@@ -167,7 +167,7 @@ Kubernetes provides built-in signers that each have a well-known `signerName`:
167
167
is not distributed by any other means.
168
168
1 . Permitted subjects - organizations are exactly ` ["system:nodes"] ` , common name starts with "` system:node: ` ".
169
169
1 . Permitted x509 extensions - honors key usage extensions, forbids subjectAltName extensions and drops other extensions.
170
- 1 . Permitted key usages - exactly ` ["key encipherment", "digital signature", "client auth"] ` .
170
+ 1 . Permitted key usages - ` ["key encipherment", "digital signature", "client auth"] ` or ` [ "digital signature", "client auth"]` .
171
171
1 . Expiration/certificate lifetime - for the kube-controller-manager implementation of this signer, set to the minimum
172
172
of the ` --cluster-signing-duration ` option or, if specified, the ` spec.expirationSeconds ` field of the CSR object.
173
173
1 . CA bit allowed/disallowed - not allowed.
@@ -180,7 +180,7 @@ Kubernetes provides built-in signers that each have a well-known `signerName`:
180
180
1 . Permitted subjects - organizations are exactly ` ["system:nodes"] ` , common name starts with "` system:node: ` ".
181
181
1 . Permitted x509 extensions - honors key usage and DNSName/IPAddress subjectAltName extensions, forbids EmailAddress and
182
182
URI subjectAltName extensions, drops other extensions. At least one DNS or IP subjectAltName must be present.
183
- 1 . Permitted key usages - exactly ` ["key encipherment", "digital signature", "server auth"] ` .
183
+ 1 . Permitted key usages - ` ["key encipherment", "digital signature", "client auth"] ` or ` ["digital signature", "client auth"]` .
184
184
1 . Expiration/certificate lifetime - for the kube-controller-manager implementation of this signer, set to the minimum
185
185
of the ` --cluster-signing-duration ` option or, if specified, the ` spec.expirationSeconds ` field of the CSR object.
186
186
1 . CA bit allowed/disallowed - not allowed.
0 commit comments