-
Notifications
You must be signed in to change notification settings - Fork 42k
Promote TokenReview to v1 #41058
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Promote TokenReview to v1 #41058
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED The following people have approved this PR: liggitt Needs approval from an approver in each of these OWNERS Files:
We suggest the following people: |
35a6f52 to
09b5d72
Compare
|
lgtm |
|
@kubernetes/api-approvers for approval |
|
Not sure if this needs to be hashed out in this PR, but we were looking at passing through additional headers through the TokenReviewSpec in GKE. It feels wrong and gross, but I'm not convinced there's a nicer way. I talked it through w/ @liggitt earlier today and he told me to bring it up here. We have a temporary role-grant "token"-ish type thing that we'd like to get passed through to our webhook authorizer, which gets passed in as a "x-goog-iam-authorization-token" header in the request. Our initial thought was we could extend TokenReview to take an Extra as an input, and then plumb it into the User object (either transparently or with some processing done in the token webhook). Then the authorizer would see the Extra in the SubjectAccessReview, and could use it to make the correct authz decision. This could be done with some kind of Another option is to cut out the authn middleman and pass some headers as "extra" Extra to the SubjectAccessReview (w/ a similar +@alexblyzn who was looking into this. |
|
But I don't think my concerns block this from going to v1. We should be able to do what I want (if we decide it's the right thing to do) without breaking compatibility. |
|
I can sort of understand wanting addition information the |
|
API looks ok. If there are no further comments from SIG members or others on this thread this is approved and can merge as an API change. |
|
hearing none, tagging |
|
Automatic merge from submit-queue (batch tested with PRs 41112, 41201, 41058, 40650, 40926) |
Peer to #40709
We have multiple features that depend on this API:
The API has been in use since 1.3 in beta status (v1beta1) with negligible changes:
This PR promotes the existing v1beta1 API to v1 with no changes
Because the API does not persist data (it is a query/response-style API), there are no data migration concerns.
This positions us to promote the features that depend on this API to stable in 1.7
cc @kubernetes/sig-auth-api-reviews @kubernetes/sig-auth-misc