-
Notifications
You must be signed in to change notification settings - Fork 40.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforce service account node audience restriction #128077
Enforce service account node audience restriction #128077
Conversation
@aramase: You must be a member of the kubernetes/milestone-maintainers GitHub team to set the milestone. If you believe you should be able to issue the /milestone command, please contact your Milestone Maintainers Team and have them propose you as an additional delegate for this responsibility. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
f82556b
to
8172295
Compare
/assign enj liggitt |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
First pass.
/milestone v1.32 |
LGTM label has been added. Git tree hash: 5f991c042629107ff4c66127fbbd5aa5785ea1f9
|
This PR may require API review. If so, when the changes are ready, complete the pre-review checklist and request an API review. Status of requested reviews is tracked in the API Review project. |
/label api-review |
/remove-label api-review I don't think this is touches API files |
Logic looks fine, a couple nits about output. Only outstanding question is the impact of the PVC informer... I suspect that's ~fine but wanted to raise the impact explicitly https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/4412-projected-service-account-tokens-for-kubelet-image-credential-providers/README.md#will-enabling--using-this-feature-result-in-non-negligible-increase-of-resource-usage-cpu-ram-disk-io--in-any-components specifically might need updating if kube-apiserver will now watch PVCs when it didn't previously |
203e3d7
to
f1de7c8
Compare
thanks for the review, @liggitt! I've updated the PR to resolve the comments and opened kubernetes/enhancements#4953 to update the KEP. |
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
…ienceRestriction=true Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
f1de7c8
to
e93d5d5
Compare
/lgtm |
LGTM label has been added. Git tree hash: 49564479529a548e9c43d1bf2f10cb3f50fd5920
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aramase, enj, liggitt The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@aramase: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/retest-required |
For visibility, this broke one of our node daemons using kubelet credentials to provision workload identity tokens for a workload identity audience. Before the escape hatch graduates / locks on, we either need a reasonable path to giving scoped service account token creation access to a daemonset (something along the lines of kubernetes/enhancements#4935) or a way to indicate audiences that should be allowed in addition to the API-visible ones (similar to #128678 but possibly more generalized). |
Enforce service account node audience restriction
ServiceAccountNodeAudienceRestriction
feature gate as beta (enabled by default).Today we don't do any validation on the audience value that the kubelet requested -> we only check that the SA is in use on some pod scheduled to the kubelet. As part of this KEP, we're introducing a new feature gate
ServiceAccountNodeAudienceRestriction
in KAS to validate the audience value that the kubelet requests is either part of any API spec/kind feature
/sig auth
/triage accepted
/milestone v1.32
/priority important-soon