Skip to content

Conversation

@pweil-
Copy link

@pweil- pweil- commented May 7, 2015

I'd like to get some feedback to lock down the interactions with how the service account defines and enforces policy which results in a security context on the pod. This contains some types that @pmorie and I came up with that defines a SecurityPolicy object that can be configured with constraints as well as strategies to help enforce and create a security context.

This PR is based on @liggitt 's service account PR, only the last commit contains new code.

@smarterclayton @erictune @pmorie @liggitt - PTAL and see if this is the approach to move forward. If this is ok then I'll update the design docs with use cases and types.

edit: I've distilled this down to just the design to make it easier.

@googlebot
Copy link

We found a Contributor License Agreement for you (the sender of this pull request) and all commit authors, but as best as we can tell these commits were authored by someone else. If that's the case, please add them to this pull request and have them confirm that they're okay with these commits being contributed to Google. If we're mistaken and you did author these commits, just reply here to confirm.

@pmorie
Copy link
Contributor

pmorie commented May 7, 2015

@bgrant0607 @erictune

@pweil- pweil- force-pushed the security-policy branch 3 times, most recently from 51f4ea3 to e51c2ec Compare May 8, 2015 20:21
@pweil-
Copy link
Author

pweil- commented May 8, 2015

reorganized the commits to be in a more sane format for reviewing

@pweil-
Copy link
Author

pweil- commented May 12, 2015

@erictune @smarterclayton @pmorie @deads2k @liggitt - I've distilled this down to just the design to gather feedback on the proposal and types. Please take a look.

@pmorie
Copy link
Contributor

pmorie commented May 12, 2015

@pweil- This needs rebase now that service accounts are in.

@pweil- pweil- force-pushed the security-policy branch from 6858637 to 71d35f2 Compare May 13, 2015 13:04
@googlebot
Copy link

CLAs look good, thanks!

@pweil-
Copy link
Author

pweil- commented May 13, 2015

Updated

@pweil- pweil- mentioned this pull request May 14, 2015
9 tasks
@pweil- pweil- force-pushed the security-policy branch from 71d35f2 to f195ac3 Compare May 14, 2015 13:18
@googlebot
Copy link

We found a Contributor License Agreement for you (the sender of this pull request) and all commit authors, but as best as we can tell these commits were authored by someone else. If that's the case, please add them to this pull request and have them confirm that they're okay with these commits being contributed to Google. If we're mistaken and you did author these commits, just reply here to confirm.

@googlebot
Copy link

CLAs look good, thanks!

@pweil-
Copy link
Author

pweil- commented May 14, 2015

@deads2k @pmorie @liggitt this has been updated to reflect our discussions yesterday. Please take a look

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

not sure what this is for

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will remove, if everything falls into the users/groups categories suggested below then it's unnecessary

@k8s-github-robot k8s-github-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Feb 5, 2016
@k8s-bot
Copy link

k8s-bot commented Feb 5, 2016

GCE e2e build/test failed for commit 5c0a74902847e2bbb334693a014b0a07cab55867.

@k8s-github-robot
Copy link

PR needs rebase

@k8s-github-robot k8s-github-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Feb 5, 2016
Paul Weil and others added 3 commits February 5, 2016 08:42
This commit fixes a few typographical and wording nits, adds formatting
for keywords where appropriate, and tweaks punctuation for clarity
@k8s-github-robot k8s-github-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Feb 5, 2016
@erictune erictune added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 5, 2016
@k8s-bot
Copy link

k8s-bot commented Feb 5, 2016

GCE e2e test build/test passed for commit c22f348.

@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-bot
Copy link

k8s-bot commented Feb 5, 2016

GCE e2e test build/test passed for commit c22f348.

@k8s-github-robot
Copy link

Automatic merge from submit-queue

k8s-github-robot pushed a commit that referenced this pull request Feb 5, 2016
@k8s-github-robot k8s-github-robot merged commit 3cfb090 into kubernetes:master Feb 5, 2016
@erictune
Copy link
Contributor

erictune commented Feb 5, 2016

Special award for longest-lived PR that eventually merged!
Almost 9 months old! This PR can crawl and eat solid food! 👶 🚼

@pweil-
Copy link
Author

pweil- commented Feb 5, 2016

😃 rofl

@erictune
Copy link
Contributor

erictune commented Feb 5, 2016

How much work is it to write an admission controller that looks at PSPs but treats all users and groups the same?

@pweil-
Copy link
Author

pweil- commented Feb 5, 2016

not a ton. Can probably be done by the end of next week based on my other commitments. It would include:

  1. admission controller
  2. strategy implementations
  3. provider implementation
  4. resource enablement

Most of this is just a straight migration from what is already in OpenShift and whittling it down to be less specific.

@gmarek
Copy link
Contributor

gmarek commented Feb 5, 2016

Aaand it broke the build:

07:24:01 /workspace/kubernetes/docs/api-reference is out of date. Please run hack/update-api-reference-docs.sh
07:24:01 FAILED

I'll send a fix in a second.

@pweil-
Copy link
Author

pweil- commented Feb 5, 2016

thanks @gmarek - hrm I was running update-all/verify-all after every rebase I'm surprised it broke. Apologies

@gmarek
Copy link
Contributor

gmarek commented Feb 5, 2016

Np:) It was tempting to revert this PR, just to make it hang there a little longer ;)

@pweil-
Copy link
Author

pweil- commented Feb 5, 2016

It was tempting to revert this PR, just to make it hang there a little longer ;)

you have no idea how glad I am that you didn't. 🍻

@pweil-
Copy link
Author

pweil- commented Feb 5, 2016

@gmarek - crap, this does need reverted. It does not have my changes for disabling the resource by default and the comment updates that were requested. New PR or revert and fix this one?

3cfb090#diff-c47934bf31679532191ed2b519d74399R591

@pweil-
Copy link
Author

pweil- commented Feb 5, 2016

Not as bad as I thought, I just reverted my disabling of the resource. All the comment updates where in there. Fix: #20721

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/api Indicates an issue on api area. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API kind/design Categorizes issue or PR as related to design. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.