struct
Kubernetes::PodCertificateRequestSpec
- Kubernetes::PodCertificateRequestSpec
- Struct
- Value
- Object
Overview
PodCertificateRequestSpec describes the certificate request. All fields are immutable after creation.
Included Modules
- JSON::Serializable
- Kubernetes::Serializable
- YAML::Serializable
Defined in:
generated/models/io_k8s_api_certificates_v1beta1.crConstructors
- .new(ctx : YAML::ParseContext, node : YAML::Nodes::Node)
- .new(pull : ::JSON::PullParser)
- .new(*, __pull_for_json_serializable pull : ::JSON::PullParser)
- .new(*, __context_for_yaml_serializable ctx : YAML::ParseContext, __node_for_yaml_serializable node : YAML::Nodes::Node)
Macro Summary
-
field(name, type = nil, **options, &block)
Helper macro for defining fields with automatic camelCase conversion
Instance Method Summary
-
#max_expiration_seconds : Int32 | Nil
maxExpirationSeconds is the maximum lifetime permitted for the certificate.
-
#max_expiration_seconds=(max_expiration_seconds : Int32 | Nil)
maxExpirationSeconds is the maximum lifetime permitted for the certificate.
-
#node_name : String | Nil
nodeName is the name of the node the pod is assigned to.
-
#node_name=(node_name : String | Nil)
nodeName is the name of the node the pod is assigned to.
-
#node_uid : String | Nil
nodeUID is the UID of the node the pod is assigned to.
-
#node_uid=(node_uid : String | Nil)
nodeUID is the UID of the node the pod is assigned to.
-
#pkix_public_key : String | Nil
pkixPublicKey is the PKIX-serialized public key the signer will issue the certificate to.
-
#pkix_public_key=(pkix_public_key : String | Nil)
pkixPublicKey is the PKIX-serialized public key the signer will issue the certificate to.
-
#pod_name : String | Nil
podName is the name of the pod into which the certificate will be mounted.
-
#pod_name=(pod_name : String | Nil)
podName is the name of the pod into which the certificate will be mounted.
-
#pod_uid : String | Nil
podUID is the UID of the pod into which the certificate will be mounted.
-
#pod_uid=(pod_uid : String | Nil)
podUID is the UID of the pod into which the certificate will be mounted.
-
#proof_of_possession : String | Nil
proofOfPossession proves that the requesting kubelet holds the private key corresponding to pkixPublicKey.
-
#proof_of_possession=(proof_of_possession : String | Nil)
proofOfPossession proves that the requesting kubelet holds the private key corresponding to pkixPublicKey.
-
#service_account_name : String | Nil
serviceAccountName is the name of the service account the pod is running as.
-
#service_account_name=(service_account_name : String | Nil)
serviceAccountName is the name of the service account the pod is running as.
-
#service_account_uid : String | Nil
serviceAccountUID is the UID of the service account the pod is running as.
-
#service_account_uid=(service_account_uid : String | Nil)
serviceAccountUID is the UID of the service account the pod is running as.
-
#signer_name : String | Nil
signerName indicates the requested signer.
-
#signer_name=(signer_name : String | Nil)
signerName indicates the requested signer.
-
#unverified_user_annotations : Hash(String, String) | Nil
unverifiedUserAnnotations allow pod authors to pass additional information to the signer implementation.
-
#unverified_user_annotations=(unverified_user_annotations : Hash(String, String) | Nil)
unverifiedUserAnnotations allow pod authors to pass additional information to the signer implementation.
Constructor Detail
Macro Detail
Helper macro for defining fields with automatic camelCase conversion
Instance Method Detail
maxExpirationSeconds is the maximum lifetime permitted for the certificate.
If omitted, kube-apiserver will set it to 86400(24 hours). kube-apiserver will reject values shorter than 3600 (1 hour). The maximum allowable value is 7862400 (91 days).
The signer implementation is then free to issue a certificate with any lifetime shorter than MaxExpirationSeconds, but no shorter than 3600 seconds (1 hour). This constraint is enforced by kube-apiserver. kubernetes.io signers will never issue certificates with a lifetime longer than 24 hours.
maxExpirationSeconds is the maximum lifetime permitted for the certificate.
If omitted, kube-apiserver will set it to 86400(24 hours). kube-apiserver will reject values shorter than 3600 (1 hour). The maximum allowable value is 7862400 (91 days).
The signer implementation is then free to issue a certificate with any lifetime shorter than MaxExpirationSeconds, but no shorter than 3600 seconds (1 hour). This constraint is enforced by kube-apiserver. kubernetes.io signers will never issue certificates with a lifetime longer than 24 hours.
pkixPublicKey is the PKIX-serialized public key the signer will issue the certificate to. The key must be one of RSA3072, RSA4096, ECDSAP256, ECDSAP384, ECDSAP521, or ED25519. Note that this list may be expanded in the future. Signer implementations do not need to support all key types supported by kube-apiserver and kubelet. If a signer does not support the key type used for a given PodCertificateRequest, it must deny the request by setting a status.conditions entry with a type of "Denied" and a reason of "UnsupportedKeyType". It may also suggest a key type that it does support in the message field.
pkixPublicKey is the PKIX-serialized public key the signer will issue the certificate to. The key must be one of RSA3072, RSA4096, ECDSAP256, ECDSAP384, ECDSAP521, or ED25519. Note that this list may be expanded in the future. Signer implementations do not need to support all key types supported by kube-apiserver and kubelet. If a signer does not support the key type used for a given PodCertificateRequest, it must deny the request by setting a status.conditions entry with a type of "Denied" and a reason of "UnsupportedKeyType". It may also suggest a key type that it does support in the message field.
podName is the name of the pod into which the certificate will be mounted.
podName is the name of the pod into which the certificate will be mounted.
podUID is the UID of the pod into which the certificate will be mounted.
podUID is the UID of the pod into which the certificate will be mounted.
proofOfPossession proves that the requesting kubelet holds the private key corresponding to pkixPublicKey.
It is contructed by signing the ASCII bytes of the pod's UID using pkixPublicKey.
kube-apiserver validates the proof of possession during creation of the PodCertificateRequest.
If the key is an RSA key, then the signature is over the ASCII bytes of the pod UID, using RSASSA-PSS from RFC 8017 (as implemented by the golang function crypto/rsa.SignPSS with nil options).
If the key is an ECDSA key, then the signature is as described by SEC 1, Version 2.0 (as implemented by the golang library function crypto/ecdsa.SignASN1)
If the key is an ED25519 key, the the signature is as described by the ED25519 Specification (as implemented by the golang library crypto/ed25519.Sign).
proofOfPossession proves that the requesting kubelet holds the private key corresponding to pkixPublicKey.
It is contructed by signing the ASCII bytes of the pod's UID using pkixPublicKey.
kube-apiserver validates the proof of possession during creation of the PodCertificateRequest.
If the key is an RSA key, then the signature is over the ASCII bytes of the pod UID, using RSASSA-PSS from RFC 8017 (as implemented by the golang function crypto/rsa.SignPSS with nil options).
If the key is an ECDSA key, then the signature is as described by SEC 1, Version 2.0 (as implemented by the golang library function crypto/ecdsa.SignASN1)
If the key is an ED25519 key, the the signature is as described by the ED25519 Specification (as implemented by the golang library crypto/ed25519.Sign).
serviceAccountName is the name of the service account the pod is running as.
serviceAccountName is the name of the service account the pod is running as.
serviceAccountUID is the UID of the service account the pod is running as.
serviceAccountUID is the UID of the service account the pod is running as.
signerName indicates the requested signer.
All signer names beginning with kubernetes.io are reserved for use by the Kubernetes project. There is currently one well-known signer documented by the Kubernetes project, kubernetes.io/kube-apiserver-client-pod, which will issue client certificates understood by kube-apiserver. It is currently unimplemented.
signerName indicates the requested signer.
All signer names beginning with kubernetes.io are reserved for use by the Kubernetes project. There is currently one well-known signer documented by the Kubernetes project, kubernetes.io/kube-apiserver-client-pod, which will issue client certificates understood by kube-apiserver. It is currently unimplemented.
unverifiedUserAnnotations allow pod authors to pass additional information to the signer implementation. Kubernetes does not restrict or validate this metadata in any way. Entries are subject to the same validation as object metadata annotations, with the addition that all keys must be domain-prefixed. No restrictions are placed on values, except an overall size limitation on the entire field. Signers should document the keys and values they support. Signers should deny requests that contain keys they do not recognize.
unverifiedUserAnnotations allow pod authors to pass additional information to the signer implementation. Kubernetes does not restrict or validate this metadata in any way. Entries are subject to the same validation as object metadata annotations, with the addition that all keys must be domain-prefixed. No restrictions are placed on values, except an overall size limitation on the entire field. Signers should document the keys and values they support. Signers should deny requests that contain keys they do not recognize.