Skip to content

Comments

Add Gateway API RBAC for skew protection#55

Open
marcopiraccini wants to merge 2 commits intomainfrom
gateway-api-rbac
Open

Add Gateway API RBAC for skew protection#55
marcopiraccini wants to merge 2 commits intomainfrom
gateway-api-rbac

Conversation

@marcopiraccini
Copy link
Contributor

Summary

  • Adds Gateway API permissions to the plt-pod-manager ClusterRole so Machinist can manage HTTPRoute resources
    for version-aware routing (skew protection)
  • Grants httproutes full CRUD (get, list, create, update, patch, delete) and gateways read-only (get, list)
    under gateway.networking.k8s.io
  • Documents the Gateway API requirement in README.md, including opt-in behavior and controller compatibility

Details

Skew protection routes requests to specific application versions using the Kubernetes Gateway API. ICC manages
HTTPRoute resources via Machinist to implement cookie-based session-to-version affinity. Machinist's service
account needs RBAC permissions for these Gateway API resources.

These RBAC rules are safe to deploy even without Gateway API CRDs installed — Kubernetes silently ignores RBAC
rules for unknown API groups. Skew protection is opt-in; when disabled, no Gateway API resources are created.

The rules match what is already defined in machinist/infra/machinist.yaml for local development.

Signed-off-by: marcopiraccini <marco.piraccini@gmail.com>
Copy link
Contributor

@leorossi leorossi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Signed-off-by: marcopiraccini <marco.piraccini@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants