-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
remove default authz ModeAlwaysAllow #61762
Conversation
@deads2k Indeed many test case failed just for this, should I fix them or just keep the AlwaysAllow authz mode there? |
Is it exposed as a default in the |
OK, got it, will work on fixing test cases. |
No, not any words at all. |
/retest flake case |
Looks like it may be a default value. How about starting a thread on the mailing list about changing the default to RBAC. It's stable now and used in all our e2e tests. |
I think you use an old version, newest does not saying that default https://github.com/kubernetes/kubernetes/blob/master/pkg/kubeapiserver/options/authorization.go#L93-L95.
That's ok. |
It is the current default. The help text prints the current value of the Modes variable, which is AlwayAllow by default |
Yes, it is the default behavior indeed. |
/retest |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: hzxuzhonghu Assign the PR to them by writing The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
changing default behavior is not something we typically do, especially for something that fundamentally changes the way you interact with a cluster like this. A good point at which to improve the default behavior would be when we move to starting the apiserver from a config file (proposal in progress), similar to what we did for the kubelet in #59666. I'd probably recommend the authorization mode be explicitly specified when starting from a config file, rather than defaulting to permissive mode or a particular authorizer. |
Thanks @liggitt for your clarification. |
Do not set default ModeAlwaysAllow authorization mode.
Release note: