-
Notifications
You must be signed in to change notification settings - Fork 35
[ENHANCEMENT] Support for ServiceAccount Match #173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/reopen |
@tssurya: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/remove-lifecycle stale |
/remove-lifecycle rotten |
@bowei you had some use cases for this right? We have an open issue where others had asked for serviceAccount match but we didn't get concrete use cases to start an enhancement or something.. wanna add more context to the issue? |
/assign @tssurya |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/lifecycle frozen |
One thought -- I think the intent of some of this conversation is not necessarily add ServiceAccount match to the existing ANP functionality which is approximately another form of label match, but to figure out how auth via Service Account/identity a la service mesh would compose with the rest of the K8s policy ecosystem. It feels like these two things are operating at different layers -- and it might be worthwhile thinking about the semantics as such. Concretely -- does it make sense to think of the mostly IP-based NP, ANP as a lower level of auth -- then -- identity-based auth kicks in.
|
We have discussed a bit the potential solution combining NP with auth-policy, and the main idea is that you have to allow traffic with the NP (in this context same as ANP) first, and then apply auth-policy on top. I think that is the same as your picture. It looks a bit like identity/mesh happens before ANP, but I think that is only if you read it for egress, but you actually mean it in ingress terms, so ANP/NP happens first? Having separate configs to do that may be annoying (e.g. ANP that allows traffic to podB and then AuthPolicy (imaginary API) that applies service-account-based policy). So we have discussed a possibility to express this intent in a single ANP with a serviceAccount pod selector, which could be handled by 2 separate controllers: first by the ANP controller to allow this on IP level, and then by the Auth controller/mesh on top of it. That only works for serviceAccounts though as it can be used for both layers |
Yes -- the intent of the above diagram is to pose that the mental model we should use for an L7 policy is to be right next to the Pod, independent of the network level policies:
|
Uh oh!
There was an error while loading. Please reload this page.
Came up as a request during KubeCon Chicago NA.
This came back up during KubeCon SLC NA and the community had some good F2F discussions around this - enough to start a NPEP to capture use cases around this type of peer.
Is your enhancement request related to a problem? Please describe.
Provide a way for pods to be selected using their service accounts instead of their labels
See #274 for details on user stories
The text was updated successfully, but these errors were encountered: