Skip to content

Commit 7a0e1f6

Browse files
authored
Merge pull request #7429 from aramase/aramase/d/sig_auth_annual_report_2022
sig-auth: 2022 annual report
2 parents bc1c627 + 37e8781 commit 7a0e1f6

File tree

1 file changed

+55
-40
lines changed

1 file changed

+55
-40
lines changed

sig-auth/annual-report-2022.md

Lines changed: 55 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -4,80 +4,97 @@
44

55
1. What work did the SIG do this year that should be highlighted?
66

7-
-
8-
-
9-
-
7+
- `kubectl create token` can be used to request a service account token [starting v1.24](https://github.com/kubernetes/kubernetes/pull/107880), and permission to request service account tokens is added to the `edit` and `admin` RBAC roles.
8+
- The CertificateSigningRequest `spec.expirationSeconds` API field has graduated to GA [in v1.24](https://github.com/kubernetes/kubernetes/pull/108782).
9+
- The `client.authentication.k8s.io/v1alpha1` ExecCredential has been removed [in v1.24](https://github.com/kubernetes/kubernetes/pull/108616). If you are using a client-go credential plugin that relies on the v1alpha1 API please contact the distributor of your plugin for instructions on how to migrate to the v1 API.
10+
- The `LegacyServiceAccountTokenNoAutoGeneration` feature gate is beta, and enabled by default [in v1.24](https://github.com/kubernetes/kubernetes/pull/108309). When enabled, Secret API objects containing service account tokens are no longer auto-generated for every ServiceAccount. Use the TokenRequest API to acquire service account tokens, or if a non-expiring token is required, create a Secret API object for the token controller to populate with a service account token by following this [guide](https://kubernetes.io/docs/concepts/configuration/secret/#service-account-token-secrets).
11+
- Kube-apiserver: `--audit-log-version` and `--audit-webhook-version` only support the default value of `audit.k8s.io/v1` [starting v1.24](https://github.com/kubernetes/kubernetes/pull/108092). The v1alpha1 and v1beta1 audit log versions, deprecated since 1.13, have been removed.
12+
- The `gcp` and `azure` auth plugins have been removed from client-go and kubectl [in v1.26](https://github.com/kubernetes/kubernetes/pull/110013). See https://github.com/Azure/kubelogin and https://cloud.google.com/blog/products/containers-kubernetes/kubectl-auth-changes-in-gke.
13+
- If the parent directory of the file specified in the `--audit-log-path` argument does not exist, Kubernetes now creates it [starting v1.25](https://github.com/kubernetes/kubernetes/pull/110813).
14+
- KMS v2alpha1 API added [in v1.25](https://github.com/kubernetes/kubernetes/pull/111126).
15+
- API server's deprecated `--service-account-api-audiences` flag is removed [in v1.25](https://github.com/kubernetes/kubernetes/pull/108624). Use `--api-audiences` instead.
16+
- As [of v1.25](https://github.com/kubernetes/kubernetes/pull/105919), the PodSecurity `restricted` level no longer requires pods that set .spec.os.name="windows" to also set Linux-specific securityContext fields. If a 1.25+ cluster has unsupported [out-of-skew](https://kubernetes.io/releases/version-skew-policy/#kubelet) nodes prior to v1.23 and wants to ensure namespaces enforcing the `restricted` policy continue to require Linux-specific securityContext fields on all pods, ensure a version of the `restricted` prior to v1.25 is selected by labeling the namespace (for example, `pod-security.kubernetes.io/enforce-version: v1.24`).
17+
- The PodSecurity admission plugin has graduated to GA and is enabled by default [in v1.25](https://github.com/kubernetes/kubernetes/pull/110459). The admission configuration version has been promoted to `pod-security.admission.config.k8s.io/v1`.
18+
- The beta `PodSecurityPolicy` admission plugin, deprecated since 1.21, is removed [in v1.25](https://github.com/kubernetes/kubernetes/pull/109798). Follow the instructions at https://kubernetes.io/docs/tasks/configure-pod-container/migrate-from-psp/ to migrate to the built-in PodSecurity admission plugin (or to another third-party policy webhook) prior to upgrading to v1.25.
19+
- Return a warning when applying a `pod-security.kubernetes.io` label to a PodSecurity-exempted namespace. Stop including the `pod-security.kubernetes.io/exempt=namespace` audit annotation on namespace requests [in v1.25](https://github.com/kubernetes/kubernetes/pull/109680)
20+
- Kube-controller-manager's deprecated `--experimental-cluster-signing-duration` flag is removed [in v1.25](https://github.com/kubernetes/kubernetes/pull/108476). Adapt your machinery to use the `--cluster-signing-duration` flag that is available since v1.19.
21+
- Add auth API to get self subject attributes (new selfsubjectreviews API is added). The corresponding command for kubectl - `kubectl auth whoami` is provided [in v1.26](https://github.com/kubernetes/kubernetes/pull/111333)
22+
- Kube-apiserver: custom resources can be specified in the `--encryption-provider-config` file and can be encrypted in etcd [starting v1.26](https://github.com/kubernetes/kubernetes/pull/113015).
23+
- When the alpha LegacyServiceAccountTokenTracking feature gate is enabled, secret-based service account tokens will have a `kubernetes.io/legacy-token-last-used` applied to them containing the date they were last used [starting v1.26](https://github.com/kubernetes/kubernetes/pull/108858)
24+
- A new API server flag `--encryption-provider-config-automatic-reload` has been added [in v1.26](https://github.com/kubernetes/kubernetes/pull/113529) to control when the encryption config should be automatically reloaded without needing to restart the server. All KMS plugins are merged into a single healthz check at /healthz/kms-providers when reload is enabled, or when only KMS v2 plugins are used.
25+
- The `LegacyServiceAccountTokenNoAutoGeneration` feature gate has been promoted to GA [in v1.26](https://github.com/kubernetes/kubernetes/pull/112838).
26+
- Pod Security admission: the pod-security `warn` level will default to the `enforce` level [starting v1.26](https://github.com/kubernetes/kubernetes/pull/113491).
27+
- Kubectl config view now automatically redacts any secret fields marked with a datapolicy tag [starting v1.26](https://github.com/kubernetes/kubernetes/pull/109189).
28+
- Introduce v1alpha1 API for validating admission policies [in v1.26](https://github.com/kubernetes/kubernetes/pull/113314), enabling extensible admission control via CEL expressions (KEP 3488: CEL for Admission Control). To use, enable the ValidatingAdmissionPolicy feature gate and the `admissionregistration.k8s.io/v1alpha1` API via `--runtime-config`.
29+
- Callers using DelegatingAuthenticationOptions can use DisableAnonymous to disable Anonymous authentication [in v1.26](https://github.com/kubernetes/kubernetes/pull/112181).
1030

11-
2. What initiatives are you working on that aren't being tracked in KEPs?
1231

13-
-
14-
-
15-
-
32+
2. What initiatives are you working on that aren't being tracked in KEPs?
1633

34+
- Once a week issue/PR triage meetings.
35+
- [Automation of the project board population](https://github.com/kubernetes-sigs/sig-auth-tools)
1736

1837

1938
3. KEP work in 2022 (v1.24, v1.25, v1.26):
20-
- alpha:
39+
- pre-alpha:
2140
- [2718 - Client Executable Proxy](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/2718-20210511-client-exec-proxy) - v1.26
22-
- [3130 - KMS Observability](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3130-kms-observability) - v1.24
41+
- alpha:
42+
- [3299 - KMS v2 Improvements](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3299-kms-v2-improvements) - v1.25
43+
- [3325 - Self subject review API](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3325-self-subject-attributes-review-api) - v1.26
2344
- stable:
2445
- [2579 - PSP Replacement Policy](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/2579-psp-replacement) - v1.25
2546
- [2784 - CSR Duration](https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/2784-csr-duration) - v1.24
47+
- [2799 - Reduction of Secret-based Service Account Tokens](https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/2799-reduction-of-secret-based-service-account-token) - v1.26
2648

2749

2850
## Project health
2951

3052
1. What areas and/or subprojects does your group need the most help with?
3153
Any areas with 2 or fewer OWNERs? (link to more details)
3254

33-
-
34-
-
35-
-
55+
- The [Needs KEP / release work #sig-auth](https://docs.google.com/document/d/1sY8fRyRtk4eG9R439z5ao5i9bFuuxilS03XaNlqoni0/edit?usp=sharing) document lists multiple areas that need help and some currently have volunteers working on them.
3656

3757
2. What metrics/community health stats does your group care about and/or measure?
3858

39-
-
40-
-
41-
-
59+
- Based on devstats [Issue Velocity / Inactive Issues by SIG for 90 days or more](https://k8s.devstats.cncf.io/d/73/inactive-issues-by-sig?orgId=1&var-sigs=%22auth%22) at the time of writing this report, average is 8.
60+
- Based on devstats [PR Velocity / Awaiting PRs by SIG for 90 days or more](https://k8s.devstats.cncf.io/d/70/awaiting-prs-by-sig?orgId=1&var-sigs=%22auth%22) at the time of writing this report, average is 75.
4261

4362
3. Does your [CONTRIBUTING.md] help **new** contributors engage with your group specifically by pointing
4463
to activities or programs that provide useful context or allow easy participation?
4564

46-
-
65+
- Currently there is no onboarding or growth path. This is something we are working on and learning from other SIGs.
4766

4867
4. If your group has special training, requirements for reviewers/approvers, or processes beyond the general [contributor guide],
4968
does your [CONTRIBUTING.md] document those to help **existing** contributors grow throughout the [contributor ladder]?
5069

51-
-
70+
- Currently there is no onboarding or growth path. This is something we are working on and learning from other SIGs.
5271

5372
5. Does the group have contributors from multiple companies/affiliations?
5473

55-
-
74+
- Yes. Our chairs, leads, contributors, participants, and subproject owners are from various companies.
5675

5776
6. Are there ways end users/companies can contribute that they currently are not?
5877
If one of those ways is more full time support, what would they work on and why?
5978

60-
-
61-
-
79+
- We need help with enhancing onboarding guide, pull request reviews, and areas listed in the [Needs KEP / release work #sig-auth](https://docs.google.com/document/d/1sY8fRyRtk4eG9R439z5ao5i9bFuuxilS03XaNlqoni0/edit?usp=sharing) document.
6280

6381
## Membership
6482

65-
- Primary slack channel member count:
66-
- Primary mailing list member count:
67-
- Primary meeting attendee count (estimated, if needed):
68-
- Primary meeting participant count (estimated, if needed):
69-
- Unique reviewers for SIG-owned packages: <!-- in future, this will be generated from OWNERS files referenced from subprojects, expanded with OWNERS_ALIASES files -->
70-
- Unique approvers for SIG-owned packages: <!-- in future, this will be generated from OWNERS files referenced from subprojects, expanded with OWNERS_ALIASES files -->
83+
- Primary slack channel member count: 2847
84+
- Primary mailing list member count: 462
85+
- Primary meeting attendee count (estimated, if needed): 20 ~ 30
86+
- Primary meeting participant count (estimated, if needed): 5 ~ 10
87+
- Unique reviewers for SIG-owned packages: 15
88+
- Unique approvers for SIG-owned packages: 7
7189

7290
Include any other ways you measure group membership
7391

7492
## [Subprojects](https://git.k8s.io/community/sig-auth#subprojects)
7593

76-
77-
7894
**New in 2022:**
7995

80-
- sig-auth-tools
96+
- [sig-auth-tools](https://github.com/kubernetes-sigs/sig-auth-tools)
97+
- [pspmigrator](https://github.com/kubernetes-sigs/pspmigrator)
8198

8299
**Continuing:**
83100

@@ -98,24 +115,22 @@ Include any other ways you measure group membership
98115

99116

100117
**Continuing:**
101-
102-
- Multitenancy
103-
- Policy
118+
- All working groups under https://github.com/kubernetes/community/blob/master/sig-auth/README.md#working-groups have continued.
104119

105120
## Operational
106121

107122
Operational tasks in [sig-governance.md]:
108123

109-
- [ ] [README.md] reviewed for accuracy and updated if needed
110-
- [ ] [CONTRIBUTING.md] reviewed for accuracy and updated if needed
124+
- [x] [README.md] reviewed for accuracy and updated if needed
125+
- [x] [CONTRIBUTING.md] reviewed for accuracy and updated if needed
111126
(or created if missing and your contributor steps and experience are different or more
112127
in-depth than the documentation listed in the general [contributor guide] and [devel] folder.)
113-
- [ ] Subprojects list and linked OWNERS files in [sigs.yaml] reviewed for accuracy and updated if needed
114-
- [ ] SIG leaders (chairs, tech leads, and subproject owners) in [sigs.yaml] are accurate and active, and updated if needed
115-
- [ ] Meeting notes and recordings for 2022 are linked from [README.md] and updated/uploaded if needed
116-
- [ ] Did you have community-wide updates in 2022 (e.g. community meetings, kubecon, or kubernetes-dev@ emails)? Links to email, slides, or recordings:
117-
-
118-
-
128+
- [x] Subprojects list and linked OWNERS files in [sigs.yaml] reviewed for accuracy and updated if needed
129+
- [x] SIG leaders (chairs, tech leads, and subproject owners) in [sigs.yaml] are accurate and active, and updated if needed
130+
- [x] Meeting notes and recordings for 2022 are linked from [README.md] and updated/uploaded if needed
131+
- [x] Did you have community-wide updates in 2022 (e.g. community meetings, kubecon, or kubernetes-dev@ emails)? Links to email, slides, or recordings:
132+
- 2022 Kubecon EU Virtual - [SIG Auth Deep Dive](https://sched.co/ytpT) [session recording](https://youtu.be/C3Ak35W55m0)
133+
- 2022 Kubecon NA - [SIG Auth Deep Dive](https://sched.co/182PB) [session recording](https://youtu.be/QbqpPZxDKDw)
119134

120135
[CONTRIBUTING.md]: https://git.k8s.io/community/sig-auth/CONTRIBUTING.md
121136
[contributor ladder]: https://git.k8s.io/community/community-membership.md

0 commit comments

Comments
 (0)