Skip to content

Commit 2e09dc9

Browse files
committed
sig-auth: 2022 annual report
Signed-off-by: Anish Ramasekar <[email protected]>
1 parent 736c519 commit 2e09dc9

File tree

1 file changed

+53
-35
lines changed

1 file changed

+53
-35
lines changed

sig-auth/annual-report-2022.md

Lines changed: 53 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -4,25 +4,47 @@
44

55
1. What work did the SIG do this year that should be highlighted?
66

7-
-
8-
-
9-
-
7+
- `kubectl create token` can be used to request a service account token [starting v1.24](https://github.com/kubernetes/kubernetes/pull/107880), and permission to request service account tokens is added to the `edit` and `admin` RBAC roles.
8+
- The CertificateSigningRequest `spec.expirationSeconds` API field has graduated to GA [in v1.24](https://github.com/kubernetes/kubernetes/pull/108782).
9+
- The `client.authentication.k8s.io/v1alpha1` ExecCredential has been removed [in v1.24](https://github.com/kubernetes/kubernetes/pull/108616). If you are using a client-go credential plugin that relies on the v1alpha1 API please contact the distributor of your plugin for instructions on how to migrate to the v1 API.
10+
- The `LegacyServiceAccountTokenNoAutoGeneration` feature gate is beta, and enabled by default [in v1.24](https://github.com/kubernetes/kubernetes/pull/108309). When enabled, Secret API objects containing service account tokens are no longer auto-generated for every ServiceAccount. Use the TokenRequest API to acquire service account tokens, or if a non-expiring token is required, create a Secret API object for the token controller to populate with a service account token by following this [guide](https://kubernetes.io/docs/concepts/configuration/secret/#service-account-token-secrets).
11+
- Kube-apiserver: `--audit-log-version` and `--audit-webhook-version` only support the default value of `audit.k8s.io/v1` [starting v1.24](https://github.com/kubernetes/kubernetes/pull/108092). The v1alpha1 and v1beta1 audit log versions, deprecated since 1.13, have been removed.
12+
- The `gcp` and `azure` auth plugins have been removed from client-go and kubectl [in v1.26](https://github.com/kubernetes/kubernetes/pull/110013). See https://github.com/Azure/kubelogin and https://cloud.google.com/blog/products/containers-kubernetes/kubectl-auth-changes-in-gke.
13+
- If the parent directory of the file specified in the `--audit-log-path` argument does not exist, Kubernetes now creates it [starting v1.25](https://github.com/kubernetes/kubernetes/pull/110813).
14+
- KMS v2alpha1 API added [in v1.25](https://github.com/kubernetes/kubernetes/pull/111126).
15+
- API server's deprecated `--service-account-api-audiences` flag is removed [in v1.25](https://github.com/kubernetes/kubernetes/pull/108624). Use `--api-audiences` instead.
16+
- As [of v1.25](https://github.com/kubernetes/kubernetes/pull/105919), the PodSecurity `restricted` level no longer requires pods that set .spec.os.name="windows" to also set Linux-specific securityContext fields. If a 1.25+ cluster has unsupported [out-of-skew](https://kubernetes.io/releases/version-skew-policy/#kubelet) nodes prior to v1.23 and wants to ensure namespaces enforcing the `restricted` policy continue to require Linux-specific securityContext fields on all pods, ensure a version of the `restricted` prior to v1.25 is selected by labeling the namespace (for example, `pod-security.kubernetes.io/enforce-version: v1.24`).
17+
- The PodSecurity admission plugin has graduated to GA and is enabled by default [in v1.25](https://github.com/kubernetes/kubernetes/pull/110459). The admission configuration version has been promoted to `pod-security.admission.config.k8s.io/v1`.
18+
- The beta `PodSecurityPolicy` admission plugin, deprecated since 1.21, is removed [in v1.25](https://github.com/kubernetes/kubernetes/pull/109798). Follow the instructions at https://kubernetes.io/docs/tasks/configure-pod-container/migrate-from-psp/ to migrate to the built-in PodSecurity admission plugin (or to another third-party policy webhook) prior to upgrading to v1.25.
19+
- Return a warning when applying a `pod-security.kubernetes.io` label to a PodSecurity-exempted namespace. Stop including the `pod-security.kubernetes.io/exempt=namespace` audit annotation on namespace requests [in v1.25](https://github.com/kubernetes/kubernetes/pull/109680)
20+
- Kube-controller-manager's deprecated `--experimental-cluster-signing-duration` flag is removed [in v1.25](https://github.com/kubernetes/kubernetes/pull/108476). Adapt your machinery to use the `--cluster-signing-duration` flag that is available since v1.19.
21+
- Add auth API to get self subject attributes (new selfsubjectreviews API is added). The corresponding command for kubectl - `kubectl auth whoami` is provided [in v1.26](https://github.com/kubernetes/kubernetes/pull/111333)
22+
- Kube-apiserver: custom resources can be specified in the `--encryption-provider-config` file and can be encrypted in etcd [starting v1.26](https://github.com/kubernetes/kubernetes/pull/113015).
23+
- When the alpha LegacyServiceAccountTokenTracking feature gate is enabled, secret-based service account tokens will have a `kubernetes.io/legacy-token-last-used` applied to them containing the date they were last used [starting v1.26](https://github.com/kubernetes/kubernetes/pull/108858)
24+
- A new API server flag `--encryption-provider-config-automatic-reload` has been added [in v1.26](https://github.com/kubernetes/kubernetes/pull/113529) to control when the encryption config should be automatically reloaded without needing to restart the server. All KMS plugins are merged into a single healthz check at /healthz/kms-providers when reload is enabled, or when only KMS v2 plugins are used.
25+
- The `LegacyServiceAccountTokenNoAutoGeneration` feature gate has been promoted to GA [in v1.26](https://github.com/kubernetes/kubernetes/pull/112838).
26+
- Pod Security admission: the pod-security `warn` level will default to the `enforce` level [starting v1.26](https://github.com/kubernetes/kubernetes/pull/113491).
27+
- Kubectl config view now automatically redacts any secret fields marked with a datapolicy tag [starting v1.26](https://github.com/kubernetes/kubernetes/pull/109189).
28+
- Introduce v1alpha1 API for validating admission policies [in v1.26](https://github.com/kubernetes/kubernetes/pull/113314), enabling extensible admission control via CEL expressions (KEP 3488: CEL for Admission Control). To use, enable the ValidatingAdmissionPolicy feature gate and the `admissionregistration.k8s.io/v1alpha1` API via `--runtime-config`.
29+
- Callers using DelegatingAuthenticationOptions can use DisableAnonymous to disable Anonymous authentication [in v1.26](https://github.com/kubernetes/kubernetes/pull/112181).
1030

11-
2. What initiatives are you working on that aren't being tracked in KEPs?
1231

13-
-
14-
-
15-
-
32+
2. What initiatives are you working on that aren't being tracked in KEPs?
1633

34+
- Once a week issue/PR triage meetings.
35+
- [Automation of the project board population](https://github.com/kubernetes-sigs/sig-auth-tools)
1736

1837

1938
3. KEP work in 2022 (v1.24, v1.25, v1.26):
20-
- alpha:
39+
- pre-alpha:
2140
- [2718 - Client Executable Proxy](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/2718-20210511-client-exec-proxy) - v1.26
22-
- [3130 - KMS Observability](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3130-kms-observability) - v1.24
41+
- alpha:
42+
- [3299 - KMS v2 Improvements](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3299-kms-v2-improvements) - v1.25
43+
- [3325 - Self subject review API](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3325-self-subject-attributes-review-api) - v1.26
2344
- stable:
2445
- [2579 - PSP Replacement Policy](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/2579-psp-replacement) - v1.25
2546
- [2784 - CSR Duration](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/2784-csr-duration) - v1.24
47+
- [2799 - Reduction of Secret-based Service Account Tokens](https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/2799-reduction-of-secret-based-service-account-token) - v1.26
2648

2749

2850
## Project health
@@ -36,23 +58,22 @@
3658

3759
2. What metrics/community health stats does your group care about and/or measure?
3860

39-
-
40-
-
41-
-
61+
- Based on devstats [Issue Velocity / Inactive Issues by SIG for 90 days or more](https://k8s.devstats.cncf.io/d/73/inactive-issues-by-sig?orgId=1&var-sigs=%22auth%22) at the time of writing this report, average is 8.
62+
- Based on devstats [PR Velocity / Awaiting PRs by SIG for 90 days or more](https://k8s.devstats.cncf.io/d/70/awaiting-prs-by-sig?orgId=1&var-sigs=%22auth%22) at the time of writing this report, average is 75.
4263

4364
3. Does your [CONTRIBUTING.md] help **new** contributors engage with your group specifically by pointing
4465
to activities or programs that provide useful context or allow easy participation?
4566

46-
-
67+
- Currently there is no onboarding or growth path. This is something we are working on and learning from other SIGs.
4768

4869
4. If your group has special training, requirements for reviewers/approvers, or processes beyond the general [contributor guide],
4970
does your [CONTRIBUTING.md] document those to help **existing** contributors grow throughout the [contributor ladder]?
5071

51-
-
72+
- Currently there is no onboarding or growth path. This is something we are working on and learning from other SIGs.
5273

5374
5. Does the group have contributors from multiple companies/affiliations?
5475

55-
-
76+
- Yes. Our chairs, leads, contributors, participants, and subproject owners are from various companies.
5677

5778
6. Are there ways end users/companies can contribute that they currently are not?
5879
If one of those ways is more full time support, what would they work on and why?
@@ -62,22 +83,21 @@
6283

6384
## Membership
6485

65-
- Primary slack channel member count:
66-
- Primary mailing list member count:
67-
- Primary meeting attendee count (estimated, if needed):
68-
- Primary meeting participant count (estimated, if needed):
69-
- Unique reviewers for SIG-owned packages: <!-- in future, this will be generated from OWNERS files referenced from subprojects, expanded with OWNERS_ALIASES files -->
70-
- Unique approvers for SIG-owned packages: <!-- in future, this will be generated from OWNERS files referenced from subprojects, expanded with OWNERS_ALIASES files -->
86+
- Primary slack channel member count: 2847
87+
- Primary mailing list member count: 462
88+
- Primary meeting attendee count (estimated, if needed): 20 ~ 30
89+
- Primary meeting participant count (estimated, if needed): 5 ~ 10
90+
- Unique reviewers for SIG-owned packages: 15
91+
- Unique approvers for SIG-owned packages: 7
7192

7293
Include any other ways you measure group membership
7394

7495
## [Subprojects](https://git.k8s.io/community/sig-auth#subprojects)
7596

76-
77-
7897
**New in 2022:**
7998

80-
- sig-auth-tools
99+
- [sig-auth-tools](https://github.com/kubernetes-sigs/sig-auth-tools)
100+
- [pspmigrator](https://github.com/kubernetes-sigs/pspmigrator)
81101

82102
**Continuing:**
83103

@@ -98,24 +118,22 @@ Include any other ways you measure group membership
98118

99119

100120
**Continuing:**
101-
102-
- Multitenancy
103-
- Policy
121+
- All working groups under https://github.com/kubernetes/community/blob/master/sig-auth/README.md#working-groups have continued.
104122

105123
## Operational
106124

107125
Operational tasks in [sig-governance.md]:
108126

109-
- [ ] [README.md] reviewed for accuracy and updated if needed
110-
- [ ] [CONTRIBUTING.md] reviewed for accuracy and updated if needed
127+
- [x] [README.md] reviewed for accuracy and updated if needed
128+
- [x] [CONTRIBUTING.md] reviewed for accuracy and updated if needed
111129
(or created if missing and your contributor steps and experience are different or more
112130
in-depth than the documentation listed in the general [contributor guide] and [devel] folder.)
113-
- [ ] Subprojects list and linked OWNERS files in [sigs.yaml] reviewed for accuracy and updated if needed
114-
- [ ] SIG leaders (chairs, tech leads, and subproject owners) in [sigs.yaml] are accurate and active, and updated if needed
115-
- [ ] Meeting notes and recordings for 2022 are linked from [README.md] and updated/uploaded if needed
116-
- [ ] Did you have community-wide updates in 2022 (e.g. community meetings, kubecon, or kubernetes-dev@ emails)? Links to email, slides, or recordings:
117-
-
118-
-
131+
- [x] Subprojects list and linked OWNERS files in [sigs.yaml] reviewed for accuracy and updated if needed
132+
- [x] SIG leaders (chairs, tech leads, and subproject owners) in [sigs.yaml] are accurate and active, and updated if needed
133+
- [x] Meeting notes and recordings for 2022 are linked from [README.md] and updated/uploaded if needed
134+
- [x] Did you have community-wide updates in 2022 (e.g. community meetings, kubecon, or kubernetes-dev@ emails)? Links to email, slides, or recordings:
135+
- 2022 Kubecon EU Virtual - [SIG Auth Deep Dive](https://sched.co/ytpT) [session recording](https://youtu.be/C3Ak35W55m0)
136+
- 2022 Kubecon NA - [SIG Auth Deep Dive](https://sched.co/182PB) [session recording](https://youtu.be/QbqpPZxDKDw)
119137

120138
[CONTRIBUTING.md]: https://git.k8s.io/community/sig-auth/CONTRIBUTING.md
121139
[contributor ladder]: https://git.k8s.io/community/community-membership.md

0 commit comments

Comments
 (0)