Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

convert ServerAuthorizations to AuthorizationPolicies #10079

Merged
merged 7 commits into from
Jan 11, 2023

Conversation

adleong
Copy link
Member

@adleong adleong commented Jan 5, 2023

The Linkerd extension charts use ServerAuthorization resources. AuthorizationPolicies are now the recommended resource to use in favor of ServerAuthorizations. We replace all of the ServerAuthorization resources in the Linkerd extension charts with AuthorizationPolicy resources.

Signed-off-by: Alex Leong alex@buoyant.io

Signed-off-by: Alex Leong <alex@buoyant.io>
Signed-off-by: Alex Leong <alex@buoyant.io>
Signed-off-by: Alex Leong <alex@buoyant.io>
Signed-off-by: Alex Leong <alex@buoyant.io>
@adleong adleong requested a review from a team as a code owner January 5, 2023 01:22
Base automatically changed from alex/remove-admin-policies to main January 10, 2023 20:47
Copy link
Member

@alpeb alpeb left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, just one comment about a comment 👍

Comment on lines 53 to 54
# Ideally, this should be restricted to the actual set of IPs the kubelet API
# server uses for webhooks in a cluster. This can't easily be discovered.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IIUC, this actually targets the kube-api, not the kubelet.

Signed-off-by: Alex Leong <alex@buoyant.io>
Signed-off-by: Alex Leong <alex@buoyant.io>
Signed-off-by: Alex Leong <alex@buoyant.io>
@adleong adleong merged commit 52fb2c6 into main Jan 11, 2023
@adleong adleong deleted the alex/rm-server-authorization branch January 11, 2023 23:07
adleong added a commit that referenced this pull request Apr 5, 2023
Fixes #10612

The Linkerd multicluster gateway chart contains an AuthorizationPolicy for allowing probes to the gateway from remote linked clusters.  However, now that probes are automatically authorized, this explicit AuthorizationPolicy is no longer necessary.  Many such probe authorization resources were removed in #10079 but this one remained and, in fact, became a duplicate of the regular gateway AuthorizationPolicy.

Since probe authorizations are no longer explicitly necessary, this duplicate policy can be removed.

Signed-off-by: Alex Leong <alex@buoyant.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants