mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-10 12:32:03 +00:00
Merge pull request #124619 from aramase/aramase/c/requestheader_cleanup
Remove unused NewSecure function in requestheader.go
This commit is contained in:
commit
83cdd30873
@ -17,9 +17,7 @@ limitations under the License.
|
|||||||
package headerrequest
|
package headerrequest
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/x509"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
"strings"
|
"strings"
|
||||||
@ -27,7 +25,6 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
x509request "k8s.io/apiserver/pkg/authentication/request/x509"
|
x509request "k8s.io/apiserver/pkg/authentication/request/x509"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
utilcert "k8s.io/client-go/util/cert"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// StringSliceProvider is a way to get a string slice value. It is heavily used for authentication headers among other places.
|
// StringSliceProvider is a way to get a string slice value. It is heavily used for authentication headers among other places.
|
||||||
@ -106,48 +103,6 @@ func trimHeaders(headerNames ...string) ([]string, error) {
|
|||||||
return ret, nil
|
return ret, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewSecure(clientCA string, proxyClientNames []string, nameHeaders []string, groupHeaders []string, extraHeaderPrefixes []string) (authenticator.Request, error) {
|
|
||||||
if len(clientCA) == 0 {
|
|
||||||
return nil, fmt.Errorf("missing clientCA file")
|
|
||||||
}
|
|
||||||
|
|
||||||
// Wrap with an x509 verifier
|
|
||||||
caData, err := ioutil.ReadFile(clientCA)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("error reading %s: %v", clientCA, err)
|
|
||||||
}
|
|
||||||
opts := x509request.DefaultVerifyOptions()
|
|
||||||
opts.Roots = x509.NewCertPool()
|
|
||||||
certs, err := utilcert.ParseCertsPEM(caData)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("error loading certs from %s: %v", clientCA, err)
|
|
||||||
}
|
|
||||||
for _, cert := range certs {
|
|
||||||
opts.Roots.AddCert(cert)
|
|
||||||
}
|
|
||||||
|
|
||||||
trimmedNameHeaders, err := trimHeaders(nameHeaders...)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
trimmedGroupHeaders, err := trimHeaders(groupHeaders...)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
trimmedExtraHeaderPrefixes, err := trimHeaders(extraHeaderPrefixes...)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return NewDynamicVerifyOptionsSecure(
|
|
||||||
x509request.StaticVerifierFn(opts),
|
|
||||||
StaticStringSlice(proxyClientNames),
|
|
||||||
StaticStringSlice(trimmedNameHeaders),
|
|
||||||
StaticStringSlice(trimmedGroupHeaders),
|
|
||||||
StaticStringSlice(trimmedExtraHeaderPrefixes),
|
|
||||||
), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewDynamicVerifyOptionsSecure(verifyOptionFn x509request.VerifyOptionFunc, proxyClientNames, nameHeaders, groupHeaders, extraHeaderPrefixes StringSliceProvider) authenticator.Request {
|
func NewDynamicVerifyOptionsSecure(verifyOptionFn x509request.VerifyOptionFunc, proxyClientNames, nameHeaders, groupHeaders, extraHeaderPrefixes StringSliceProvider) authenticator.Request {
|
||||||
headerAuthenticator := NewDynamic(nameHeaders, groupHeaders, extraHeaderPrefixes)
|
headerAuthenticator := NewDynamic(nameHeaders, groupHeaders, extraHeaderPrefixes)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user