-
Notifications
You must be signed in to change notification settings - Fork 39.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UserInfo.UID is not passed by client-go #93699
Comments
/sig auth |
Hey 👋 Bug Triage here. Wanted to follow up on the status of this issue as we're approaching code freeze on 12.11.2020. This issue is tagged for 1.20, is it still planned for this release? |
no, it is not /milestone clear |
/cc @carlory |
/assign I need to break down the different pieces of work required to fix this. |
There are two main tracks of work. UID impersonation (assigned to @margocrawf)
UID request header (assigned to @benjaminapetersen)
/assign @margocrawf @benjaminapetersen |
@enj: GitHub didn't allow me to assign the following users: margocrawf, benjaminapetersen. Note that only kubernetes members, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/unassign @mikedanese |
/assign |
@reith @enj @dims hi folks, 1.28 Bug Triage Lead here 👋🏼 This issue has not been updated for a long time, so I'd like to check what's the status and if there are plans moving it forward. Please be aware that the code freeze is starting 01:00 UTC Wednesday 19th July 2023 / 18:00 PDT Tuesday 18th July 2023 (about less than 2 weeks from now). As the issue is tagged for 1.28, is it still planned for this release? |
Howdy 👋 |
Week 9 update: Code Freeze is approaching! Hey! We are currently in Week 9, and Code Freeze is just over a week away. It will begin at 01:00 UTC on Wednesday, 19th July 2023 / 18:00 PDT on Tuesday, 18th July 2023. Please ensure all necessary submissions are made before the deadline. Let me know if you need any assistance. :) |
Sadly missed code freeze on this one. /milestone next-candidate |
/milestone v1.29 |
Hello @enj ! 👋🏼 As the issue is tagged for 1.29, is it still planned for that release? |
Hello @enj ! 👋🏼 As the issue is tagged for 1.29, is it still planned for that release? |
/milestone v1.30 kicking the can, we are way past code freeze |
Hi there! 👋🏼 Is this issue still intended for this release, given that it is labeled for 1.30? |
Hello! |
We are past the code freeze stage. Moving this to the next release. /milestone v1.31 |
Hello @enj ! This issue has not been updated for a long time, so I'd like to check what's the status. The code freeze is starting As the issue is tagged for |
This issue hasn't been updated in a while. What's the current status? Reminder: Code freeze starts |
Hello Wendy, |
/milestone v1.32 |
It looks UserInfo.UID is newer than other fields and while #49677 added it SubjectAccessReviewSpec for webhook authorization, it's still not being sent by client-go in headers. Also there is no flag in APIServer to process those headers. As a result all authorizers needing that, may not work correctly for SubjectAccessReviews made by kube-aggregator extensions.
What happened:
Our webhook authorizer, authorizes users using UserInfo.UID. It's missing in SubjectAccessReviews created by kube-aggregator extensions (our case was state metrics), resulting authorizer to not work.
What you expected to happen:
I except All fields that is filled by authenticator be present for authorizer and I think it's valid to have an authorizer to use UID.
How to reproduce it (as minimally and precisely as possible):
Make authentication webhook that fills SubjectAccessReviewSpec.UID. You will see there UID is missing from SubjectAccessReviewSpecs made by a kube-aggregator extension.
Anything else we need to know?:
UserInfo.UID is not passed to client-go round-tripper here and here and impersonate config do nothing for it. There is also no api-server flag to get it from headers.
The text was updated successfully, but these errors were encountered: