Skip to content

Commit dedb0c8

Browse files
committed
Address review comments
Signed-off-by: Rita Zhang <[email protected]>
1 parent f05d231 commit dedb0c8

File tree

2 files changed

+11
-6
lines changed

2 files changed

+11
-6
lines changed

keps/sig-auth/3221-structured-authorization-configuration/README.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ authorizer.
8080
Cluster administrators should be able to specify more than one authorization
8181
webhook in the API Server handler chain. They also need to be able to
8282
declaratively configure the authorizer chain using a configuration file. It
83-
should also be easy to say when to Deny requests, for example, when a webhook
83+
should also be easy to say when to deny requests, for example, when a webhook
8484
is unreachable.
8585

8686
### Goals
@@ -256,7 +256,7 @@ if certain conditions are satisfied, except for the `system:masters` user group.
256256
#### Story 4: Controlling access of a privileged RBAC role
257257

258258
Certain users associated with a privileged role might need to have their access
259-
scoped to certain namespaces. Having ordered authorisation modes allows the
259+
scoped to certain namespaces. Having ordered authorization modes allows the
260260
administrator to add a webhook restricting certain user tokens before RBAC
261261
grants access to the user.
262262

@@ -278,7 +278,7 @@ webhook request can be skipped.
278278

279279
- In HA clusters, there may be a skew in how the `kube-apiserver` processes in
280280
each are configured. This may create inconsistencies. Mitigation is to have the
281-
cluster bootstrapper handle such scenarios.
281+
cluster administrator handle such scenarios.
282282
- In case an administrator enables this feature and the webhook kubeconfig file
283283
is invalid or doesn't exist at the specified path, `kube-apiserver` on that node
284284
will not be able to start. This can be mitigated by fixing the malformed values.
@@ -631,7 +631,9 @@ TBD.
631631

632632
###### Is the rollout accompanied by any deprecations and/or removals of features, APIs, fields of API types, flags, etc.?
633633

634-
None.
634+
Existing command line flags will be marked as deprecated and config file will take
635+
precedence over the old flags once this feature graduates to GA. Then for GA + 3 releases,
636+
the existing command line flags will be removed.
635637

636638
### Monitoring Requirements
637639

@@ -655,7 +657,10 @@ Or, they can look at the metrics exposed by `kube-apiserver`.
655657
###### How can someone using this feature know that it is working for their instance?
656658

657659
- [x] Other
658-
- Details: They can look at the metrics if `apiserver_authorization_decisions_total` is increasing.
660+
- Details: Since this feature introduced the `name` field to the webhook authorizer,
661+
users can first specify a value in the `name` field of the AuthorizationConfiguration.
662+
Then look at the `apiserver_authorization_webhook_evaluations_total` metrics to ensure the
663+
count for the named webhook authorizer is increasing.
659664

660665
###### What are the reasonable SLOs (Service Level Objectives) for the enhancement?
661666

keps/sig-auth/3221-structured-authorization-configuration/kep.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ milestone:
2121
# The following PRR answers are required at alpha release
2222
# List the feature gate name and the components for which it must be enabled
2323
feature-gates:
24-
- name: AuthorizationConfigFromFile
24+
- name: AuthorizationConfig
2525
components:
2626
- kube-apiserver
2727
disable-supported: true

0 commit comments

Comments
 (0)