mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-27 13:37:30 +00:00
This commit is the main API piece of KEP-3257 (ClusterTrustBundles). This commit: * Adds the certificates.k8s.io/v1alpha1 API group * Adds the ClusterTrustBundle type. * Registers the new type in kube-apiserver. * Implements the type-specfic validation specified for ClusterTrustBundles: - spec.pemTrustAnchors must always be non-empty. - spec.signerName must be either empty or a valid signer name. - Changing spec.signerName is disallowed. * Implements the "attest" admission check to restrict actions on ClusterTrustBundles that include a signer name. Because it wasn't specified in the KEP, I chose to make attempts to update the signer name be validation errors, rather than silently ignored. I have tested this out by launching these changes in kind and manipulating ClusterTrustBundle objects in the resulting cluster using kubectl.
82 lines
2.6 KiB
Go
82 lines
2.6 KiB
Go
/*
|
|
Copyright 2022 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
// Package clustertrustbundle provides Registry interface and its RESTStorage
|
|
// implementation for storing ClusterTrustBundle objects.
|
|
package clustertrustbundle // import "k8s.io/kubernetes/pkg/registry/certificates/clustertrustbundle"
|
|
|
|
import (
|
|
"context"
|
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
|
"k8s.io/apiserver/pkg/registry/rest"
|
|
"k8s.io/apiserver/pkg/storage/names"
|
|
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
|
"k8s.io/kubernetes/pkg/apis/certificates"
|
|
certvalidation "k8s.io/kubernetes/pkg/apis/certificates/validation"
|
|
)
|
|
|
|
// strategy implements behavior for ClusterTrustBundles.
|
|
type strategy struct {
|
|
runtime.ObjectTyper
|
|
names.NameGenerator
|
|
}
|
|
|
|
// Strategy is the create, update, and delete strategy for ClusterTrustBundles.
|
|
var Strategy = strategy{legacyscheme.Scheme, names.SimpleNameGenerator}
|
|
|
|
var _ rest.RESTCreateStrategy = Strategy
|
|
var _ rest.RESTUpdateStrategy = Strategy
|
|
var _ rest.RESTDeleteStrategy = Strategy
|
|
|
|
func (strategy) NamespaceScoped() bool {
|
|
return false
|
|
}
|
|
|
|
func (strategy) PrepareForCreate(ctx context.Context, obj runtime.Object) {}
|
|
|
|
func (strategy) Validate(ctx context.Context, obj runtime.Object) field.ErrorList {
|
|
bundle := obj.(*certificates.ClusterTrustBundle)
|
|
return certvalidation.ValidateClusterTrustBundle(bundle, certvalidation.ValidateClusterTrustBundleOptions{})
|
|
}
|
|
|
|
func (strategy) WarningsOnCreate(ctx context.Context, obj runtime.Object) []string {
|
|
return nil
|
|
}
|
|
|
|
func (strategy) Canonicalize(obj runtime.Object) {}
|
|
|
|
func (strategy) AllowCreateOnUpdate() bool {
|
|
return false
|
|
}
|
|
|
|
func (s strategy) PrepareForUpdate(ctx context.Context, new, old runtime.Object) {}
|
|
|
|
func (s strategy) ValidateUpdate(ctx context.Context, new, old runtime.Object) field.ErrorList {
|
|
newBundle := new.(*certificates.ClusterTrustBundle)
|
|
oldBundle := old.(*certificates.ClusterTrustBundle)
|
|
return certvalidation.ValidateClusterTrustBundleUpdate(newBundle, oldBundle)
|
|
}
|
|
|
|
func (strategy) WarningsOnUpdate(ctx context.Context, obj, old runtime.Object) []string {
|
|
return nil
|
|
}
|
|
|
|
func (strategy) AllowUnconditionalUpdate() bool {
|
|
return false
|
|
}
|