-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add groups to service account user.Info #8607
Conversation
265cfa9
to
5a4b7be
Compare
/cc @pweil- the |
@erictune PTAL |
/cc @deads2k |
5a4b7be
to
2d001cc
Compare
I'm not sure I like including group information the token itself. I'm worried that someone would take the next step and allow the specification of group names. Maybe if we forced any custom groups to be prefixed by the |
UID: serviceAccountUID, | ||
Groups: []string{}, | ||
}, true, nil | ||
return UserInfo(namespace, serviceAccountName, serviceAccountUID), true, nil |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If there is a group claim in the token, shouldn't we be respecting it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I waffled on the claim... removed it until I can think through it more
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
will take a look tonight
On Thu, May 21, 2015 at 2:26 PM, Jordan Liggitt notifications@github.com
wrote:
In pkg/serviceaccount/jwt.go
#8607 (comment)
:@@ -216,11 +205,7 @@ func (j *jwtTokenAuthenticator) AuthenticateToken(token string) (user.Info, bool
}
}
return &user.DefaultInfo{
Name: sub,
UID: serviceAccountUID,
Groups: []string{},
}, true, nil
return UserInfo(namespace, serviceAccountName, serviceAccountUID), true, nil
I waffled on the claim... removed it until I can think through it more
—
Reply to this email directly or view it on GitHub
https://github.com/GoogleCloudPlatform/kubernetes/pull/8607/files#r30849532
.
2d001cc
to
2726e25
Compare
Can one of the admins verify that this patch is reasonable to test? (reply "ok to test", or if you trust the user, reply "add to whitelist") If this message is too spammy, please complain @ixdy. |
2726e25
to
7310245
Compare
Is this needed for things other than #7893? If so, give use case? |
Use cases:
|
I think this makes sense, but at this point, I'm going to defer this till after 1.0. |
5ce8a9b
to
657d9df
Compare
657d9df
to
30b2655
Compare
GCE e2e build/test passed for commit 30b2655fa9efda8c65ebe003157770b70354482c. |
@deads2k rebased |
lgtm |
@erictune label lgtm, or tag a second reviewer? |
30b2655
to
9bef018
Compare
GCE e2e build/test failed for commit 9bef0188747ad379ba02b94cd5c242f6260710a1. |
9bef018
to
709c2c8
Compare
GCE e2e build/test passed for commit 709c2c8. |
@k8s-bot test this [contrib/submit-queue: candidate for merging] |
GCE e2e build/test passed for commit 709c2c8. |
@k8s-bot test this [contrib/submit-queue: candidate for merging] |
GCE e2e build/test failed for commit 709c2c8. |
Add groups to service account user.Info
system:
prefix to service account usernames to follow the pattern for other system-created usernamesuser.Info
returned from the JWT authenticatorsystem:serviceaccounts
, which is useful for granting authorization to all service accountssystem:serviceaccounts:<namespace>
, which is useful for granting authorization to all service accounts in a given namespace