-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use pointer for PSP allow escalation #53443
Use pointer for PSP allow escalation #53443
Conversation
db329be
to
8dd3647
Compare
@@ -975,9 +975,9 @@ type PodSecurityPolicySpec struct { | |||
// +optional | |||
DefaultAllowPrivilegeEscalation *bool `json:"defaultAllowPrivilegeEscalation,omitempty" protobuf:"varint,15,opt,name=defaultAllowPrivilegeEscalation"` | |||
// AllowPrivilegeEscalation determines if a pod can request to allow | |||
// privilege escalation. | |||
// privilege escalation. If unspecified, defaults to true. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this an API change? undefined was leading to false
before.
Moreover, I expected to be safe by default, i.e. default to false.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Prior to 1.8, AllowPrivilegeEscalation
was implicitly always true. But I think this needs to be true to fix #53437, which motivated this change.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this an API change? undefined was leading to false before.
Correct, which was a breaking change in 1.8.0.
Moreover, I expected to be safe by default, i.e. default to false.
Compatibility wins. The ability to restrict this did not exist prior to 1.8.0, so policies that do not include this field must continue pre-1.8.0 behavior.
cc @kubernetes/sig-auth-api-reviews @kubernetes/api-reviewers |
@jessfraz @tallclair PTAL |
pkg/apis/extensions/types.go
Outdated
// +optional | ||
AllowPrivilegeEscalation bool | ||
AllowPrivilegeEscalation *bool |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you leave it bool on the internal type?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
since we're defaulting... maybe... will try
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See:
kubernetes/staging/src/k8s.io/apimachinery/pkg/apis/meta/v1/conversion.go
Lines 141 to 148 in 6039c79
func Convert_Pointer_bool_To_bool(in **bool, out *bool, s conversion.Scope) error { | |
if *in == nil { | |
*out = false | |
return nil | |
} | |
*out = **in | |
return nil | |
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah, updated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for fixing this Jordan. How does an API change like this work mid-release? Is it OK since the it's backwards compatible with the serialized (json & proto) formats?
@@ -975,9 +975,9 @@ type PodSecurityPolicySpec struct { | |||
// +optional | |||
DefaultAllowPrivilegeEscalation *bool `json:"defaultAllowPrivilegeEscalation,omitempty" protobuf:"varint,15,opt,name=defaultAllowPrivilegeEscalation"` | |||
// AllowPrivilegeEscalation determines if a pod can request to allow | |||
// privilege escalation. | |||
// privilege escalation. If unspecified, defaults to true. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Prior to 1.8, AllowPrivilegeEscalation
was implicitly always true. But I think this needs to be true to fix #53437, which motivated this change.
8dd3647
to
dff5e76
Compare
in 1.8.0, the only value serialized is true (false is omitted)
|
dff5e76
to
bed6d0f
Compare
API changes approved /approve |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, smarterclayton, tallclair Associated issue: 53437 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
LGTM thanks for doing this |
Automatic merge from submit-queue (batch tested with PRs 53454, 53446, 52935, 53443, 52917). If you want to cherry-pick this change to another branch, please follow the instructions here. |
Commit found in the "release-1.8" branch appears to be this PR. Removing the "cherrypick-candidate" label. If this is an error find help to get your PR picked. |
Fixes #53437
The
AllowPrivilegeEscalation
field was added to PodSpec and PodSecurityPolicySpec in 1.8.0.In order to remain compatible with pre-1.8.0 behavior, PodSecurityPolicy objects created against a previous release must not restrict this field, which means the field must default to true in PodSecurityPolicySpec. However, the field was added as a
bool
, not a*bool
, which means that no defaulting is possible.We have two options:
*bool
and default it to true.This PR does the latter. With this change, we have the following behavior:
A 1.8.1+ client/server now has three ways to serialize:
nil
values are dropped from serialization (becauseomitempty
), which is interpreted correctly by other 1.8.1+ clients/servers, and is interpreted as false by 1.8.0false
values are serialized and interpreted correctly by all clients/serverstrue
values are serialized and interpreted correctly by all clients/serversA 1.8.0 client/server has two ways to serialize:
false
values are dropped from serialization (becauseomitempty
), which is interpreted asfalse
by other 1.8.0 clients/servers, but asnil
(and therefore defaulting to true) by 1.8.1+ clients/serverstrue
values are serialized and interpreted correctly by all clients/serversThe primary concern is the 1.8.0 server dropping the
false
value from serialization, but I consider the compatibility break with pre-1.8 behavior to be more severe, especially if we can resolve the regression in an immediate point release.