:24.997] Makefile:501: recipe for target 'bazel-test' failed
E0201 14:25:25.050] Build failed
I0201 14:25:25.050] process 468 exited with code 2 after 9.0m
E0201 14:25:25.050] FAIL: pull-kubernetes-bazel

@liggitt
Copy link
Member Author

liggitt commented Feb 2, 2017

#39471 flake
@k8s-bot unit test this
@k8s-bot cross build this

@liggitt
Copy link
Member Author

liggitt commented Feb 2, 2017

@kubernetes/api-approvers for approval

@liggitt
Copy link
Member Author

liggitt commented Feb 2, 2017

flake #38518
@k8s-bot unit test this

@smarterclayton
Copy link
Contributor

I'm ok with this being promoted - it fits the requirements, we've had it baked for a long time, and we are testing and using it regularly. @erictune can you weigh in whether you concur?

@erictune
Copy link
Contributor

erictune commented Feb 6, 2017

/lgtm

@k8s-ci-robot
Copy link
Contributor

@erictune: you can't LGTM a PR unless you are an assignee.

In response to this comment:

/lgtm

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@erictune
Copy link
Contributor

erictune commented Feb 6, 2017

@cjcullen FYI. subjectaccessreview going GA. looked good to me. now would be good time to comment if you had issues with it.

@cjcullen
Copy link
Member

cjcullen commented Feb 6, 2017

No worries about it from me...

@smarterclayton
Copy link
Contributor

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 6, 2017
@smarterclayton
Copy link
Contributor

/approve

@k8s-github-robot k8s-github-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 6, 2017
@liggitt
Copy link
Member Author

liggitt commented Feb 6, 2017

regenerated conflicting pb files

@liggitt liggitt added approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm "Looks good to me", indicates that a PR is ready to be merged. and removed approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm "Looks good to me", indicates that a PR is ready to be merged. labels Feb 6, 2017
@k8s-github-robot
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

The following people have approved this PR: liggitt

Needs approval from an approver in each of these OWNERS Files:

We suggest the following people:
cc @smarterclayton
You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@liggitt
Copy link
Member Author

liggitt commented Feb 7, 2017

@k8s-bot gce etcd3 e2e test this

@k8s-ci-robot
Copy link
Contributor

@liggitt: The following test(s) failed:

Test name Commit Details Rerun command
Jenkins CRI GCE e2e bb7b0e4bec92c427438a8db71bde88dc47de0508 link @k8s-bot cri e2e test this

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-github-robot
Copy link

Automatic merge from submit-queue (batch tested with PRs 40971, 41027, 40709, 40903, 39369)

@k8s-github-robot k8s-github-robot merged commit 460f443 into kubernetes:master Feb 7, 2017
k8s-github-robot pushed a commit that referenced this pull request Feb 10, 2017
Automatic merge from submit-queue (batch tested with PRs 41112, 41201, 41058, 40650, 40926)

Promote TokenReview to v1

Peer to #40709

We have multiple features that depend on this API:

- [webhook authentication](https://kubernetes.io/docs/admin/authentication/#webhook-token-authentication)
- [kubelet delegated authentication](https://kubernetes.io/docs/admin/kubelet-authentication-authorization/#kubelet-authentication)
- add-on API server delegated authentication

The API has been in use since 1.3 in beta status (v1beta1) with negligible changes:
- Added a status field for reporting errors evaluating the token

This PR promotes the existing v1beta1 API to v1 with no changes

Because the API does not persist data (it is a query/response-style API), there are no data migration concerns.

This positions us to promote the features that depend on this API to stable in 1.7

cc @kubernetes/sig-auth-api-reviews @kubernetes/sig-auth-misc

```release-note
The authentication.k8s.io API group was promoted to v1
```
@liggitt liggitt deleted the v1-sar branch February 10, 2017 15:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

SubjectAccessReview typos groups field name