You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/reference/using-api/cel.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,6 +59,7 @@ Example CEL expressions:
59
59
|`self.metadata.name == 'singleton'`| Validate that an object's name matches a specific value (making it a singleton) |
60
60
|`self.set1.all(e, !(e in self.set2))`| Validate that two listSets are disjoint |
61
61
|`self.names.size() == self.details.size() && self.names.all(n, n in self.details)`| Validate the 'details' map is keyed by the items in the 'names' listSet |
62
+
{{< /table >}}
62
63
63
64
## CEL community libraries
64
65
@@ -95,6 +96,7 @@ Examples:
95
96
|`items.map(x, x.weight).sum() == 1.0`| Verify that the "weights" of a list of objects sum to 1.0 |
96
97
|`lowPriorities.map(x, x.priority).max() < highPriorities.map(x, x.priority).min()`| Verify that two sets of priorities do not overlap |
97
98
|`names.indexOf('should-be-first') == 1`| Require that the first name in a list if a specific value |
99
+
{{< /table >}}
98
100
99
101
See the [Kubernetes List Library](https://pkg.go.dev/k8s.io/apiextensions-apiserver/pkg/apiserver/schema/cel/library#Lists)
Copy file name to clipboardExpand all lines: content/en/docs/tasks/administer-cluster/encrypt-data.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,6 +103,7 @@ Name | Encryption | Strength | Speed | Key Length | Other Considerations
103
103
`aesgcm`| AES-GCM with random nonce | Must be rotated every 200k writes | Fastest | 16, 24, or 32-byte | Is not recommended for use except when an automated key rotation scheme is implemented.
104
104
`aescbc`| AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding | Weak | Fast | 32-byte | Not recommended due to CBC's vulnerability to padding oracle attacks.
105
105
`kms` | Uses envelope encryption scheme: Data is encrypted by data encryption keys (DEKs) using AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding (prior to v1.25), using AES-GCM starting from v1.25, DEKs are encrypted by key encryption keys (KEKs) according to configuration in Key Management Service (KMS) | Strongest | Fast | 32-bytes | The recommended choice for using a third party tool for key management. Simplifies key rotation, with a new DEK generated for each encryption, and KEK rotation controlled by the user. [Configure the KMS provider](/docs/tasks/administer-cluster/kms-provider/).
106
+
{{< /table >}}
106
107
107
108
Each provider supports multiple keys - the keys are tried in order for decryption, and if the provider
108
109
is the first provider, the first key is used for encryption.
0 commit comments