-
Notifications
You must be signed in to change notification settings - Fork 1.5k
KEP-3331: update for beta in v1.30 #4461
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEP-3331: update for beta in v1.30 #4461
Conversation
a770bad
to
6366dd0
Compare
keps/sig-auth/3331-structured-authentication-configuration/kep.yaml
Outdated
Show resolved
Hide resolved
keps/sig-auth/3331-structured-authentication-configuration/README.md
Outdated
Show resolved
Hide resolved
keps/sig-auth/3331-structured-authentication-configuration/README.md
Outdated
Show resolved
Hide resolved
keps/sig-auth/3331-structured-authentication-configuration/README.md
Outdated
Show resolved
Hide resolved
6366dd0
to
65d5f4e
Compare
65d5f4e
to
86bdeb8
Compare
/uncc kikisdeliveryservice |
5e0a514
to
85700d9
Compare
|
||
[supported limits]: https://git.k8s.io/community//sig-scalability/configs-and-limits/thresholds.md | ||
--> | ||
No. There would be very minimal addition to the memory used by the API Server and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note the "Maybe" response to this question in #4456. Does the same logic apply here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The "Maybe" response in #4456 is for Will enabling / using this feature result in increasing time taken by any operations covered by existing SLIs/SLOs?
. Are you referring to that response for this KEP?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My mistake, I was comparing answers between these KEPs because they have similar behavior, but got mis-aligned here.
Signed-off-by: Anish Ramasekar <[email protected]>
85700d9
to
151cfff
Compare
* Benchmarks are required to see how different CEL expressions affects authentication time. | ||
* There will be a upper bound of 5s for the CEL expression evaluation. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This has been moved down to beta graduation criteria.
|
||
[supported limits]: https://git.k8s.io/community//sig-scalability/configs-and-limits/thresholds.md | ||
--> | ||
No. There would be very minimal addition to the memory used by the API Server and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The "Maybe" response in #4456 is for Will enabling / using this feature result in increasing time taken by any operations covered by existing SLIs/SLOs?
. Are you referring to that response for this KEP?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe there are way too many TODOs: in the "Design details" section for this to be moved to beta. The enhancement feels unfinished.
If you don't have answers for these items, group them in an "Open questions" subsection and remove the TODOs: from the text.
While I agree that the TODOs can be organized in a better way, they are focused around pushing this feature to the limits of what is possible with the new config/CEL/reload/etc. Even if we never address those items, we would still make progress over what is possible today. The actual community needs are:
All of these are easily addressed by the KEP as-is, and the vast majority of code is shared with the existing OIDC flags with good integration test coverage. |
Signed-off-by: Anish Ramasekar <[email protected]>
@@ -454,7 +379,6 @@ type JWTAuthenticator struct { | |||
// Claim must be a string or string array claim. | |||
// Expression must produce a string or string array value. | |||
// "", [], missing, and null values are treated as having no groups. | |||
// TODO: investigate if you could make a single expression to construct groups from multiple claims. If not, maybe []PrefixedClaimOrExpression? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/assign jpbetz (for PRR) |
keps/sig-auth/3331-structured-authentication-configuration/README.md
Outdated
Show resolved
Hide resolved
e0d1604
to
ef7d879
Compare
Signed-off-by: Anish Ramasekar <[email protected]>
ef7d879
to
1e2e95b
Compare
/approve |
<<[UNRESOLVED open questions that don't clearly fit elsewhere ]>> | ||
## Open Questions | ||
|
||
The following questions are still open and need to be addressed or rejected or deferred before the KEP is marked as GA. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is much better, thank you 👍
/lgtm (Jordan is too busy to do a review pass, and IMO this is more than ready) |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aramase, enj, jpbetz The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
v1.30