Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for extensible IAM permissions #1170

Merged
merged 5 commits into from Jan 19, 2017

Conversation

yissacharcw
Copy link
Contributor

@yissacharcw yissacharcw commented Dec 15, 2016

This is a continuation of #550, now hopefully with CLA issues worked out, and with added tests.


This change is Reviewable

@k8s-ci-robot
Copy link
Contributor

Hi @yissacharcw. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with @k8s-bot ok to test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

If you have questions or suggestions related to this bot's behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot
Copy link
Contributor

Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please follow instructions at https://github.com/kubernetes/kubernetes/wiki/CLA-FAQ to sign the CLA.

Once you've signed, please reply here (e.g. "I signed it!") and we'll verify. Thanks.


If you have questions or suggestions related to this bot's behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. label Dec 15, 2016
@yissacharcw
Copy link
Contributor Author

I signed it!

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Dec 15, 2016
@yissacharcw
Copy link
Contributor Author

Fixes #379

Copy link
Contributor

@chrislovecnm chrislovecnm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How does this impact terraform users? Need to do more of a review as well

@chrislovecnm
Copy link
Contributor

I am not a IAM expert by any means ... I pinged a couple of outside folks as well.

@kris-nova / @justinsb tag. I would like one of our security gurus to take a look as well.

@chrislovecnm
Copy link
Contributor

We are trying to get #1183 in, and it most likely will impact this PR. Appreciate you patience. 1183 is a big change, with huge benefits.

@chrislovecnm
Copy link
Contributor

Can we get a rebase?

@chrislovecnm
Copy link
Contributor

Updating #1206

@yissacharcw yissacharcw force-pushed the extensible-iam-roles branch 2 times, most recently from 10b91b0 to 10cc292 Compare December 20, 2016 16:08
@yissachar
Copy link
Contributor

@chrislovecnm Rebased and tested - everything is good now.

@chrislovecnm
Copy link
Contributor

We need a rebase

@yissachar
Copy link
Contributor

@chrislovecnm Rebased

@chrislovecnm
Copy link
Contributor

I pinged @justinsb about this PR. Would like a review from him. Then we can merge.

@justinsb
Copy link
Member

justinsb commented Jan 4, 2017

@yissachar my understanding is that you're planning on revisiting this when you have time, to create a second IAM policy without modification, and attach both. Going to mark as WIP so @chrislovecnm stops bugging me about it ;-)

@yissachar
Copy link
Contributor

@justinsb That's correct. Just getting back to work now after the holidays, and catching up on things, but I should have time to work on it this week. I'll post back here once I have something to show.

@yissachar
Copy link
Contributor

@justinsb @chrislovecnm I've updated the PR with the discussed changes (moving from modifying the existing IAM policy in-place to creating a separate IAM policy that is also mounted to the instances). I've also slightly refactored the cluster spec to have the field be a map instead of hardcoded fields for the masters and nodes. Seeing as we are starting to have more roles than just those two (e.g. bastion), this feels like a more elegant approach.

@yissachar
Copy link
Contributor

I followed the existing code to delete IAM roles but I believe it's prone to becoming incorrect as more roles are added. Indeed, I see that we've already had an issue where we forgot to update the code to remove the bastion IAM role.

I think the code could be updated to iterate through all roles we have and add those to the list of things to be removed. This way, if we add another role in the future, deletion would automatically be handled and we wouldn't have to remember to specifically add it.

@justinsb justinsb modified the milestone: 1.5.0 Jan 19, 2017
Copy link
Member

@justinsb justinsb left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@justinsb justinsb merged commit 165ead4 into kubernetes:master Jan 19, 2017
@justinsb
Copy link
Member

This LGTM - thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants