-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEP-4193: Update milestone for v1.30 & clarify latest state #4470
Conversation
/lgtm |
/assign @deads2k |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit, LGTM
keps/sig-auth/4193-bound-service-account-token-improvements/README.md
Outdated
Show resolved
Hide resolved
…ADME.md Co-authored-by: Mo Khan <i@monis.app>
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
#prr-shadow
|
||
This JTI is then used for a further audit log lookup - namely, looking for the TokenRequest `create` call which contains | ||
the audit annotation with key `authentication.kubernetes.io/token-identifier` and the value set to that of the suspect token. | ||
the audit annotation with key `authentication.kubernetes.io/issued-credential-id` and the value set to that of the suspect token. | ||
|
||
This allows Bob to determine precisely who made the original request for this token, and (depending on the 'chain' | ||
above this token), allows Bob to recursively perform this lookup to find all involved parties that led to this token |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In the Test Plan
section, please:
- Make sure to check the checkbox in the first paragraph.
- Make sure to update the test coverage for modified packages in
Unit tests
. - Make sure to provide links for e2e and integration tests to testgrid.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've gone through and done all these, though for (3), this whole area (bound service account token issuance) doesn't have any e2e or conformance tests as it is - it's all being tested via integration tests at the moment.
Does that mean I should do the same here (which is already complete), or is e2e/conformance testing for all changes a new requirement added since we added bound tokens in ~1.21-ish?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've gone through and done all these, though for (3), this whole area (bound service account token issuance) doesn't have any e2e or conformance tests as it is - it's all being tested via integration tests at the moment.
Integration seems sufficient, but please make sure to link it in the appropriate section. About e2e I'll leave it up to you and auth approvers.
keps/sig-auth/4193-bound-service-account-token-improvements/README.md
Outdated
Show resolved
Hide resolved
The `ServiceAccountTokenNodeBindingValidation` feature will graduate to beta one release earlier than `ServiceAccountTokenNodeBinding` | ||
to ensure a safe rollback from version N+1 to N (more info below in rollback considerations section). | ||
|
||
All other feature flags can be disabled without any unexpected adverse affects or coordination required. | ||
|
||
###### How can this feature be enabled / disabled in a live cluster? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Further down in the doc, please:
- Answer the question
###### Were upgrade and rollback tested? Was the upgrade->downgrade->upgrade path tested?
. ###### What are other known failure modes?
should probably list the feature enablement ordering issue.###### What steps should be taken if SLOs are not being met to determine the problem?
needs an answerImplementation history
needs update
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
for (1), what kind of test should I actually perform at each stage of upgrade->downgrade->upgrade again? given this touches a subset of tokens that can be used to authenticate to an apiserver, is it sufficient to just test that these credentials are valid/invalid depending on the upgrade/downgrade (or enablement) status? Is simply enabling the gates and then disabling them again sufficient, or would you expect a full apiserver upgrade to be performed?
for (2), I've not included this as I've added an additional check into the apiserver to prevent startup if the wrong combination of gates is enabled (see #4470 (comment))
(3) and (4) have been completed
thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
for (1), what kind of test should I actually perform at each stage of upgrade->downgrade->upgrade again? given this touches a subset of tokens that can be used to authenticate to an apiserver, is it sufficient to just test that these credentials are valid/invalid depending on the upgrade/downgrade (or enablement) status? Is simply enabling the gates and then disabling them again sufficient, or would you expect a full apiserver upgrade to be performed?
yup, that sounds sufficient.
for (2), I've not included this as I've added an additional check into the apiserver to prevent startup if the wrong combination of gates is enabled (see #4470 (comment))
thank you!
(3) and (4) have been completed
thank you!
#prr-shadow
|
thanks! i've added a description of upgrade/downgrade (or rather, feature enablement/disablement) as well as links to integration tests. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
#prr-shadow
the prr lgtm
lgtm both for sig-auth and prr /tide merge-method-squash |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: deads2k, liggitt, munnerz The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
One-line PR description: Updating KEP milestone
Issue link: Bound service account token improvements #4193