-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make k8s permissions test optional #4618
Conversation
0aa1913
to
7591d3c
Compare
@@ -91,6 +91,9 @@ type ForwarderConfig struct { | |||
// PingPeriod is a period for sending ping messages on the incoming | |||
// connection. | |||
PingPeriod time.Duration | |||
// StrictImpersonationCheck specifies whether to fail when impersonation | |||
// permissions of this forwarder can't be tested. | |||
StrictImpersonationCheck bool |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we need to set a default value for this somewhere?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The default is the zero value (false).
This will only be set to true in the new kubernetes_service
(when it's ready #4611).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There are several legitimate cases where it can fail: - root proxy running inside k8s but without access to local k8s cluster - root proxy running with a dummy kubeconfig that we recommended in the past Leave a ForwarderConfig flag to enforce this check, it will be useful in kubernetes_service later that should always have the right permissions.
Co-authored-by: Gus Luxton <[email protected]>
7591d3c
to
bf28d8c
Compare
There are several legitimate cases where it can fail:
past
Leave a ForwarderConfig flag to enforce this check, it will be useful in
kubernetes_service later that should always have the right permissions.