File tree Expand file tree Collapse file tree 15 files changed +142
-156
lines changed
1314-node-restriction-pods
1513-certificate-signing-request
600-dynamic-audit-configuration
740-service-account-external-signing
789-harden-default-discover-bindings Expand file tree Collapse file tree 15 files changed +142
-156
lines changed Original file line number Diff line number Diff line change 1
- ---
2
- title : Extended NodeRestrictions for Pods
3
- authors :
4
- - " tallclair"
5
- owning-sig : sig-auth
6
- participating-sigs :
7
- - sig-node
8
- - sig-cluster-lifecycle
9
- reviewers :
10
- - derekwaynecarr
11
- - neolit123
12
- - deads2k
13
- approvers :
14
- - liggitt
15
- - derekwaynecarr
16
- - neolit123
17
- - deads2k
18
- editor : TBD
19
- creation-date : 2019-09-16
20
- status : implementable
21
- ---
22
-
23
1
# Extended NodeRestrictions for Pods
24
2
25
3
## Table of Contents
Original file line number Diff line number Diff line change
1
+ title : Extended NodeRestrictions for Pods
2
+ kep-number : 1314
3
+ authors :
4
+ - " tallclair"
5
+ owning-sig : sig-auth
6
+ participating-sigs :
7
+ - sig-node
8
+ - sig-cluster-lifecycle
9
+ reviewers :
10
+ - derekwaynecarr
11
+ - neolit123
12
+ - deads2k
13
+ approvers :
14
+ - liggitt
15
+ - derekwaynecarr
16
+ - neolit123
17
+ - deads2k
18
+ editor : TBD
19
+ creation-date : 2019-09-16
20
+ status : implementable
Original file line number Diff line number Diff line change 1
- ---
2
- title : Service Account signing key retrieval
3
- authors :
4
- - " @mikedanese"
5
- - " @cceckman"
6
- - " @mtaufen"
7
- owning-sig : sig-auth
8
- participating-sigs :
9
- - sig-auth
10
- reviewers :
11
- - " @liggitt"
12
- - " @enj"
13
- - " @micahhausler"
14
- - " @ericchiang"
15
- approvers :
16
- - " @liggitt"
17
- - " @enj"
18
- - " @micahhausler"
19
- - " @ericchiang"
20
- editor : TBD
21
- creation-date : 2018-06-26
22
- last-updated : 2020-01-25
23
- status : implementable
24
- replaces :
25
- - " https://github.com/kubernetes/community/pull/2314/"
26
- ---
27
-
28
1
# Service Account signing key retrieval
29
2
30
3
## Table of Contents
Original file line number Diff line number Diff line change
1
+ title : Service Account signing key retrieval
2
+ kep-number : 1393
3
+ authors :
4
+ - " @mikedanese"
5
+ - " @cceckman"
6
+ - " @mtaufen"
7
+ owning-sig : sig-auth
8
+ participating-sigs :
9
+ - sig-auth
10
+ reviewers :
11
+ - " @liggitt"
12
+ - " @enj"
13
+ - " @micahhausler"
14
+ - " @ericchiang"
15
+ approvers :
16
+ - " @liggitt"
17
+ - " @enj"
18
+ - " @micahhausler"
19
+ - " @ericchiang"
20
+ editor : TBD
21
+ creation-date : 2018-06-26
22
+ last-updated : 2020-01-25
23
+ status : implementable
24
+ replaces :
25
+ - " https://github.com/kubernetes/community/pull/2314/"
Original file line number Diff line number Diff line change 1
- ---
2
- title : Certificates API
3
- authors :
4
- - " @mikedanese"
5
- - " @deads2k"
6
- owning-sig : sig-auth
7
- reviewers :
8
- - " @liggitt"
9
- - " @smarterclayton"
10
- - " @munnerz"
11
- approvers :
12
- - " @liggitt"
13
- - " @smarterclayton"
14
- creation-date : 2019-06-07
15
- last-updated : 2020-09-14
16
- status : implemented
17
- ---
18
-
19
1
# Certificates API
20
2
21
3
<!-- toc -->
@@ -130,7 +112,7 @@ This is typical of many PKI architectures.
130
112
131
113
A typical successful issuance proceeds as follows:
132
114
133
- ![ CSR] ( /keps/sig-auth/csr.png )
115
+ ![ CSR] ( /keps/sig-auth/1513-certificate-signing-request/ csr.png )
134
116
135
117
1 . The requestor generates a private key, builds a certificate signing request,
136
118
and submits the ` CertificateSigningRequest ` to the Kubernetes certificates
File renamed without changes.
Original file line number Diff line number Diff line change
1
+ title : Certificates API
2
+ kep-number : 1513
3
+ authors :
4
+ - " @mikedanese"
5
+ - " @deads2k"
6
+ owning-sig : sig-auth
7
+ reviewers :
8
+ - " @liggitt"
9
+ - " @smarterclayton"
10
+ - " @munnerz"
11
+ approvers :
12
+ - " @liggitt"
13
+ - " @smarterclayton"
14
+ creation-date : 2019-06-07
15
+ last-updated : 2020-09-14
16
+ status : implemented
Original file line number Diff line number Diff line change 1
- ---
2
- title : Bounding Self-Labeling Kubelets
3
- authors :
4
- - " @mikedanese"
5
- - " @liggitt"
6
- owning-sig : sig-auth
7
- participating-sigs :
8
- - sig-node
9
- - sig-storage
10
- reviewers :
11
- - " @saad-ali"
12
- - " @tallclair"
13
- approvers :
14
- - " @thockin"
15
- - " @smarterclayton"
16
- creation-date : 2017-08-14
17
- last-updated : 2020-05-01
18
- status : implemented
19
- ---
20
-
21
1
# Bounding Self-Labeling Kubelets
22
2
23
3
## Table of Contents
Original file line number Diff line number Diff line change
1
+ title : Bounding Self-Labeling Kubelets
2
+ kep-number : 279
3
+ authors :
4
+ - " @mikedanese"
5
+ - " @liggitt"
6
+ owning-sig : sig-auth
7
+ participating-sigs :
8
+ - sig-node
9
+ - sig-storage
10
+ reviewers :
11
+ - " @saad-ali"
12
+ - " @tallclair"
13
+ approvers :
14
+ - " @thockin"
15
+ - " @smarterclayton"
16
+ creation-date : 2017-08-14
17
+ last-updated : 2020-05-01
18
+ status : implemented
Original file line number Diff line number Diff line change 1
- ---
2
- title : Dynamic Audit Configuration
3
- authors :
4
- - " @pbarker"
5
- owning-sig : sig-auth
6
- participating-sigs :
7
- - sig-api-machinery
8
- reviewers :
9
- - " @tallclair"
10
- - " @yliaog"
11
- - " @caesarxuchao"
12
- - " @liggitt"
13
- approvers :
14
- - " @tallclair"
15
- - " @liggitt"
16
- - " @yliaog"
17
- editor : TBD
18
- creation-date : 2018-05-18
19
- last-updated : 2018-07-31
20
- status : implementable
21
- ---
22
-
23
1
# Dynamic Audit Control
24
2
25
3
## Table of Contents
@@ -283,4 +261,4 @@ it was ruled out for the following reasons:
283
261
* The use of CRDs would be difficult to bound
284
262
285
263
The dynamic policy feature is gated by runtime flags. This still provides the cluster provisioner a means to limit audit logging to the
286
- single runtime object if needed.
264
+ single runtime object if needed.
You can’t perform that action at this time.
0 commit comments