-
Notifications
You must be signed in to change notification settings - Fork 0
/
certificate_signing_request_spec.cr
111 lines (100 loc) · 7.82 KB
/
certificate_signing_request_spec.cr
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
# THIS FILE WAS AUTO GENERATED FROM THE K8S SWAGGER SPEC
require "yaml"
require "json"
module K8S
# CertificateSigningRequestSpec contains the certificate request.
@[::K8S::Properties(
expiration_seconds: {type: Int32, nilable: true, key: "expirationSeconds", getter: false, setter: false},
extra: {type: Hash(String, String), nilable: true, key: "extra", getter: false, setter: false},
groups: {type: Array(String), nilable: true, key: "groups", getter: false, setter: false},
request: {type: String, nilable: false, key: "request", getter: false, setter: false},
signer_name: {type: String, nilable: false, key: "signerName", getter: false, setter: false},
uid: {type: String, nilable: true, key: "uid", getter: false, setter: false},
usages: {type: Array(String), nilable: true, key: "usages", getter: false, setter: false},
username: {type: String, nilable: true, key: "username", getter: false, setter: false},
)]
class Api::Certificates::V1::CertificateSigningRequestSpec
include ::JSON::Serializable
include ::YAML::Serializable
# expirationSeconds is the requested duration of validity of the issued certificate. The certificate signer may issue a certificate with a different validity duration so a client must check the delta between the notBefore and and notAfter fields in the issued certificate to determine the actual duration.
#
# The v1.22+ in-tree implementations of the well-known Kubernetes signers will honor this field as long as the requested duration is not greater than the maximum duration they will honor per the --cluster-signing-duration CLI flag to the Kubernetes controller manager.
#
# Certificate signers may not honor this field for various reasons:
#
# 1. Old signer that is unaware of the field (such as the in-tree
# implementations prior to v1.22)
# 2. Signer whose configured maximum is shorter than the requested duration
# 3. Signer whose configured minimum is longer than the requested duration
#
# The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
#
# As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
@[::JSON::Field(key: "expirationSeconds", emit_null: false)]
@[::YAML::Field(key: "expirationSeconds", emit_null: false)]
property expiration_seconds : Int32 | Nil
# extra contains extra attributes of the user that created the CertificateSigningRequest. Populated by the API server on creation and immutable.
@[::JSON::Field(key: "extra", emit_null: false)]
@[::YAML::Field(key: "extra", emit_null: false)]
property extra : Hash(String, String) | Nil
# groups contains group membership of the user that created the CertificateSigningRequest. Populated by the API server on creation and immutable.
@[::JSON::Field(key: "groups", emit_null: false)]
@[::YAML::Field(key: "groups", emit_null: false)]
property groups : Array(String) | Nil
# request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block. When serialized as JSON or YAML, the data is additionally base64-encoded.
@[::JSON::Field(key: "request", emit_null: true)]
@[::YAML::Field(key: "request", emit_null: true)]
property request : String
# signerName indicates the requested signer, and is a qualified name.
#
# [List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.](List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.)
#
# Well-known Kubernetes signers are:
# 1. ["kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.]("kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.)
# Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
# 2. ["kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.]("kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.)
# Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
# 3. ["kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.]("kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.)
# Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
#
# More details are available at [https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers](https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers)
#
# Custom signerNames can also be specified. The signer defines:
# 1. Trust distribution: how trust (CA bundles) are distributed.
# 2. Permitted subjects: and behavior when a disallowed subject is requested.
# 3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
# 4. Required, permitted, or forbidden key usages / extended key usages.
# 5. [Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.](Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.)
# 6. Whether or not requests for CA certificates are allowed.
@[::JSON::Field(key: "signerName", emit_null: true)]
@[::YAML::Field(key: "signerName", emit_null: true)]
property signer_name : String
# uid contains the uid of the user that created the CertificateSigningRequest. Populated by the API server on creation and immutable.
@[::JSON::Field(key: "uid", emit_null: false)]
@[::YAML::Field(key: "uid", emit_null: false)]
property uid : String | Nil
# usages specifies a set of key usages requested in the issued certificate.
#
# Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
#
# Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
#
# Valid values are:
# "signing", "digital signature", "content commitment",
# "key encipherment", "key agreement", "data encipherment",
# "cert sign", "crl sign", "encipher only", "decipher only", "any",
# "server auth", "client auth",
# "code signing", "email protection", ["s/mime",]("s/mime",)
# "ipsec end system", "ipsec tunnel", "ipsec user",
# "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
@[::JSON::Field(key: "usages", emit_null: false)]
@[::YAML::Field(key: "usages", emit_null: false)]
property usages : Array(String) | Nil
# username contains the name of the user that created the CertificateSigningRequest. Populated by the API server on creation and immutable.
@[::JSON::Field(key: "username", emit_null: false)]
@[::YAML::Field(key: "username", emit_null: false)]
property username : String | Nil
def initialize(*, @request : String, @signer_name : String, @expiration_seconds : Int32 | Nil = nil, @extra : Hash(String, String) | Nil = nil, @groups : Array | Nil = nil, @uid : String | Nil = nil, @usages : Array | Nil = nil, @username : String | Nil = nil)
end
end
end