Skip to content

feat(nas): support access point rrsa authentication#1613

Open
iltyty wants to merge 2 commits into
kubernetes-sigs:masterfrom
iltyty:nas-ap-rrsa
Open

feat(nas): support access point rrsa authentication#1613
iltyty wants to merge 2 commits into
kubernetes-sigs:masterfrom
iltyty:nas-ap-rrsa

Conversation

@iltyty
Copy link
Copy Markdown
Contributor

@iltyty iltyty commented Jan 9, 2026

What type of PR is this?

/kind feature

What this PR does / why we need it:

Support NAS access point RRSA authentication.

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Does this PR introduce a user-facing change?


Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


@k8s-ci-robot k8s-ci-robot added kind/feature Categorizes issue or PR as related to a new feature. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Jan 9, 2026
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: iltyty
Once this PR has been reviewed and has the lgtm label, please assign mowangdk for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. label Jan 9, 2026
@iltyty iltyty force-pushed the nas-ap-rrsa branch 5 times, most recently from 08de0b4 to e9aa17c Compare January 12, 2026 05:55
@iltyty
Copy link
Copy Markdown
Contributor Author

iltyty commented Jan 13, 2026

/retest

@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 13, 2026
@k8s-ci-robot k8s-ci-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 13, 2026
Copy link
Copy Markdown
Contributor

@mowangdk mowangdk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@AlbeeSo Please take a look as well

Comment on lines +81 to +86
if op == nil || op.AuthConfig == nil {
return handler(ctx, op)
}
if op.AuthConfig.AuthType != rrsaAuthType && (op.AuthConfig.AccessKey == "" || op.AuthConfig.AccessSecret == "") {
return handler(ctx, op)
}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we combine these two if statements? There doesn't seem to be any difference between them

return
}

if op.AuthConfig != nil && op.AuthConfig.AuthType == rrsaAuthType {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we move these statements into a switch block? Just emit an error if the credential file doesn't exist.

RoleArn: tea.String(roleArn),
RoleSessionName: tea.String(session),
}
resp, err := i.stsClient.AssumeRoleWithOIDC(req)
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will there be a scenario where a node doesn't have AssumeRoleWithOIDCRequests policys?

RoleSessionName: tea.String(session),
}
resp, err := i.stsClient.AssumeRoleWithOIDC(req)
if err != nil || resp.Body == nil || resp.Body.Credentials == nil {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should at least log the error, so that we can identify why request failed

@k8s-ci-robot
Copy link
Copy Markdown
Contributor

PR needs rebase.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Feb 27, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/feature Categorizes issue or PR as related to a new feature. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants