Skip to content

Commit 273591a

Browse files
authored
Merge pull request kubernetes#2208 from wojtek-t/migrate_keps_to_new_template_8
Migrate remaining auth keps to new template
2 parents 13ddec1 + d52709f commit 273591a

File tree

15 files changed

+142
-156
lines changed

15 files changed

+142
-156
lines changed

keps/sig-auth/20190916-noderestriction-pods.md renamed to keps/sig-auth/1314-node-restriction-pods/README.md

Lines changed: 0 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,3 @@
1-
---
2-
title: Extended NodeRestrictions for Pods
3-
authors:
4-
- "tallclair"
5-
owning-sig: sig-auth
6-
participating-sigs:
7-
- sig-node
8-
- sig-cluster-lifecycle
9-
reviewers:
10-
- derekwaynecarr
11-
- neolit123
12-
- deads2k
13-
approvers:
14-
- liggitt
15-
- derekwaynecarr
16-
- neolit123
17-
- deads2k
18-
editor: TBD
19-
creation-date: 2019-09-16
20-
status: implementable
21-
---
22-
231
# Extended NodeRestrictions for Pods
242

253
## Table of Contents
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
title: Extended NodeRestrictions for Pods
2+
kep-number: 1314
3+
authors:
4+
- "tallclair"
5+
owning-sig: sig-auth
6+
participating-sigs:
7+
- sig-node
8+
- sig-cluster-lifecycle
9+
reviewers:
10+
- derekwaynecarr
11+
- neolit123
12+
- deads2k
13+
approvers:
14+
- liggitt
15+
- derekwaynecarr
16+
- neolit123
17+
- deads2k
18+
editor: TBD
19+
creation-date: 2019-09-16
20+
status: implementable

keps/sig-auth/20190730-oidc-discovery.md renamed to keps/sig-auth/1393-oidc-discovery/README.md

Lines changed: 0 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,3 @@
1-
---
2-
title: Service Account signing key retrieval
3-
authors:
4-
- "@mikedanese"
5-
- "@cceckman"
6-
- "@mtaufen"
7-
owning-sig: sig-auth
8-
participating-sigs:
9-
- sig-auth
10-
reviewers:
11-
- "@liggitt"
12-
- "@enj"
13-
- "@micahhausler"
14-
- "@ericchiang"
15-
approvers:
16-
- "@liggitt"
17-
- "@enj"
18-
- "@micahhausler"
19-
- "@ericchiang"
20-
editor: TBD
21-
creation-date: 2018-06-26
22-
last-updated: 2020-01-25
23-
status: implementable
24-
replaces:
25-
- "https://github.com/kubernetes/community/pull/2314/"
26-
---
27-
281
# Service Account signing key retrieval
292

303
## Table of Contents
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
title: Service Account signing key retrieval
2+
kep-number: 1393
3+
authors:
4+
- "@mikedanese"
5+
- "@cceckman"
6+
- "@mtaufen"
7+
owning-sig: sig-auth
8+
participating-sigs:
9+
- sig-auth
10+
reviewers:
11+
- "@liggitt"
12+
- "@enj"
13+
- "@micahhausler"
14+
- "@ericchiang"
15+
approvers:
16+
- "@liggitt"
17+
- "@enj"
18+
- "@micahhausler"
19+
- "@ericchiang"
20+
editor: TBD
21+
creation-date: 2018-06-26
22+
last-updated: 2020-01-25
23+
status: implementable
24+
replaces:
25+
- "https://github.com/kubernetes/community/pull/2314/"

keps/sig-auth/20190607-certificates-api.md renamed to keps/sig-auth/1513-certificate-signing-request/README.md

Lines changed: 1 addition & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,3 @@
1-
---
2-
title: Certificates API
3-
authors:
4-
- "@mikedanese"
5-
- "@deads2k"
6-
owning-sig: sig-auth
7-
reviewers:
8-
- "@liggitt"
9-
- "@smarterclayton"
10-
- "@munnerz"
11-
approvers:
12-
- "@liggitt"
13-
- "@smarterclayton"
14-
creation-date: 2019-06-07
15-
last-updated: 2020-09-14
16-
status: implemented
17-
---
18-
191
# Certificates API
202

213
<!-- toc -->
@@ -130,7 +112,7 @@ This is typical of many PKI architectures.
130112

131113
A typical successful issuance proceeds as follows:
132114

133-
![CSR](/keps/sig-auth/csr.png)
115+
![CSR](/keps/sig-auth/1513-certificate-signing-request/csr.png)
134116

135117
1. The requestor generates a private key, builds a certificate signing request,
136118
and submits the `CertificateSigningRequest` to the Kubernetes certificates
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
title: Certificates API
2+
kep-number: 1513
3+
authors:
4+
- "@mikedanese"
5+
- "@deads2k"
6+
owning-sig: sig-auth
7+
reviewers:
8+
- "@liggitt"
9+
- "@smarterclayton"
10+
- "@munnerz"
11+
approvers:
12+
- "@liggitt"
13+
- "@smarterclayton"
14+
creation-date: 2019-06-07
15+
last-updated: 2020-09-14
16+
status: implemented

keps/sig-auth/0000-20170814-bounding-self-labeling-kubelets.md renamed to keps/sig-auth/279-limit-node-access/README.md

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,3 @@
1-
---
2-
title: Bounding Self-Labeling Kubelets
3-
authors:
4-
- "@mikedanese"
5-
- "@liggitt"
6-
owning-sig: sig-auth
7-
participating-sigs:
8-
- sig-node
9-
- sig-storage
10-
reviewers:
11-
- "@saad-ali"
12-
- "@tallclair"
13-
approvers:
14-
- "@thockin"
15-
- "@smarterclayton"
16-
creation-date: 2017-08-14
17-
last-updated: 2020-05-01
18-
status: implemented
19-
---
20-
211
# Bounding Self-Labeling Kubelets
222

233
## Table of Contents
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
title: Bounding Self-Labeling Kubelets
2+
kep-number: 279
3+
authors:
4+
- "@mikedanese"
5+
- "@liggitt"
6+
owning-sig: sig-auth
7+
participating-sigs:
8+
- sig-node
9+
- sig-storage
10+
reviewers:
11+
- "@saad-ali"
12+
- "@tallclair"
13+
approvers:
14+
- "@thockin"
15+
- "@smarterclayton"
16+
creation-date: 2017-08-14
17+
last-updated: 2020-05-01
18+
status: implemented

keps/sig-auth/0014-dynamic-audit-configuration.md renamed to keps/sig-auth/600-dynamic-audit-configuration/README.md

Lines changed: 1 addition & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,3 @@
1-
---
2-
title: Dynamic Audit Configuration
3-
authors:
4-
- "@pbarker"
5-
owning-sig: sig-auth
6-
participating-sigs:
7-
- sig-api-machinery
8-
reviewers:
9-
- "@tallclair"
10-
- "@yliaog"
11-
- "@caesarxuchao"
12-
- "@liggitt"
13-
approvers:
14-
- "@tallclair"
15-
- "@liggitt"
16-
- "@yliaog"
17-
editor: TBD
18-
creation-date: 2018-05-18
19-
last-updated: 2018-07-31
20-
status: implementable
21-
---
22-
231
# Dynamic Audit Control
242

253
## Table of Contents
@@ -283,4 +261,4 @@ it was ruled out for the following reasons:
283261
* The use of CRDs would be difficult to bound
284262

285263
The dynamic policy feature is gated by runtime flags. This still provides the cluster provisioner a means to limit audit logging to the
286-
single runtime object if needed.
264+
single runtime object if needed.

0 commit comments

Comments
 (0)