Skip to content

Commit

Permalink
limit CSR approvers per signer using RBAc
Browse files Browse the repository at this point in the history
  • Loading branch information
deads2k committed Dec 16, 2019
1 parent 824ac0b commit edf0386
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions keps/sig-auth/20190607-certificates-api.md
Original file line number Diff line number Diff line change
Expand Up @@ -202,6 +202,16 @@ guaranteed to verify a connection the kube-apiserver using the default service.
To support HA upgrades, the kube-controller-manager will duplicate defaulting code for an empty `signerName` for one
release.

#### Limiting approval powers for certain signers.
Given multiple signers which may be implemented as "dumb" controllers that sign if the CSR is approved, there is benefit
to providing a simple way to subdivide approval powers through the API. We can introduce an admission plugin that requires
1. verb == `create`
2. resource == `certificatesigningrequests/approve/(.spec.signerName)`
3. name == `<name of CSR>`
4. group == `certificates.k8s.io`

If a signer/approver pairs want a stronger guarantee like a signed assertion, that can be built today using annotations.

### CertificateSigningRequest API Definition

```go
Expand Down

0 comments on commit edf0386

Please sign in to comment.