-
Notifications
You must be signed in to change notification settings - Fork 1.2k
🌱 adding SubjectAccessReview.authorization.k8s.io/v1 webhook support #2664
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🌱 adding SubjectAccessReview.authorization.k8s.io/v1 webhook support #2664
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: everpeace The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
Hi, thanks for this PR. Controller-Runtime is a library for building controllers, so an authorization webhook does IMHO not really fit into it. |
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/close |
@everpeace: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
I somehow missed this comment, but thanks to @everpeace's activity, I now saw it. With this line of thought, why there is support for authn webhooks then? Shouldn't this be deprecated and removed accordingly? |
It's always a lot harder to drop something and break existing users compared to not adding something |
This PR is the second try which adds SubjectAccessReview.authorization.k8s.io/v1 webhook support. The original PR is #1535 posted by @rfranzke, which is closed by stale long time ago.
After the long time, I'm now interested in this feature(#1535 (comment)). Thus, this PR is based on #1535 and added some cleanups and migrations on the top of it.
cc/ @rfranzke @alvaroaleman @christopherhein @vincepri @estroz
Note: I would like to use this feature in implementing karmada-io/karmada#4593