|
12 | 12 | - Governance and leadership changes
|
13 | 13 | -->
|
14 | 14 |
|
| 15 | + - No governance or leadership changes. |
| 16 | + - The `SecurityContextDeny` admission plugin was removed [in v1.30](https://github.com/kubernetes/kubernetes/pull/122612) after being deprecated in v1.27. The **Pod Security Admission plugin**, available since v1.25, is recommended instead. |
| 17 | + - Updated an audit annotation key used by the `…/serviceaccounts/<name>/token` resource handler [in v1.30](https://github.com/kubernetes/kubernetes/pull/123098). The annotation used to persist the issued credential identifier is now `authentication.kubernetes.io/issued-credential-id`. |
| 18 | + - Added support for configuring multiple JWT authenticators in Structured Authentication Configuration [in v1.30](https://github.com/kubernetes/kubernetes/pull/123431). The maximum allowed JWT authenticators in the authentication configuration is 64. |
| 19 | + - The `AuthorizationConfiguration` type accepted in --`authorization-config` files has been promoted to `apiserver.config.k8s.io/v1` [in v1.32](https://github.com/kubernetes/kubernetes/pull/128172). |
| 20 | + - Allowed creating ServiceAccount tokens bound to Node objects [in v1.31](https://github.com/kubernetes/kubernetes/pull/125238). This allows users to bind a service account token's validity to a named Node object, similar to Pod bound tokens. Use with `kubectl create token <serviceaccount-name> --bound-object-kind=Node --bound-object-node=<node-name>`. |
| 21 | + - When the alpha `UserNamespacesPodSecurityStandards` feature gate is enabled, Pod Security Admission enforcement of the baseline policy now allows `procMount=Unmasked` for user namespace pods that set `hostUsers=false` starting [in v1.31](https://github.com/kubernetes/kubernetes/pull/126163). |
| 22 | + - Starting [in v1.31](https://github.com/kubernetes/kubernetes/pull/126165), `container_engine_t` is in the list of allowed SELinux types in the baseline Pod Security Standards profile. |
| 23 | + - Starting [in v1.31](https://github.com/kubernetes/kubernetes/pull/126441), the Node Admission plugin rejects CSR requests created by a node identity for the signers `kubernetes.io/kubelet-serving` or `kubernetes.io/kube-apiserver-client-kubelet` with a CN starting with `system:node:`, but where the CN is not `system:node:${node-name}`. The feature gate `AllowInsecureKubeletCertificateSigningRequests` defaults to false, but can be enabled to revert to the previous behavior. This feature gate will be removed in Kubernetes v1.33. |
| 24 | + - Disallow `k8s.io` and `kubernetes.io` namespaced extra key in structured authentication configuration starting [in v1.32](https://github.com/kubernetes/kubernetes/pull/126553). |
| 25 | + - Starting [in v1.32](https://github.com/kubernetes/kubernetes/pull/128077), NodeRestriction admission validates the audience value that kubelet is requesting a service account token for is part of the pod spec volume. This change is introduced with a new kube-apiserver featuregate `ServiceAccountNodeAudienceRestriction` that's enabled by default in v1.32. |
| 26 | + - The feature gate `ServiceAccountNodeAudienceRestriction` was disabled by default in v1.32.2 to fix a regression. It is enabled by default in v1.33+. |
| 27 | + - Added a new SIG Auth subproject: [Secrets Store Sync Controller](https://sigs.k8s.io/secrets-store-sync-controller), a Kubernetes controller to sync from external secrets store to Kubernetes secrets. |
| 28 | + - Important initiatives that aren't tracked via KEPs: |
| 29 | + - Once a week issue/PR triage meetings. |
| 30 | + |
15 | 31 | 2. Are there any areas and/or subprojects that your group needs help with (e.g. fewer than 2 active OWNERS)?
|
16 | 32 |
|
| 33 | + - The [Needs KEP / release work #sig-auth](https://docs.google.com/document/d/1sY8fRyRtk4eG9R439z5ao5i9bFuuxilS03XaNlqoni0/edit?usp=sharing) document lists multiple areas that need help and some currently have volunteers working on them. |
17 | 34 |
|
18 | 35 | 3. Did you have community-wide updates in 2024 (e.g. KubeCon talks)?
|
19 | 36 |
|
20 | 37 | <!--
|
21 | 38 | Examples include links to email, slides, or recordings.
|
22 | 39 | -->
|
23 | 40 |
|
| 41 | + - [KubeCon EU 2024] - [Safety or Usability: Why Not Both? Towards Referential Auth in K8s - Rob Scott, Google & Mo Khan](https://youtu.be/HLWXuV3vJRg) |
| 42 | + - [KubeCon NA 2024] - [Pushing Authorization Further: CEL, Selectors and Maybe RBAC++ - Mo Khan, Rita Zhang, Jordan Liggitt](https://youtu.be/pIrJRPv-Wbg) |
| 43 | + |
24 | 44 | 4. KEP work in 2024 (v1.30, v1.31, v1.32):
|
25 | 45 | <!--
|
26 | 46 | TODO: Uncomment the following auto-generated list of KEPs, once reviewed & updated for correction.
|
|
30 | 50 | Please raise an issue in kubernetes/community, if the KEP metadata is correct but the generated list is incorrect.
|
31 | 51 | -->
|
32 | 52 |
|
33 |
| -<!-- |
| 53 | + - Pre-Alpha |
| 54 | + - [4317 - Pod Certificates](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/4317-pod-certificates) |
| 55 | + - [4412 - Projected service account tokens for Kubelet image credential providers](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/4412-projected-service-account-tokens-for-kubelet-image-credential-providers) |
| 56 | + |
34 | 57 | - Alpha
|
35 | 58 | - [3926 - Handling undecryptable resources](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3926-handling-undecryptable-resources) - v1.32
|
36 |
| - - [4317 - Pod Certificates](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/4317-pod-certificates) - v1.32 |
37 | 59 | - [740 - Support external signing of service account tokens](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/740-service-account-external-signing) - v1.32
|
38 | 60 |
|
39 | 61 | - Beta
|
|
44 | 66 | - Stable
|
45 | 67 | - [2799 - Reduction of Secret-based Service Account Tokens](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/2799-reduction-of-secret-based-service-account-token) - v1.30
|
46 | 68 | - [3221 - Structured Authorization Configuration](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3221-structured-authorization-configuration) - v1.32
|
47 |
| - - [4193 - bound service account token improvements](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/4193-bound-service-account-token-improvements) - v1.32 --> |
| 69 | + - [4193 - bound service account token improvements](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/4193-bound-service-account-token-improvements) - v1.32 |
48 | 70 |
|
49 | 71 | ## [Subprojects](https://git.k8s.io/community/sig-auth#subprojects)
|
50 | 72 |
|
51 |
| - |
52 | 73 | **New in 2024:**
|
53 | 74 | - secrets-store-sync-controller
|
| 75 | + |
54 | 76 | **Continuing:**
|
55 | 77 | - audit-logging
|
56 | 78 | - authenticators
|
57 | 79 | - authorizers
|
58 | 80 | - certificates
|
59 | 81 | - encryption-at-rest
|
60 |
| - - hierarchical-namespace-controller |
61 | 82 | - node-identity-and-isolation
|
62 | 83 | - policy-management
|
63 | 84 | - secrets-store-csi-driver
|
64 | 85 | - service-accounts
|
65 | 86 | - sig-auth-tools
|
66 | 87 |
|
| 88 | +**Archiving in 2025:** |
| 89 | + - hierarchical-namespace-controller |
| 90 | + |
67 | 91 | ## [Working groups](https://git.k8s.io/community/sig-auth#working-groups)
|
68 | 92 |
|
69 | 93 | **Continuing:**
|
|
72 | 96 | ## Operational
|
73 | 97 |
|
74 | 98 | Operational tasks in [sig-governance.md]:
|
75 |
| -- [ ] [README.md] reviewed for accuracy and updated if needed |
76 |
| -- [ ] [CONTRIBUTING.md] reviewed for accuracy and updated if needed |
77 |
| -- [ ] Other contributing docs (e.g. in devel dir or contributor guide) reviewed for accuracy and updated if needed |
78 |
| -- [ ] Subprojects list and linked OWNERS files in [sigs.yaml] reviewed for accuracy and updated if needed |
79 |
| -- [ ] SIG leaders (chairs, tech leads, and subproject leads) in [sigs.yaml] are accurate and active, and updated if needed |
80 |
| -- [ ] Meeting notes and recordings for 2024 are linked from [README.md] and updated/uploaded if needed |
81 | 99 |
|
| 100 | +- [x] [README.md] reviewed for accuracy and updated if needed |
| 101 | +- [x] [CONTRIBUTING.md] reviewed for accuracy and updated if needed |
| 102 | +- [x] Other contributing docs (e.g. in devel dir or contributor guide) reviewed for accuracy and updated if needed |
| 103 | +- [x] Subprojects list and linked OWNERS files in [sigs.yaml] reviewed for accuracy and updated if needed |
| 104 | +- [x] SIG leaders (chairs, tech leads, and subproject leads) in [sigs.yaml] are accurate and active, and updated if needed |
| 105 | +- [x] Meeting notes and recordings for 2024 are linked from [README.md] and updated/uploaded if needed |
82 | 106 |
|
83 | 107 | [CONTRIBUTING.md]: https://git.k8s.io/community/sig-auth/CONTRIBUTING.md
|
84 | 108 | [sig-governance.md]: https://git.k8s.io/community/committee-steering/governance/sig-governance.md
|
|
0 commit comments