Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

suggestion: explain authorization chain #6

Open
pires opened this issue Oct 30, 2019 · 0 comments
Open

suggestion: explain authorization chain #6

pires opened this issue Oct 30, 2019 · 0 comments

Comments

@pires
Copy link

pires commented Oct 30, 2019

This is something that I spent some time trying to understand, and I think it can help others, particularly people who are implementing an authorizer, either as part of their custom API server or as a Webhook of kube-apiserver.

Basically, what was a surprise to me is that there's an extra state other than the boolean-style Allow/Deny, namely NoOpinion.
And this is very important to understand that other than AlwaysAllow authorizer, (I believe) all other authorizers, including Node and RBAC emit NoOpinion by default - well, there's no way to model Deny in RBAC, is there? -. And so should a Webhook, as a best-practice, I think.
Last but not least, it should be noted that if all authorizers emit NoOpinion, the API server will deny the request. I'm sure this is obvious to the authors, but this is implemented as part of the apiserver Go library.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant