@@ -297,7 +297,7 @@ $ kubectl apply -f examples/webhook/keystone-service.yaml
297
297
$ kubectl run curl --rm -it --restart=Never --image curlimages/curl -- \
298
298
-k -XPOST https://k8s-keystone-auth-service.kube-system:8443/webhook -d '
299
299
{
300
- "apiVersion": "authentication.k8s.io/v1beta1 ",
300
+ "apiVersion": "authentication.k8s.io/v1 ",
301
301
"kind": "TokenReview",
302
302
"metadata": {
303
303
"creationTimestamp": null
@@ -316,7 +316,7 @@ $ kubectl apply -f examples/webhook/keystone-service.yaml
316
316
317
317
``` shell
318
318
{
319
- " apiVersion" : " authentication.k8s.io/v1beta1 " ,
319
+ " apiVersion" : " authentication.k8s.io/v1 " ,
320
320
" kind" : " TokenReview" ,
321
321
" metadata" : {
322
322
" creationTimestamp" : null
@@ -370,18 +370,18 @@ $ kubectl apply -f examples/webhook/keystone-service.yaml
370
370
$ kubectl run curl --rm -it --restart=Never --image curlimages/curl -- \
371
371
-k -XPOST https://k8s-keystone-auth-service.kube-system:8443/webhook -d '
372
372
{
373
- "apiVersion": "authorization.k8s.io/v1beta1 ",
373
+ "apiVersion": "authorization.k8s.io/v1 ",
374
374
"kind": "SubjectAccessReview",
375
375
"spec": {
376
376
"resourceAttributes": {
377
377
"namespace": "default",
378
378
"verb": "get",
379
- "group ": "",
379
+ "groups ": "",
380
380
"resource": "pods",
381
381
"name": "pod1"
382
382
},
383
383
"user": "demo",
384
- "group ": ["423d41d3a02f4b77b4a9bbfbc3a1b3c6"],
384
+ "groups ": ["423d41d3a02f4b77b4a9bbfbc3a1b3c6"],
385
385
"extra": {
386
386
"alpha.kubernetes.io/identity/project/id": ["423d41d3a02f4b77b4a9bbfbc3a1b3c6"],
387
387
"alpha.kubernetes.io/identity/project/name": ["demo"],
@@ -395,7 +395,7 @@ $ kubectl apply -f examples/webhook/keystone-service.yaml
395
395
396
396
``` shell
397
397
{
398
- " apiVersion" : " authorization.k8s.io/v1beta1 " ,
398
+ " apiVersion" : " authorization.k8s.io/v1 " ,
399
399
" kind" : " SubjectAccessReview" ,
400
400
" status" : {
401
401
" allowed" : true
@@ -409,18 +409,18 @@ $ kubectl apply -f examples/webhook/keystone-service.yaml
409
409
$ kubectl run curl --rm -it --restart=Never --image curlimages/curl -- \
410
410
-k -XPOST https://k8s-keystone-auth-service.kube-system:8443/webhook -d '
411
411
{
412
- "apiVersion": "authorization.k8s.io/v1beta1 ",
412
+ "apiVersion": "authorization.k8s.io/v1 ",
413
413
"kind": "SubjectAccessReview",
414
414
"spec": {
415
415
"resourceAttributes": {
416
416
"namespace": "default",
417
417
"verb": "create",
418
- "group ": "",
418
+ "groups ": "",
419
419
"resource": "pods",
420
420
"name": "pod1"
421
421
},
422
422
"user": "demo",
423
- "group ": ["423d41d3a02f4b77b4a9bbfbc3a1b3c6"],
423
+ "groups ": ["423d41d3a02f4b77b4a9bbfbc3a1b3c6"],
424
424
"extra": {
425
425
"alpha.kubernetes.io/identity/project/id": ["423d41d3a02f4b77b4a9bbfbc3a1b3c6"],
426
426
"alpha.kubernetes.io/identity/project/name": ["demo"],
@@ -434,7 +434,7 @@ $ kubectl apply -f examples/webhook/keystone-service.yaml
434
434
435
435
``` shell
436
436
{
437
- " apiVersion" : " authorization.k8s.io/v1beta1 " ,
437
+ " apiVersion" : " authorization.k8s.io/v1 " ,
438
438
" kind" : " SubjectAccessReview" ,
439
439
" status" : {
440
440
" allowed" : false
0 commit comments