kubernetes/pkg/kubeapiserver/options
Taahir Ahmed 6a75e7c40c ClusterTrustBundles: Define types
This commit is the main API piece of KEP-3257 (ClusterTrustBundles).

This commit:

* Adds the certificates.k8s.io/v1alpha1 API group
* Adds the ClusterTrustBundle type.
* Registers the new type in kube-apiserver.
* Implements the type-specfic validation specified for
  ClusterTrustBundles:
  - spec.pemTrustAnchors must always be non-empty.
  - spec.signerName must be either empty or a valid signer name.
  - Changing spec.signerName is disallowed.
* Implements the "attest" admission check to restrict actions on
  ClusterTrustBundles that include a signer name.

Because it wasn't specified in the KEP, I chose to make attempts to
update the signer name be validation errors, rather than silently
ignored.

I have tested this out by launching these changes in kind and
manipulating ClusterTrustBundle objects in the resulting cluster using
kubectl.
2023-03-15 20:10:18 -07:00
..
testdata add ability to authenticators for dynamic update of certs 2019-10-01 09:50:20 -04:00
admission_test.go pkg/kubeapiserver/options: Improving test coverage (#114234) 2022-12-14 17:51:35 -08:00
admission.go Generate and format files 2022-07-26 13:14:05 -04:00
authentication_test.go pkg/kubeapiserver/options: Improving test coverage (#114234) 2022-12-14 17:51:35 -08:00
authentication.go track legacy service account tokens 2022-10-24 09:37:53 -07:00
authorization_test.go pkg/kubeapiserver/options: Improving test coverage (#114234) 2022-12-14 17:51:35 -08:00
authorization.go cleanup: use sets.Len() insead of len(sets.List()) 2022-07-21 20:13:30 +08:00
cloudprovider.go fix golint failures in pkg/kubeapiserver/options, rename receiver name of BuiltInAuthorizationOptions to o 2020-07-23 18:52:15 +08:00
options.go run hack/update-netparse-cve.sh 2021-08-20 10:42:09 +02:00
plugins_test.go Integrate cel admission with API. 2022-11-07 21:38:55 +00:00
plugins.go ClusterTrustBundles: Define types 2023-03-15 20:10:18 -07:00
serving.go run hack/update-netparse-cve.sh 2021-08-20 10:42:09 +02:00