-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
system:unauthenticated group should imply system:authenticated #14381
Comments
I think you mean the other way around? That /cc @enj |
Yes, that's what I mean. |
This is working as expected. Bind to both groups if you want everyone to see it. For example, this is how we handle discovery: apiVersion: v1
kind: ClusterRoleBinding
metadata:
name: system:discovery-binding
roleRef:
name: system:discovery
subjects:
- kind: SystemGroup
name: system:authenticated
- kind: SystemGroup
name: system:unauthenticated
No it should not. There is nothing magical about those groups, they just happen to be added at the end of the authenticator request chain based on whichever bucket you fall in, assuming you meet one at all. |
@enj, can you explain why system:unauthenticated group should not imply system:authenticated. I understand the implementation but would like to understand in what situations would you want to grant access to system:unauthenticated but not to system:authenticated. Note that this worked before. So if this is an intentional regression it would be nice to have some docs around it. Why the change was made and why it was necessary. |
There are a host of reasons (I am sure there are more):
The only reason you can even ask such a question is because of the English meaning of the group names. If instead you frame the question as "should
Being able to distinguish between the two is important. See links below.
My best guess is that we had a mistake is the auth chain kubernetes/kubernetes/issues/42437 which was fixed in kubernetes/kubernetes/pull/42491 and #13247. Thus the only reason this worked before was a bug that made it so that we accidentally added the |
So basically the answer boils down to we don't want to allow a group to be a member of another group in openshift. That's fair enough, I'm sure you have good reasons for not wanting to implement that for now.
Sorry but it is a regression, it worked before it does not now. It is a necessary regression perhaps, but a regression nonetheless. I'll repeat my recommendation that this gets documented somewhere and bow out of the conversation. |
See cockpit-project/cockpit#6711
When a project has registry-viewer role assigned to system:unauthenticated group, an authenticated user cannot view the project.
Version
Steps To Reproduce
see cockpit-project/cockpit#6711
Current Result
Cannot see project because
system:authenticated
group is not explicitly granted. Reproducible with cockpit console version 140.Expected Result
Any authenticated user should be able to see objects that unauthenticated users cannot
cc @petervo
The text was updated successfully, but these errors were encountered: