Merge pull request #695 from vmware-tanzu/active-directory-identity-provider
Active directory identity provider
This commit is contained in:
commit
e5718351ba
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
@ -34,6 +34,8 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||||||
&OIDCIdentityProviderList{},
|
&OIDCIdentityProviderList{},
|
||||||
&LDAPIdentityProvider{},
|
&LDAPIdentityProvider{},
|
||||||
&LDAPIdentityProviderList{},
|
&LDAPIdentityProviderList{},
|
||||||
|
&ActiveDirectoryIdentityProvider{},
|
||||||
|
&ActiveDirectoryIdentityProviderList{},
|
||||||
)
|
)
|
||||||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||||
return nil
|
return nil
|
||||||
|
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderPhase string
|
||||||
|
|
||||||
|
const (
|
||||||
|
// ActiveDirectoryPhasePending is the default phase for newly-created ActiveDirectoryIdentityProvider resources.
|
||||||
|
ActiveDirectoryPhasePending ActiveDirectoryIdentityProviderPhase = "Pending"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseReady is the phase for an ActiveDirectoryIdentityProvider resource in a healthy state.
|
||||||
|
ActiveDirectoryPhaseReady ActiveDirectoryIdentityProviderPhase = "Ready"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseError is the phase for an ActiveDirectoryIdentityProvider in an unhealthy state.
|
||||||
|
ActiveDirectoryPhaseError ActiveDirectoryIdentityProviderPhase = "Error"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Status of an Active Directory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderStatus struct {
|
||||||
|
// Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
// +kubebuilder:default=Pending
|
||||||
|
// +kubebuilder:validation:Enum=Pending;Ready;Error
|
||||||
|
Phase ActiveDirectoryIdentityProviderPhase `json:"phase,omitempty"`
|
||||||
|
|
||||||
|
// Represents the observations of an identity provider's current state.
|
||||||
|
// +patchMergeKey=type
|
||||||
|
// +patchStrategy=merge
|
||||||
|
// +listType=map
|
||||||
|
// +listMapKey=type
|
||||||
|
Conditions []Condition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderBind struct {
|
||||||
|
// SecretName contains the name of a namespace-local Secret object that provides the username and
|
||||||
|
// password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be
|
||||||
|
// of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value
|
||||||
|
// should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
// The password must be non-empty.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
SecretName string `json:"secretName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearchAttributes struct {
|
||||||
|
// Username specifies the name of the attribute in Active Directory entry whose value shall become the username
|
||||||
|
// of the user after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
// +optional
|
||||||
|
Username string `json:"username,omitempty"`
|
||||||
|
|
||||||
|
// UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely
|
||||||
|
// identify the user within this ActiveDirectory provider after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "objectGUID".
|
||||||
|
// +optional
|
||||||
|
UID string `json:"uid,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearchAttributes struct {
|
||||||
|
// GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name
|
||||||
|
// in the user's list of groups after a successful authentication.
|
||||||
|
// The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory
|
||||||
|
// server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn".
|
||||||
|
// Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
// where domain is constructed from the domain components of the group DN.
|
||||||
|
// +optional
|
||||||
|
GroupName string `json:"groupName,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for users.
|
||||||
|
// E.g. "ou=users,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for users.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some users
|
||||||
|
// or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur
|
||||||
|
// in the filter at least once and will be dynamically replaced by the username for which the search is being run.
|
||||||
|
// E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will be
|
||||||
|
// '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
// This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account,
|
||||||
|
// and is not shown in advanced view only
|
||||||
|
// (which would likely mean its a system created service account with advanced permissions).
|
||||||
|
// Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as
|
||||||
|
// the result of the user search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderUserSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g.
|
||||||
|
// "ou=groups,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for groups.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some groups
|
||||||
|
// for security reasons or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user.
|
||||||
|
// The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the
|
||||||
|
// dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or
|
||||||
|
// "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will act as if the filter were specified as
|
||||||
|
// "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
// This searches nested groups by default.
|
||||||
|
// Note that nested group search can be slow for some Active Directory servers. To disable it,
|
||||||
|
// you can set the filter to
|
||||||
|
// "(&(objectClass=group)(member={})"
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as
|
||||||
|
// the result of the group search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderSpec struct {
|
||||||
|
// Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
Host string `json:"host"`
|
||||||
|
|
||||||
|
// TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
TLS *TLSSpec `json:"tls,omitempty"`
|
||||||
|
|
||||||
|
// Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server
|
||||||
|
// to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
Bind ActiveDirectoryIdentityProviderBind `json:"bind,omitempty"`
|
||||||
|
|
||||||
|
// UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
UserSearch ActiveDirectoryIdentityProviderUserSearch `json:"userSearch,omitempty"`
|
||||||
|
|
||||||
|
// GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
GroupSearch ActiveDirectoryIdentityProviderGroupSearch `json:"groupSearch,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
// +genclient
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
// +kubebuilder:resource:categories=pinniped;pinniped-idp;pinniped-idps
|
||||||
|
// +kubebuilder:printcolumn:name="Host",type=string,JSONPath=`.spec.host`
|
||||||
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.phase`
|
||||||
|
// +kubebuilder:printcolumn:name="Age",type=date,JSONPath=`.metadata.creationTimestamp`
|
||||||
|
// +kubebuilder:subresource:status
|
||||||
|
type ActiveDirectoryIdentityProvider struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
// Spec for configuring the identity provider.
|
||||||
|
Spec ActiveDirectoryIdentityProviderSpec `json:"spec"`
|
||||||
|
|
||||||
|
// Status of the identity provider.
|
||||||
|
Status ActiveDirectoryIdentityProviderStatus `json:"status,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// List of ActiveDirectoryIdentityProvider objects.
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
type ActiveDirectoryIdentityProviderList struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ListMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
Items []ActiveDirectoryIdentityProvider `json:"items"`
|
||||||
|
}
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
@ -14,6 +14,7 @@ type IDPFlow string
|
|||||||
const (
|
const (
|
||||||
IDPTypeOIDC IDPType = "oidc"
|
IDPTypeOIDC IDPType = "oidc"
|
||||||
IDPTypeLDAP IDPType = "ldap"
|
IDPTypeLDAP IDPType = "ldap"
|
||||||
|
IDPTypeActiveDirectory IDPType = "activedirectory"
|
||||||
|
|
||||||
IDPFlowCLIPassword IDPFlow = "cli_password"
|
IDPFlowCLIPassword IDPFlow = "cli_password"
|
||||||
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
||||||
|
@ -138,7 +138,7 @@ func kubeconfigCommand(deps kubeconfigDeps) *cobra.Command {
|
|||||||
f.BoolVar(&flags.oidc.debugSessionCache, "oidc-debug-session-cache", false, "Print debug logs related to the OpenID Connect session cache")
|
f.BoolVar(&flags.oidc.debugSessionCache, "oidc-debug-session-cache", false, "Print debug logs related to the OpenID Connect session cache")
|
||||||
f.StringVar(&flags.oidc.requestAudience, "oidc-request-audience", "", "Request a token with an alternate audience using RFC8693 token exchange")
|
f.StringVar(&flags.oidc.requestAudience, "oidc-request-audience", "", "Request a token with an alternate audience using RFC8693 token exchange")
|
||||||
f.StringVar(&flags.oidc.upstreamIDPName, "upstream-identity-provider-name", "", "The name of the upstream identity provider used during login with a Supervisor")
|
f.StringVar(&flags.oidc.upstreamIDPName, "upstream-identity-provider-name", "", "The name of the upstream identity provider used during login with a Supervisor")
|
||||||
f.StringVar(&flags.oidc.upstreamIDPType, "upstream-identity-provider-type", "", fmt.Sprintf("The type of the upstream identity provider used during login with a Supervisor (e.g. '%s', '%s')", idpdiscoveryv1alpha1.IDPTypeOIDC, idpdiscoveryv1alpha1.IDPTypeLDAP))
|
f.StringVar(&flags.oidc.upstreamIDPType, "upstream-identity-provider-type", "", fmt.Sprintf("The type of the upstream identity provider used during login with a Supervisor (e.g. '%s', '%s', '%s')", idpdiscoveryv1alpha1.IDPTypeOIDC, idpdiscoveryv1alpha1.IDPTypeLDAP, idpdiscoveryv1alpha1.IDPTypeActiveDirectory))
|
||||||
f.StringVar(&flags.oidc.upstreamIDPFlow, "upstream-identity-provider-flow", "", fmt.Sprintf("The type of client flow to use with the upstream identity provider during login with a Supervisor (e.g. '%s', '%s')", idpdiscoveryv1alpha1.IDPFlowCLIPassword, idpdiscoveryv1alpha1.IDPFlowBrowserAuthcode))
|
f.StringVar(&flags.oidc.upstreamIDPFlow, "upstream-identity-provider-flow", "", fmt.Sprintf("The type of client flow to use with the upstream identity provider during login with a Supervisor (e.g. '%s', '%s')", idpdiscoveryv1alpha1.IDPFlowCLIPassword, idpdiscoveryv1alpha1.IDPFlowBrowserAuthcode))
|
||||||
f.StringVar(&flags.kubeconfigPath, "kubeconfig", os.Getenv("KUBECONFIG"), "Path to kubeconfig file")
|
f.StringVar(&flags.kubeconfigPath, "kubeconfig", os.Getenv("KUBECONFIG"), "Path to kubeconfig file")
|
||||||
f.StringVar(&flags.kubeconfigContextOverride, "kubeconfig-context", "", "Kubeconfig context name (default: current active context)")
|
f.StringVar(&flags.kubeconfigContextOverride, "kubeconfig-context", "", "Kubeconfig context name (default: current active context)")
|
||||||
|
@ -151,7 +151,7 @@ func TestGetKubeconfig(t *testing.T) {
|
|||||||
--timeout duration Timeout for autodiscovery and validation (default 10m0s)
|
--timeout duration Timeout for autodiscovery and validation (default 10m0s)
|
||||||
--upstream-identity-provider-flow string The type of client flow to use with the upstream identity provider during login with a Supervisor (e.g. 'cli_password', 'browser_authcode')
|
--upstream-identity-provider-flow string The type of client flow to use with the upstream identity provider during login with a Supervisor (e.g. 'cli_password', 'browser_authcode')
|
||||||
--upstream-identity-provider-name string The name of the upstream identity provider used during login with a Supervisor
|
--upstream-identity-provider-name string The name of the upstream identity provider used during login with a Supervisor
|
||||||
--upstream-identity-provider-type string The type of the upstream identity provider used during login with a Supervisor (e.g. 'oidc', 'ldap')
|
--upstream-identity-provider-type string The type of the upstream identity provider used during login with a Supervisor (e.g. 'oidc', 'ldap', 'activedirectory')
|
||||||
`)
|
`)
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -2471,7 +2471,7 @@ func TestGetKubeconfig(t *testing.T) {
|
|||||||
issuerURL,
|
issuerURL,
|
||||||
base64.StdEncoding.EncodeToString([]byte(issuerCABundle)))
|
base64.StdEncoding.EncodeToString([]byte(issuerCABundle)))
|
||||||
},
|
},
|
||||||
},
|
}, // TODO make sure there are active directory tests for various flows
|
||||||
{
|
{
|
||||||
name: "supervisor upstream IDP discovery when both name and type are specified but flow is not and a matching IDP is found",
|
name: "supervisor upstream IDP discovery when both name and type are specified but flow is not and a matching IDP is found",
|
||||||
args: func(issuerCABundle string, issuerURL string) []string {
|
args: func(issuerCABundle string, issuerURL string) []string {
|
||||||
|
@ -110,7 +110,7 @@ func oidcLoginCommand(deps oidcLoginCommandDeps) *cobra.Command {
|
|||||||
cmd.Flags().StringVar(&flags.conciergeAPIGroupSuffix, "concierge-api-group-suffix", groupsuffix.PinnipedDefaultSuffix, "Concierge API group suffix")
|
cmd.Flags().StringVar(&flags.conciergeAPIGroupSuffix, "concierge-api-group-suffix", groupsuffix.PinnipedDefaultSuffix, "Concierge API group suffix")
|
||||||
cmd.Flags().StringVar(&flags.credentialCachePath, "credential-cache", filepath.Join(mustGetConfigDir(), "credentials.yaml"), "Path to cluster-specific credentials cache (\"\" disables the cache)")
|
cmd.Flags().StringVar(&flags.credentialCachePath, "credential-cache", filepath.Join(mustGetConfigDir(), "credentials.yaml"), "Path to cluster-specific credentials cache (\"\" disables the cache)")
|
||||||
cmd.Flags().StringVar(&flags.upstreamIdentityProviderName, "upstream-identity-provider-name", "", "The name of the upstream identity provider used during login with a Supervisor")
|
cmd.Flags().StringVar(&flags.upstreamIdentityProviderName, "upstream-identity-provider-name", "", "The name of the upstream identity provider used during login with a Supervisor")
|
||||||
cmd.Flags().StringVar(&flags.upstreamIdentityProviderType, "upstream-identity-provider-type", idpdiscoveryv1alpha1.IDPTypeOIDC.String(), fmt.Sprintf("The type of the upstream identity provider used during login with a Supervisor (e.g. '%s', '%s')", idpdiscoveryv1alpha1.IDPTypeOIDC, idpdiscoveryv1alpha1.IDPTypeLDAP))
|
cmd.Flags().StringVar(&flags.upstreamIdentityProviderType, "upstream-identity-provider-type", idpdiscoveryv1alpha1.IDPTypeOIDC.String(), fmt.Sprintf("The type of the upstream identity provider used during login with a Supervisor (e.g. '%s', '%s', '%s')", idpdiscoveryv1alpha1.IDPTypeOIDC, idpdiscoveryv1alpha1.IDPTypeLDAP, idpdiscoveryv1alpha1.IDPTypeActiveDirectory))
|
||||||
cmd.Flags().StringVar(&flags.upstreamIdentityProviderFlow, "upstream-identity-provider-flow", "", fmt.Sprintf("The type of client flow to use with the upstream identity provider during login with a Supervisor (e.g. '%s', '%s')", idpdiscoveryv1alpha1.IDPFlowBrowserAuthcode, idpdiscoveryv1alpha1.IDPFlowCLIPassword))
|
cmd.Flags().StringVar(&flags.upstreamIdentityProviderFlow, "upstream-identity-provider-flow", "", fmt.Sprintf("The type of client flow to use with the upstream identity provider during login with a Supervisor (e.g. '%s', '%s')", idpdiscoveryv1alpha1.IDPFlowBrowserAuthcode, idpdiscoveryv1alpha1.IDPFlowCLIPassword))
|
||||||
|
|
||||||
// --skip-listen is mainly needed for testing. We'll leave it hidden until we have a non-testing use case.
|
// --skip-listen is mainly needed for testing. We'll leave it hidden until we have a non-testing use case.
|
||||||
@ -267,7 +267,7 @@ func flowOptions(requestedIDPType idpdiscoveryv1alpha1.IDPType, requestedFlow id
|
|||||||
"--upstream-identity-provider-flow value not recognized for identity provider type %q: %s (supported values: %s)",
|
"--upstream-identity-provider-flow value not recognized for identity provider type %q: %s (supported values: %s)",
|
||||||
requestedIDPType, requestedFlow, strings.Join([]string{idpdiscoveryv1alpha1.IDPFlowBrowserAuthcode.String(), idpdiscoveryv1alpha1.IDPFlowCLIPassword.String()}, ", "))
|
requestedIDPType, requestedFlow, strings.Join([]string{idpdiscoveryv1alpha1.IDPFlowBrowserAuthcode.String(), idpdiscoveryv1alpha1.IDPFlowCLIPassword.String()}, ", "))
|
||||||
}
|
}
|
||||||
case idpdiscoveryv1alpha1.IDPTypeLDAP:
|
case idpdiscoveryv1alpha1.IDPTypeLDAP, idpdiscoveryv1alpha1.IDPTypeActiveDirectory:
|
||||||
switch requestedFlow {
|
switch requestedFlow {
|
||||||
case idpdiscoveryv1alpha1.IDPFlowCLIPassword, "":
|
case idpdiscoveryv1alpha1.IDPFlowCLIPassword, "":
|
||||||
return useCLIFlow, nil
|
return useCLIFlow, nil
|
||||||
@ -282,7 +282,13 @@ func flowOptions(requestedIDPType idpdiscoveryv1alpha1.IDPType, requestedFlow id
|
|||||||
// Surprisingly cobra does not support this kind of flag validation. See https://github.com/spf13/pflag/issues/236
|
// Surprisingly cobra does not support this kind of flag validation. See https://github.com/spf13/pflag/issues/236
|
||||||
return nil, fmt.Errorf(
|
return nil, fmt.Errorf(
|
||||||
"--upstream-identity-provider-type value not recognized: %s (supported values: %s)",
|
"--upstream-identity-provider-type value not recognized: %s (supported values: %s)",
|
||||||
requestedIDPType, strings.Join([]string{idpdiscoveryv1alpha1.IDPTypeOIDC.String(), idpdiscoveryv1alpha1.IDPTypeLDAP.String()}, ", "))
|
requestedIDPType,
|
||||||
|
strings.Join([]string{
|
||||||
|
idpdiscoveryv1alpha1.IDPTypeOIDC.String(),
|
||||||
|
idpdiscoveryv1alpha1.IDPTypeLDAP.String(),
|
||||||
|
idpdiscoveryv1alpha1.IDPTypeActiveDirectory.String(),
|
||||||
|
}, ", "),
|
||||||
|
)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -79,7 +79,7 @@ func TestLoginOIDCCommand(t *testing.T) {
|
|||||||
--skip-browser Skip opening the browser (just print the URL)
|
--skip-browser Skip opening the browser (just print the URL)
|
||||||
--upstream-identity-provider-flow string The type of client flow to use with the upstream identity provider during login with a Supervisor (e.g. 'browser_authcode', 'cli_password')
|
--upstream-identity-provider-flow string The type of client flow to use with the upstream identity provider during login with a Supervisor (e.g. 'browser_authcode', 'cli_password')
|
||||||
--upstream-identity-provider-name string The name of the upstream identity provider used during login with a Supervisor
|
--upstream-identity-provider-name string The name of the upstream identity provider used during login with a Supervisor
|
||||||
--upstream-identity-provider-type string The type of the upstream identity provider used during login with a Supervisor (e.g. 'oidc', 'ldap') (default "oidc")
|
--upstream-identity-provider-type string The type of the upstream identity provider used during login with a Supervisor (e.g. 'oidc', 'ldap', 'activedirectory') (default "oidc")
|
||||||
`),
|
`),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -149,7 +149,7 @@ func TestLoginOIDCCommand(t *testing.T) {
|
|||||||
},
|
},
|
||||||
wantError: true,
|
wantError: true,
|
||||||
wantStderr: here.Doc(`
|
wantStderr: here.Doc(`
|
||||||
Error: --upstream-identity-provider-type value not recognized: invalid (supported values: oidc, ldap)
|
Error: --upstream-identity-provider-type value not recognized: invalid (supported values: oidc, ldap, activedirectory)
|
||||||
`),
|
`),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -212,6 +212,17 @@ func TestLoginOIDCCommand(t *testing.T) {
|
|||||||
wantOptionsCount: 5,
|
wantOptionsCount: 5,
|
||||||
wantStdout: `{"kind":"ExecCredential","apiVersion":"client.authentication.k8s.io/v1beta1","spec":{"interactive":false},"status":{"expirationTimestamp":"3020-10-12T13:14:15Z","token":"test-id-token"}}` + "\n",
|
wantStdout: `{"kind":"ExecCredential","apiVersion":"client.authentication.k8s.io/v1beta1","spec":{"interactive":false},"status":{"expirationTimestamp":"3020-10-12T13:14:15Z","token":"test-id-token"}}` + "\n",
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "activedirectory upstream type with default flow is allowed",
|
||||||
|
args: []string{
|
||||||
|
"--issuer", "test-issuer",
|
||||||
|
"--client-id", "test-client-id",
|
||||||
|
"--upstream-identity-provider-type", "activedirectory",
|
||||||
|
"--credential-cache", "", // must specify --credential-cache or else the cache file on disk causes test pollution
|
||||||
|
},
|
||||||
|
wantOptionsCount: 5,
|
||||||
|
wantStdout: `{"kind":"ExecCredential","apiVersion":"client.authentication.k8s.io/v1beta1","spec":{"interactive":false},"status":{"expirationTimestamp":"3020-10-12T13:14:15Z","token":"test-id-token"}}` + "\n",
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "ldap upstream type with CLI flow is allowed",
|
name: "ldap upstream type with CLI flow is allowed",
|
||||||
args: []string{
|
args: []string{
|
||||||
@ -238,6 +249,32 @@ func TestLoginOIDCCommand(t *testing.T) {
|
|||||||
Error: --upstream-identity-provider-flow value not recognized for identity provider type "ldap": browser_authcode (supported values: [cli_password])
|
Error: --upstream-identity-provider-flow value not recognized for identity provider type "ldap": browser_authcode (supported values: [cli_password])
|
||||||
`),
|
`),
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "active directory upstream type with CLI flow is allowed",
|
||||||
|
args: []string{
|
||||||
|
"--issuer", "test-issuer",
|
||||||
|
"--client-id", "test-client-id",
|
||||||
|
"--upstream-identity-provider-type", "activedirectory",
|
||||||
|
"--upstream-identity-provider-flow", "cli_password",
|
||||||
|
"--credential-cache", "", // must specify --credential-cache or else the cache file on disk causes test pollution
|
||||||
|
},
|
||||||
|
wantOptionsCount: 5,
|
||||||
|
wantStdout: `{"kind":"ExecCredential","apiVersion":"client.authentication.k8s.io/v1beta1","spec":{"interactive":false},"status":{"expirationTimestamp":"3020-10-12T13:14:15Z","token":"test-id-token"}}` + "\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "active directory upstream type with unsupported flow is an error",
|
||||||
|
args: []string{
|
||||||
|
"--issuer", "test-issuer",
|
||||||
|
"--client-id", "test-client-id",
|
||||||
|
"--upstream-identity-provider-type", "activedirectory",
|
||||||
|
"--upstream-identity-provider-flow", "browser_authcode", // "browser_authcode" is only supported for OIDC upstreams
|
||||||
|
"--credential-cache", "", // must specify --credential-cache or else the cache file on disk causes test pollution
|
||||||
|
},
|
||||||
|
wantError: true,
|
||||||
|
wantStderr: here.Doc(`
|
||||||
|
Error: --upstream-identity-provider-flow value not recognized for identity provider type "activedirectory": browser_authcode (supported values: [cli_password])
|
||||||
|
`),
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "login error",
|
name: "login error",
|
||||||
args: []string{
|
args: []string{
|
||||||
|
@ -0,0 +1,281 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.4.0
|
||||||
|
creationTimestamp: null
|
||||||
|
name: activedirectoryidentityproviders.idp.supervisor.pinniped.dev
|
||||||
|
spec:
|
||||||
|
group: idp.supervisor.pinniped.dev
|
||||||
|
names:
|
||||||
|
categories:
|
||||||
|
- pinniped
|
||||||
|
- pinniped-idp
|
||||||
|
- pinniped-idps
|
||||||
|
kind: ActiveDirectoryIdentityProvider
|
||||||
|
listKind: ActiveDirectoryIdentityProviderList
|
||||||
|
plural: activedirectoryidentityproviders
|
||||||
|
singular: activedirectoryidentityprovider
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- jsonPath: .spec.host
|
||||||
|
name: Host
|
||||||
|
type: string
|
||||||
|
- jsonPath: .status.phase
|
||||||
|
name: Status
|
||||||
|
type: string
|
||||||
|
- jsonPath: .metadata.creationTimestamp
|
||||||
|
name: Age
|
||||||
|
type: date
|
||||||
|
name: v1alpha1
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: ActiveDirectoryIdentityProvider describes the configuration of
|
||||||
|
an upstream Microsoft Active Directory identity provider.
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: Spec for configuring the identity provider.
|
||||||
|
properties:
|
||||||
|
bind:
|
||||||
|
description: Bind contains the configuration for how to provide access
|
||||||
|
credentials during an initial bind to the ActiveDirectory server
|
||||||
|
to be allowed to perform searches and binds to validate a user's
|
||||||
|
credentials during a user's authentication attempt.
|
||||||
|
properties:
|
||||||
|
secretName:
|
||||||
|
description: SecretName contains the name of a namespace-local
|
||||||
|
Secret object that provides the username and password for an
|
||||||
|
Active Directory bind user. This account will be used to perform
|
||||||
|
LDAP searches. The Secret should be of type "kubernetes.io/basic-auth"
|
||||||
|
which includes "username" and "password" keys. The username
|
||||||
|
value should be the full dn (distinguished name) of your bind
|
||||||
|
account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
The password must be non-empty.
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- secretName
|
||||||
|
type: object
|
||||||
|
groupSearch:
|
||||||
|
description: GroupSearch contains the configuration for searching
|
||||||
|
for a user's group membership in ActiveDirectory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the group's information
|
||||||
|
should be read from each ActiveDirectory entry which was found
|
||||||
|
as the result of the group search.
|
||||||
|
properties:
|
||||||
|
groupName:
|
||||||
|
description: GroupName specifies the name of the attribute
|
||||||
|
in the Active Directory entries whose value shall become
|
||||||
|
a group name in the user's list of groups after a successful
|
||||||
|
authentication. The value of this field is case-sensitive
|
||||||
|
and must match the case of the attribute name returned by
|
||||||
|
the ActiveDirectory server in the user's entry. E.g. "cn"
|
||||||
|
for common name. Distinguished names can be used by specifying
|
||||||
|
lower-case "dn". Optional. When not specified, this defaults
|
||||||
|
to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
where domain is constructed from the domain components of
|
||||||
|
the group DN.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for groups.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some groups for security reasons or to make
|
||||||
|
searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the ActiveDirectory search filter which
|
||||||
|
should be applied when searching for groups for a user. The
|
||||||
|
pattern "{}" must occur in the filter at least once and will
|
||||||
|
be dynamically replaced by the dn (distinguished name) of the
|
||||||
|
user entry found as a result of the user search. E.g. "member={}"
|
||||||
|
or "&(objectClass=groupOfNames)(member={})". For more information
|
||||||
|
about ActiveDirectory filters, see https://ldap.com/ldap-filters.
|
||||||
|
Note that the dn (distinguished name) is not an attribute of
|
||||||
|
an entry, so "dn={}" cannot be used. Optional. When not specified,
|
||||||
|
the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
This searches nested groups by default. Note that nested group
|
||||||
|
search can be slow for some Active Directory servers. To disable
|
||||||
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
host:
|
||||||
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
provider, i.e., where to connect. For example: ldap.example.com:636.'
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
tls:
|
||||||
|
description: TLS contains the connection settings for how to establish
|
||||||
|
the connection to the Host.
|
||||||
|
properties:
|
||||||
|
certificateAuthorityData:
|
||||||
|
description: X.509 Certificate Authority (base64-encoded PEM bundle).
|
||||||
|
If omitted, a default set of system roots will be trusted.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
userSearch:
|
||||||
|
description: UserSearch contains the configuration for searching for
|
||||||
|
a user by name in Active Directory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the user's information should
|
||||||
|
be read from the ActiveDirectory entry which was found as the
|
||||||
|
result of the user search.
|
||||||
|
properties:
|
||||||
|
uid:
|
||||||
|
description: UID specifies the name of the attribute in the
|
||||||
|
ActiveDirectory entry which whose value shall be used to
|
||||||
|
uniquely identify the user within this ActiveDirectory provider
|
||||||
|
after a successful authentication. Optional, when empty
|
||||||
|
this defaults to "objectGUID".
|
||||||
|
type: string
|
||||||
|
username:
|
||||||
|
description: Username specifies the name of the attribute
|
||||||
|
in Active Directory entry whose value shall become the username
|
||||||
|
of the user after a successful authentication. Optional,
|
||||||
|
when empty this defaults to "userPrincipalName".
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for users.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some users or to make searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the search filter which should be applied
|
||||||
|
when searching for users. The pattern "{}" must occur in the
|
||||||
|
filter at least once and will be dynamically replaced by the
|
||||||
|
username for which the search is being run. E.g. "mail={}" or
|
||||||
|
"&(objectClass=person)(uid={})". For more information about
|
||||||
|
LDAP filters, see https://ldap.com/ldap-filters. Note that the
|
||||||
|
dn (distinguished name) is not an attribute of an entry, so
|
||||||
|
"dn={}" cannot be used. Optional. When not specified, the default
|
||||||
|
will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
This means that the user is a person, is not a computer, the
|
||||||
|
sAMAccountType is for a normal user account, and is not shown
|
||||||
|
in advanced view only (which would likely mean its a system
|
||||||
|
created service account with advanced permissions). Also, either
|
||||||
|
the sAMAccountName, the userPrincipalName, or the mail attribute
|
||||||
|
matches the input username.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- host
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
description: Status of the identity provider.
|
||||||
|
properties:
|
||||||
|
conditions:
|
||||||
|
description: Represents the observations of an identity provider's
|
||||||
|
current state.
|
||||||
|
items:
|
||||||
|
description: Condition status of a resource (mirrored from the metav1.Condition
|
||||||
|
type added in Kubernetes 1.19). In a future API version we can
|
||||||
|
switch to using the upstream type. See https://github.com/kubernetes/apimachinery/blob/v0.19.0/pkg/apis/meta/v1/types.go#L1353-L1413.
|
||||||
|
properties:
|
||||||
|
lastTransitionTime:
|
||||||
|
description: lastTransitionTime is the last time the condition
|
||||||
|
transitioned from one status to another. This should be when
|
||||||
|
the underlying condition changed. If that is not known, then
|
||||||
|
using the time when the API field changed is acceptable.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
message:
|
||||||
|
description: message is a human readable message indicating
|
||||||
|
details about the transition. This may be an empty string.
|
||||||
|
maxLength: 32768
|
||||||
|
type: string
|
||||||
|
observedGeneration:
|
||||||
|
description: observedGeneration represents the .metadata.generation
|
||||||
|
that the condition was set based upon. For instance, if .metadata.generation
|
||||||
|
is currently 12, but the .status.conditions[x].observedGeneration
|
||||||
|
is 9, the condition is out of date with respect to the current
|
||||||
|
state of the instance.
|
||||||
|
format: int64
|
||||||
|
minimum: 0
|
||||||
|
type: integer
|
||||||
|
reason:
|
||||||
|
description: reason contains a programmatic identifier indicating
|
||||||
|
the reason for the condition's last transition. Producers
|
||||||
|
of specific condition types may define expected values and
|
||||||
|
meanings for this field, and whether the values are considered
|
||||||
|
a guaranteed API. The value should be a CamelCase string.
|
||||||
|
This field may not be empty.
|
||||||
|
maxLength: 1024
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
description: status of the condition, one of True, False, Unknown.
|
||||||
|
enum:
|
||||||
|
- "True"
|
||||||
|
- "False"
|
||||||
|
- Unknown
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||||
|
--- Many .condition.type values are consistent across resources
|
||||||
|
like Available, but because arbitrary conditions can be useful
|
||||||
|
(see .node.status.conditions), the ability to deconflict is
|
||||||
|
important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||||
|
maxLength: 316
|
||||||
|
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- lastTransitionTime
|
||||||
|
- message
|
||||||
|
- reason
|
||||||
|
- status
|
||||||
|
- type
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
x-kubernetes-list-map-keys:
|
||||||
|
- type
|
||||||
|
x-kubernetes-list-type: map
|
||||||
|
phase:
|
||||||
|
default: Pending
|
||||||
|
description: Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
enum:
|
||||||
|
- Pending
|
||||||
|
- Ready
|
||||||
|
- Error
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- spec
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
@ -40,6 +40,14 @@ rules:
|
|||||||
- #@ pinnipedDevAPIGroupWithPrefix("idp.supervisor")
|
- #@ pinnipedDevAPIGroupWithPrefix("idp.supervisor")
|
||||||
resources: [ldapidentityproviders/status]
|
resources: [ldapidentityproviders/status]
|
||||||
verbs: [get, patch, update]
|
verbs: [get, patch, update]
|
||||||
|
- apiGroups:
|
||||||
|
- #@ pinnipedDevAPIGroupWithPrefix("idp.supervisor")
|
||||||
|
resources: [activedirectoryidentityproviders]
|
||||||
|
verbs: [get, list, watch]
|
||||||
|
- apiGroups:
|
||||||
|
- #@ pinnipedDevAPIGroupWithPrefix("idp.supervisor")
|
||||||
|
resources: [activedirectoryidentityproviders/status]
|
||||||
|
verbs: [get, patch, update]
|
||||||
#! We want to be able to read pods/replicasets/deployment so we can learn who our deployment is to set
|
#! We want to be able to read pods/replicasets/deployment so we can learn who our deployment is to set
|
||||||
#! as an owner reference.
|
#! as an owner reference.
|
||||||
- apiGroups: [""]
|
- apiGroups: [""]
|
||||||
|
@ -31,3 +31,12 @@ metadata:
|
|||||||
name: #@ pinnipedDevAPIGroupWithPrefix("ldapidentityproviders.idp.supervisor")
|
name: #@ pinnipedDevAPIGroupWithPrefix("ldapidentityproviders.idp.supervisor")
|
||||||
spec:
|
spec:
|
||||||
group: #@ pinnipedDevAPIGroupWithPrefix("idp.supervisor")
|
group: #@ pinnipedDevAPIGroupWithPrefix("idp.supervisor")
|
||||||
|
|
||||||
|
#@overlay/match by=overlay.subset({"kind": "CustomResourceDefinition", "metadata":{"name":"activedirectoryidentityproviders.idp.supervisor.pinniped.dev"}}), expects=1
|
||||||
|
---
|
||||||
|
metadata:
|
||||||
|
#@overlay/match missing_ok=True
|
||||||
|
labels: #@ labels()
|
||||||
|
name: #@ pinnipedDevAPIGroupWithPrefix("activedirectoryidentityproviders.idp.supervisor")
|
||||||
|
spec:
|
||||||
|
group: #@ pinnipedDevAPIGroupWithPrefix("idp.supervisor")
|
||||||
|
153
generated/1.17/README.adoc
generated
153
generated/1.17/README.adoc
generated
@ -748,6 +748,157 @@ Package v1alpha1 is the v1alpha1 version of the Pinniped supervisor identity pro
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider"]
|
||||||
|
==== ActiveDirectoryIdentityProvider
|
||||||
|
|
||||||
|
ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderlist[$$ActiveDirectoryIdentityProviderList$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`metadata`* __link:https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.17/#objectmeta-v1-meta[$$ObjectMeta$$]__ | Refer to Kubernetes API documentation for fields of `metadata`.
|
||||||
|
|
||||||
|
| *`spec`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]__ | Spec for configuring the identity provider.
|
||||||
|
| *`status`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus[$$ActiveDirectoryIdentityProviderStatus$$]__ | Status of the identity provider.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderbind"]
|
||||||
|
==== ActiveDirectoryIdentityProviderBind
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`secretName`* __string__ | SecretName contains the name of a namespace-local Secret object that provides the username and password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com". The password must be non-empty.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch"]
|
||||||
|
==== ActiveDirectoryIdentityProviderGroupSearch
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
||||||
|
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes"]
|
||||||
|
==== ActiveDirectoryIdentityProviderGroupSearchAttributes
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch[$$ActiveDirectoryIdentityProviderGroupSearch$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`groupName`* __string__ | GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name in the user's list of groups after a successful authentication. The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn". Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain", where domain is constructed from the domain components of the group DN.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec"]
|
||||||
|
==== ActiveDirectoryIdentityProviderSpec
|
||||||
|
|
||||||
|
Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider[$$ActiveDirectoryIdentityProvider$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`host`* __string__ | Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
| *`tls`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-tlsspec[$$TLSSpec$$]__ | TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
| *`bind`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderbind[$$ActiveDirectoryIdentityProviderBind$$]__ | Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
| *`userSearch`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch[$$ActiveDirectoryIdentityProviderUserSearch$$]__ | UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
| *`groupSearch`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch[$$ActiveDirectoryIdentityProviderGroupSearch$$]__ | GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus"]
|
||||||
|
==== ActiveDirectoryIdentityProviderStatus
|
||||||
|
|
||||||
|
Status of an Active Directory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider[$$ActiveDirectoryIdentityProvider$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`phase`* __ActiveDirectoryIdentityProviderPhase__ | Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
| *`conditions`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-condition[$$Condition$$] array__ | Represents the observations of an identity provider's current state.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch"]
|
||||||
|
==== ActiveDirectoryIdentityProviderUserSearch
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for users. It may make sense to specify a subtree as a search base if you wish to exclude some users or to make searches faster.
|
||||||
|
| *`filter`* __string__ | Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the username for which the search is being run. E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))' This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account, and is not shown in advanced view only (which would likely mean its a system created service account with advanced permissions). Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearchattributes[$$ActiveDirectoryIdentityProviderUserSearchAttributes$$]__ | Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as the result of the user search.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearchattributes"]
|
||||||
|
==== ActiveDirectoryIdentityProviderUserSearchAttributes
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch[$$ActiveDirectoryIdentityProviderUserSearch$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`username`* __string__ | Username specifies the name of the attribute in Active Directory entry whose value shall become the username of the user after a successful authentication. Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
| *`uid`* __string__ | UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely identify the user within this ActiveDirectory provider after a successful authentication. Optional, when empty this defaults to "objectGUID".
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-condition"]
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-condition"]
|
||||||
==== Condition
|
==== Condition
|
||||||
|
|
||||||
@ -755,6 +906,7 @@ Package v1alpha1 is the v1alpha1 version of the Pinniped supervisor identity pro
|
|||||||
|
|
||||||
.Appears In:
|
.Appears In:
|
||||||
****
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus[$$ActiveDirectoryIdentityProviderStatus$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-ldapidentityproviderstatus[$$LDAPIdentityProviderStatus$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-ldapidentityproviderstatus[$$LDAPIdentityProviderStatus$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-oidcidentityproviderstatus[$$OIDCIdentityProviderStatus$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-oidcidentityproviderstatus[$$OIDCIdentityProviderStatus$$]
|
||||||
****
|
****
|
||||||
@ -1055,6 +1207,7 @@ Status of an OIDC identity provider.
|
|||||||
|
|
||||||
.Appears In:
|
.Appears In:
|
||||||
****
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-ldapidentityproviderspec[$$LDAPIdentityProviderSpec$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-ldapidentityproviderspec[$$LDAPIdentityProviderSpec$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-oidcidentityproviderspec[$$OIDCIdentityProviderSpec$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-oidcidentityproviderspec[$$OIDCIdentityProviderSpec$$]
|
||||||
****
|
****
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
@ -34,6 +34,8 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||||||
&OIDCIdentityProviderList{},
|
&OIDCIdentityProviderList{},
|
||||||
&LDAPIdentityProvider{},
|
&LDAPIdentityProvider{},
|
||||||
&LDAPIdentityProviderList{},
|
&LDAPIdentityProviderList{},
|
||||||
|
&ActiveDirectoryIdentityProvider{},
|
||||||
|
&ActiveDirectoryIdentityProviderList{},
|
||||||
)
|
)
|
||||||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||||
return nil
|
return nil
|
||||||
|
182
generated/1.17/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
182
generated/1.17/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderPhase string
|
||||||
|
|
||||||
|
const (
|
||||||
|
// ActiveDirectoryPhasePending is the default phase for newly-created ActiveDirectoryIdentityProvider resources.
|
||||||
|
ActiveDirectoryPhasePending ActiveDirectoryIdentityProviderPhase = "Pending"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseReady is the phase for an ActiveDirectoryIdentityProvider resource in a healthy state.
|
||||||
|
ActiveDirectoryPhaseReady ActiveDirectoryIdentityProviderPhase = "Ready"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseError is the phase for an ActiveDirectoryIdentityProvider in an unhealthy state.
|
||||||
|
ActiveDirectoryPhaseError ActiveDirectoryIdentityProviderPhase = "Error"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Status of an Active Directory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderStatus struct {
|
||||||
|
// Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
// +kubebuilder:default=Pending
|
||||||
|
// +kubebuilder:validation:Enum=Pending;Ready;Error
|
||||||
|
Phase ActiveDirectoryIdentityProviderPhase `json:"phase,omitempty"`
|
||||||
|
|
||||||
|
// Represents the observations of an identity provider's current state.
|
||||||
|
// +patchMergeKey=type
|
||||||
|
// +patchStrategy=merge
|
||||||
|
// +listType=map
|
||||||
|
// +listMapKey=type
|
||||||
|
Conditions []Condition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderBind struct {
|
||||||
|
// SecretName contains the name of a namespace-local Secret object that provides the username and
|
||||||
|
// password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be
|
||||||
|
// of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value
|
||||||
|
// should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
// The password must be non-empty.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
SecretName string `json:"secretName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearchAttributes struct {
|
||||||
|
// Username specifies the name of the attribute in Active Directory entry whose value shall become the username
|
||||||
|
// of the user after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
// +optional
|
||||||
|
Username string `json:"username,omitempty"`
|
||||||
|
|
||||||
|
// UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely
|
||||||
|
// identify the user within this ActiveDirectory provider after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "objectGUID".
|
||||||
|
// +optional
|
||||||
|
UID string `json:"uid,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearchAttributes struct {
|
||||||
|
// GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name
|
||||||
|
// in the user's list of groups after a successful authentication.
|
||||||
|
// The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory
|
||||||
|
// server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn".
|
||||||
|
// Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
// where domain is constructed from the domain components of the group DN.
|
||||||
|
// +optional
|
||||||
|
GroupName string `json:"groupName,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for users.
|
||||||
|
// E.g. "ou=users,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for users.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some users
|
||||||
|
// or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur
|
||||||
|
// in the filter at least once and will be dynamically replaced by the username for which the search is being run.
|
||||||
|
// E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will be
|
||||||
|
// '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
// This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account,
|
||||||
|
// and is not shown in advanced view only
|
||||||
|
// (which would likely mean its a system created service account with advanced permissions).
|
||||||
|
// Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as
|
||||||
|
// the result of the user search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderUserSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g.
|
||||||
|
// "ou=groups,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for groups.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some groups
|
||||||
|
// for security reasons or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user.
|
||||||
|
// The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the
|
||||||
|
// dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or
|
||||||
|
// "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will act as if the filter were specified as
|
||||||
|
// "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
// This searches nested groups by default.
|
||||||
|
// Note that nested group search can be slow for some Active Directory servers. To disable it,
|
||||||
|
// you can set the filter to
|
||||||
|
// "(&(objectClass=group)(member={})"
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as
|
||||||
|
// the result of the group search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderSpec struct {
|
||||||
|
// Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
Host string `json:"host"`
|
||||||
|
|
||||||
|
// TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
TLS *TLSSpec `json:"tls,omitempty"`
|
||||||
|
|
||||||
|
// Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server
|
||||||
|
// to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
Bind ActiveDirectoryIdentityProviderBind `json:"bind,omitempty"`
|
||||||
|
|
||||||
|
// UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
UserSearch ActiveDirectoryIdentityProviderUserSearch `json:"userSearch,omitempty"`
|
||||||
|
|
||||||
|
// GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
GroupSearch ActiveDirectoryIdentityProviderGroupSearch `json:"groupSearch,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
// +genclient
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
// +kubebuilder:resource:categories=pinniped;pinniped-idp;pinniped-idps
|
||||||
|
// +kubebuilder:printcolumn:name="Host",type=string,JSONPath=`.spec.host`
|
||||||
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.phase`
|
||||||
|
// +kubebuilder:printcolumn:name="Age",type=date,JSONPath=`.metadata.creationTimestamp`
|
||||||
|
// +kubebuilder:subresource:status
|
||||||
|
type ActiveDirectoryIdentityProvider struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
// Spec for configuring the identity provider.
|
||||||
|
Spec ActiveDirectoryIdentityProviderSpec `json:"spec"`
|
||||||
|
|
||||||
|
// Status of the identity provider.
|
||||||
|
Status ActiveDirectoryIdentityProviderStatus `json:"status,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// List of ActiveDirectoryIdentityProvider objects.
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
type ActiveDirectoryIdentityProviderList struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ListMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
Items []ActiveDirectoryIdentityProvider `json:"items"`
|
||||||
|
}
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
@ -11,6 +11,196 @@ import (
|
|||||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyInto(out *ActiveDirectoryIdentityProvider) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ObjectMeta.DeepCopyInto(&out.ObjectMeta)
|
||||||
|
in.Spec.DeepCopyInto(&out.Spec)
|
||||||
|
in.Status.DeepCopyInto(&out.Status)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProvider.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopy() *ActiveDirectoryIdentityProvider {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProvider)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopyInto(out *ActiveDirectoryIdentityProviderBind) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderBind.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopy() *ActiveDirectoryIdentityProviderBind {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderBind)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyInto(out *ActiveDirectoryIdentityProviderList) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]ActiveDirectoryIdentityProvider, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderList.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopy() *ActiveDirectoryIdentityProviderList {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderList)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopyInto(out *ActiveDirectoryIdentityProviderSpec) {
|
||||||
|
*out = *in
|
||||||
|
if in.TLS != nil {
|
||||||
|
in, out := &in.TLS, &out.TLS
|
||||||
|
*out = new(TLSSpec)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
out.Bind = in.Bind
|
||||||
|
out.UserSearch = in.UserSearch
|
||||||
|
out.GroupSearch = in.GroupSearch
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderSpec.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopy() *ActiveDirectoryIdentityProviderSpec {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderSpec)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopyInto(out *ActiveDirectoryIdentityProviderStatus) {
|
||||||
|
*out = *in
|
||||||
|
if in.Conditions != nil {
|
||||||
|
in, out := &in.Conditions, &out.Conditions
|
||||||
|
*out = make([]Condition, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderStatus.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopy() *ActiveDirectoryIdentityProviderStatus {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderStatus)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopy() *ActiveDirectoryIdentityProviderUserSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderUserSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *Condition) DeepCopyInto(out *Condition) {
|
func (in *Condition) DeepCopyInto(out *Condition) {
|
||||||
*out = *in
|
*out = *in
|
||||||
|
@ -14,6 +14,7 @@ type IDPFlow string
|
|||||||
const (
|
const (
|
||||||
IDPTypeOIDC IDPType = "oidc"
|
IDPTypeOIDC IDPType = "oidc"
|
||||||
IDPTypeLDAP IDPType = "ldap"
|
IDPTypeLDAP IDPType = "ldap"
|
||||||
|
IDPTypeActiveDirectory IDPType = "activedirectory"
|
||||||
|
|
||||||
IDPFlowCLIPassword IDPFlow = "cli_password"
|
IDPFlowCLIPassword IDPFlow = "cli_password"
|
||||||
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
||||||
|
@ -0,0 +1,178 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.17/apis/supervisor/idp/v1alpha1"
|
||||||
|
scheme "go.pinniped.dev/generated/1.17/client/supervisor/clientset/versioned/scheme"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvidersGetter has a method to return a ActiveDirectoryIdentityProviderInterface.
|
||||||
|
// A group's client should implement this interface.
|
||||||
|
type ActiveDirectoryIdentityProvidersGetter interface {
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInterface has methods to work with ActiveDirectoryIdentityProvider resources.
|
||||||
|
type ActiveDirectoryIdentityProviderInterface interface {
|
||||||
|
Create(*v1alpha1.ActiveDirectoryIdentityProvider) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Update(*v1alpha1.ActiveDirectoryIdentityProvider) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
UpdateStatus(*v1alpha1.ActiveDirectoryIdentityProvider) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Delete(name string, options *v1.DeleteOptions) error
|
||||||
|
DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error
|
||||||
|
Get(name string, options v1.GetOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
List(opts v1.ListOptions) (*v1alpha1.ActiveDirectoryIdentityProviderList, error)
|
||||||
|
Watch(opts v1.ListOptions) (watch.Interface, error)
|
||||||
|
Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
ActiveDirectoryIdentityProviderExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type activeDirectoryIdentityProviders struct {
|
||||||
|
client rest.Interface
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
// newActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviders
|
||||||
|
func newActiveDirectoryIdentityProviders(c *IDPV1alpha1Client, namespace string) *activeDirectoryIdentityProviders {
|
||||||
|
return &activeDirectoryIdentityProviders{
|
||||||
|
client: c.RESTClient(),
|
||||||
|
ns: namespace,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Get(name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
VersionedParams(&options, scheme.ParameterCodec).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *activeDirectoryIdentityProviders) List(opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProviderList{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Watch(opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
opts.Watch = true
|
||||||
|
return c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Watch()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Create(activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Post().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Update(activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
|
||||||
|
func (c *activeDirectoryIdentityProviders) UpdateStatus(activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
SubResource("status").
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Delete(name string, options *v1.DeleteOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
Body(options).
|
||||||
|
Do().
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *activeDirectoryIdentityProviders) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {
|
||||||
|
var timeout time.Duration
|
||||||
|
if listOptions.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&listOptions, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Body(options).
|
||||||
|
Do().
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Patch(pt).
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
SubResource(subresources...).
|
||||||
|
Name(name).
|
||||||
|
Body(data).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
@ -0,0 +1,127 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.17/apis/supervisor/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
labels "k8s.io/apimachinery/pkg/labels"
|
||||||
|
schema "k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FakeActiveDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type FakeActiveDirectoryIdentityProviders struct {
|
||||||
|
Fake *FakeIDPV1alpha1
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersResource = schema.GroupVersionResource{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Resource: "activedirectoryidentityproviders"}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersKind = schema.GroupVersionKind{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Kind: "ActiveDirectoryIdentityProvider"}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Get(name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewGetAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) List(opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewListAction(activedirectoryidentityprovidersResource, activedirectoryidentityprovidersKind, c.ns, opts), &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
label, _, _ := testing.ExtractFromListOptions(opts)
|
||||||
|
if label == nil {
|
||||||
|
label = labels.Everything()
|
||||||
|
}
|
||||||
|
list := &v1alpha1.ActiveDirectoryIdentityProviderList{ListMeta: obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).ListMeta}
|
||||||
|
for _, item := range obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).Items {
|
||||||
|
if label.Matches(labels.Set(item.Labels)) {
|
||||||
|
list.Items = append(list.Items, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Watch(opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return c.Fake.
|
||||||
|
InvokesWatch(testing.NewWatchAction(activedirectoryidentityprovidersResource, c.ns, opts))
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Create(activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewCreateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Update(activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) UpdateStatus(activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateSubresourceAction(activedirectoryidentityprovidersResource, "status", c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Delete(name string, options *v1.DeleteOptions) error {
|
||||||
|
_, err := c.Fake.
|
||||||
|
Invokes(testing.NewDeleteAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {
|
||||||
|
action := testing.NewDeleteCollectionAction(activedirectoryidentityprovidersResource, c.ns, listOptions)
|
||||||
|
|
||||||
|
_, err := c.Fake.Invokes(action, &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewPatchSubresourceAction(activedirectoryidentityprovidersResource, c.ns, name, pt, data, subresources...), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
@ -15,6 +15,10 @@ type FakeIDPV1alpha1 struct {
|
|||||||
*testing.Fake
|
*testing.Fake
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *FakeIDPV1alpha1) ActiveDirectoryIdentityProviders(namespace string) v1alpha1.ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return &FakeActiveDirectoryIdentityProviders{c, namespace}
|
||||||
|
}
|
||||||
|
|
||||||
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
||||||
return &FakeLDAPIdentityProviders{c, namespace}
|
return &FakeLDAPIdentityProviders{c, namespace}
|
||||||
}
|
}
|
||||||
|
@ -5,6 +5,8 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type LDAPIdentityProviderExpansion interface{}
|
type LDAPIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type OIDCIdentityProviderExpansion interface{}
|
type OIDCIdentityProviderExpansion interface{}
|
||||||
|
@ -13,6 +13,7 @@ import (
|
|||||||
|
|
||||||
type IDPV1alpha1Interface interface {
|
type IDPV1alpha1Interface interface {
|
||||||
RESTClient() rest.Interface
|
RESTClient() rest.Interface
|
||||||
|
ActiveDirectoryIdentityProvidersGetter
|
||||||
LDAPIdentityProvidersGetter
|
LDAPIdentityProvidersGetter
|
||||||
OIDCIdentityProvidersGetter
|
OIDCIdentityProvidersGetter
|
||||||
}
|
}
|
||||||
@ -22,6 +23,10 @@ type IDPV1alpha1Client struct {
|
|||||||
restClient rest.Interface
|
restClient rest.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *IDPV1alpha1Client) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return newActiveDirectoryIdentityProviders(c, namespace)
|
||||||
|
}
|
||||||
|
|
||||||
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
||||||
return newLDAPIdentityProviders(c, namespace)
|
return newLDAPIdentityProviders(c, namespace)
|
||||||
}
|
}
|
||||||
|
@ -45,6 +45,8 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
||||||
|
|
||||||
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
||||||
|
case idpv1alpha1.SchemeGroupVersion.WithResource("activedirectoryidentityproviders"):
|
||||||
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().ActiveDirectoryIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
||||||
|
@ -0,0 +1,76 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by informer-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
time "time"
|
||||||
|
|
||||||
|
idpv1alpha1 "go.pinniped.dev/generated/1.17/apis/supervisor/idp/v1alpha1"
|
||||||
|
versioned "go.pinniped.dev/generated/1.17/client/supervisor/clientset/versioned"
|
||||||
|
internalinterfaces "go.pinniped.dev/generated/1.17/client/supervisor/informers/externalversions/internalinterfaces"
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.17/client/supervisor/listers/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
cache "k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInformer provides access to a shared informer and lister for
|
||||||
|
// ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderInformer interface {
|
||||||
|
Informer() cache.SharedIndexInformer
|
||||||
|
Lister() v1alpha1.ActiveDirectoryIdentityProviderLister
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryIdentityProviderInformer struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
tweakListOptions internalinterfaces.TweakListOptionsFunc
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, namespace, resyncPeriod, indexers, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewFilteredActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewFilteredActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer {
|
||||||
|
return cache.NewSharedIndexInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).List(options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).Watch(options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&idpv1alpha1.ActiveDirectoryIdentityProvider{},
|
||||||
|
resyncPeriod,
|
||||||
|
indexers,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Informer() cache.SharedIndexInformer {
|
||||||
|
return f.factory.InformerFor(&idpv1alpha1.ActiveDirectoryIdentityProvider{}, f.defaultInformer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Lister() v1alpha1.ActiveDirectoryIdentityProviderLister {
|
||||||
|
return v1alpha1.NewActiveDirectoryIdentityProviderLister(f.Informer().GetIndexer())
|
||||||
|
}
|
@ -11,6 +11,8 @@ import (
|
|||||||
|
|
||||||
// Interface provides access to all the informers in this group version.
|
// Interface provides access to all the informers in this group version.
|
||||||
type Interface interface {
|
type Interface interface {
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
||||||
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
||||||
@ -28,6 +30,11 @@ func New(f internalinterfaces.SharedInformerFactory, namespace string, tweakList
|
|||||||
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
func (v *version) ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer {
|
||||||
|
return &activeDirectoryIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
}
|
||||||
|
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
||||||
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
81
generated/1.17/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
81
generated/1.17/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by lister-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.17/apis/supervisor/idp/v1alpha1"
|
||||||
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
|
"k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderLister helps list ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
ActiveDirectoryIdentityProviderListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderLister implements the ActiveDirectoryIdentityProviderLister interface.
|
||||||
|
type activeDirectoryIdentityProviderLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderLister returns a new ActiveDirectoryIdentityProviderLister.
|
||||||
|
func NewActiveDirectoryIdentityProviderLister(indexer cache.Indexer) ActiveDirectoryIdentityProviderLister {
|
||||||
|
return &activeDirectoryIdentityProviderLister{indexer: indexer}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister {
|
||||||
|
return activeDirectoryIdentityProviderNamespaceLister{indexer: s.indexer, namespace: namespace}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister helps list and get ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
ActiveDirectoryIdentityProviderNamespaceListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderNamespaceLister implements the ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
// interface.
|
||||||
|
type activeDirectoryIdentityProviderNamespaceLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, exists, err := s.indexer.GetByKey(s.namespace + "/" + name)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
return nil, errors.NewNotFound(v1alpha1.Resource("activedirectoryidentityprovider"), name)
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), nil
|
||||||
|
}
|
@ -5,6 +5,14 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderLister.
|
||||||
|
type ActiveDirectoryIdentityProviderListerExpansion interface{}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceListerExpansion interface{}
|
||||||
|
|
||||||
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
// LDAPIdentityProviderLister.
|
// LDAPIdentityProviderLister.
|
||||||
type LDAPIdentityProviderListerExpansion interface{}
|
type LDAPIdentityProviderListerExpansion interface{}
|
||||||
|
281
generated/1.17/crds/idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml
generated
Normal file
281
generated/1.17/crds/idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml
generated
Normal file
@ -0,0 +1,281 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.4.0
|
||||||
|
creationTimestamp: null
|
||||||
|
name: activedirectoryidentityproviders.idp.supervisor.pinniped.dev
|
||||||
|
spec:
|
||||||
|
group: idp.supervisor.pinniped.dev
|
||||||
|
names:
|
||||||
|
categories:
|
||||||
|
- pinniped
|
||||||
|
- pinniped-idp
|
||||||
|
- pinniped-idps
|
||||||
|
kind: ActiveDirectoryIdentityProvider
|
||||||
|
listKind: ActiveDirectoryIdentityProviderList
|
||||||
|
plural: activedirectoryidentityproviders
|
||||||
|
singular: activedirectoryidentityprovider
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- jsonPath: .spec.host
|
||||||
|
name: Host
|
||||||
|
type: string
|
||||||
|
- jsonPath: .status.phase
|
||||||
|
name: Status
|
||||||
|
type: string
|
||||||
|
- jsonPath: .metadata.creationTimestamp
|
||||||
|
name: Age
|
||||||
|
type: date
|
||||||
|
name: v1alpha1
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: ActiveDirectoryIdentityProvider describes the configuration of
|
||||||
|
an upstream Microsoft Active Directory identity provider.
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: Spec for configuring the identity provider.
|
||||||
|
properties:
|
||||||
|
bind:
|
||||||
|
description: Bind contains the configuration for how to provide access
|
||||||
|
credentials during an initial bind to the ActiveDirectory server
|
||||||
|
to be allowed to perform searches and binds to validate a user's
|
||||||
|
credentials during a user's authentication attempt.
|
||||||
|
properties:
|
||||||
|
secretName:
|
||||||
|
description: SecretName contains the name of a namespace-local
|
||||||
|
Secret object that provides the username and password for an
|
||||||
|
Active Directory bind user. This account will be used to perform
|
||||||
|
LDAP searches. The Secret should be of type "kubernetes.io/basic-auth"
|
||||||
|
which includes "username" and "password" keys. The username
|
||||||
|
value should be the full dn (distinguished name) of your bind
|
||||||
|
account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
The password must be non-empty.
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- secretName
|
||||||
|
type: object
|
||||||
|
groupSearch:
|
||||||
|
description: GroupSearch contains the configuration for searching
|
||||||
|
for a user's group membership in ActiveDirectory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the group's information
|
||||||
|
should be read from each ActiveDirectory entry which was found
|
||||||
|
as the result of the group search.
|
||||||
|
properties:
|
||||||
|
groupName:
|
||||||
|
description: GroupName specifies the name of the attribute
|
||||||
|
in the Active Directory entries whose value shall become
|
||||||
|
a group name in the user's list of groups after a successful
|
||||||
|
authentication. The value of this field is case-sensitive
|
||||||
|
and must match the case of the attribute name returned by
|
||||||
|
the ActiveDirectory server in the user's entry. E.g. "cn"
|
||||||
|
for common name. Distinguished names can be used by specifying
|
||||||
|
lower-case "dn". Optional. When not specified, this defaults
|
||||||
|
to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
where domain is constructed from the domain components of
|
||||||
|
the group DN.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for groups.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some groups for security reasons or to make
|
||||||
|
searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the ActiveDirectory search filter which
|
||||||
|
should be applied when searching for groups for a user. The
|
||||||
|
pattern "{}" must occur in the filter at least once and will
|
||||||
|
be dynamically replaced by the dn (distinguished name) of the
|
||||||
|
user entry found as a result of the user search. E.g. "member={}"
|
||||||
|
or "&(objectClass=groupOfNames)(member={})". For more information
|
||||||
|
about ActiveDirectory filters, see https://ldap.com/ldap-filters.
|
||||||
|
Note that the dn (distinguished name) is not an attribute of
|
||||||
|
an entry, so "dn={}" cannot be used. Optional. When not specified,
|
||||||
|
the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
This searches nested groups by default. Note that nested group
|
||||||
|
search can be slow for some Active Directory servers. To disable
|
||||||
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
host:
|
||||||
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
provider, i.e., where to connect. For example: ldap.example.com:636.'
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
tls:
|
||||||
|
description: TLS contains the connection settings for how to establish
|
||||||
|
the connection to the Host.
|
||||||
|
properties:
|
||||||
|
certificateAuthorityData:
|
||||||
|
description: X.509 Certificate Authority (base64-encoded PEM bundle).
|
||||||
|
If omitted, a default set of system roots will be trusted.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
userSearch:
|
||||||
|
description: UserSearch contains the configuration for searching for
|
||||||
|
a user by name in Active Directory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the user's information should
|
||||||
|
be read from the ActiveDirectory entry which was found as the
|
||||||
|
result of the user search.
|
||||||
|
properties:
|
||||||
|
uid:
|
||||||
|
description: UID specifies the name of the attribute in the
|
||||||
|
ActiveDirectory entry which whose value shall be used to
|
||||||
|
uniquely identify the user within this ActiveDirectory provider
|
||||||
|
after a successful authentication. Optional, when empty
|
||||||
|
this defaults to "objectGUID".
|
||||||
|
type: string
|
||||||
|
username:
|
||||||
|
description: Username specifies the name of the attribute
|
||||||
|
in Active Directory entry whose value shall become the username
|
||||||
|
of the user after a successful authentication. Optional,
|
||||||
|
when empty this defaults to "userPrincipalName".
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for users.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some users or to make searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the search filter which should be applied
|
||||||
|
when searching for users. The pattern "{}" must occur in the
|
||||||
|
filter at least once and will be dynamically replaced by the
|
||||||
|
username for which the search is being run. E.g. "mail={}" or
|
||||||
|
"&(objectClass=person)(uid={})". For more information about
|
||||||
|
LDAP filters, see https://ldap.com/ldap-filters. Note that the
|
||||||
|
dn (distinguished name) is not an attribute of an entry, so
|
||||||
|
"dn={}" cannot be used. Optional. When not specified, the default
|
||||||
|
will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
This means that the user is a person, is not a computer, the
|
||||||
|
sAMAccountType is for a normal user account, and is not shown
|
||||||
|
in advanced view only (which would likely mean its a system
|
||||||
|
created service account with advanced permissions). Also, either
|
||||||
|
the sAMAccountName, the userPrincipalName, or the mail attribute
|
||||||
|
matches the input username.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- host
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
description: Status of the identity provider.
|
||||||
|
properties:
|
||||||
|
conditions:
|
||||||
|
description: Represents the observations of an identity provider's
|
||||||
|
current state.
|
||||||
|
items:
|
||||||
|
description: Condition status of a resource (mirrored from the metav1.Condition
|
||||||
|
type added in Kubernetes 1.19). In a future API version we can
|
||||||
|
switch to using the upstream type. See https://github.com/kubernetes/apimachinery/blob/v0.19.0/pkg/apis/meta/v1/types.go#L1353-L1413.
|
||||||
|
properties:
|
||||||
|
lastTransitionTime:
|
||||||
|
description: lastTransitionTime is the last time the condition
|
||||||
|
transitioned from one status to another. This should be when
|
||||||
|
the underlying condition changed. If that is not known, then
|
||||||
|
using the time when the API field changed is acceptable.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
message:
|
||||||
|
description: message is a human readable message indicating
|
||||||
|
details about the transition. This may be an empty string.
|
||||||
|
maxLength: 32768
|
||||||
|
type: string
|
||||||
|
observedGeneration:
|
||||||
|
description: observedGeneration represents the .metadata.generation
|
||||||
|
that the condition was set based upon. For instance, if .metadata.generation
|
||||||
|
is currently 12, but the .status.conditions[x].observedGeneration
|
||||||
|
is 9, the condition is out of date with respect to the current
|
||||||
|
state of the instance.
|
||||||
|
format: int64
|
||||||
|
minimum: 0
|
||||||
|
type: integer
|
||||||
|
reason:
|
||||||
|
description: reason contains a programmatic identifier indicating
|
||||||
|
the reason for the condition's last transition. Producers
|
||||||
|
of specific condition types may define expected values and
|
||||||
|
meanings for this field, and whether the values are considered
|
||||||
|
a guaranteed API. The value should be a CamelCase string.
|
||||||
|
This field may not be empty.
|
||||||
|
maxLength: 1024
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
description: status of the condition, one of True, False, Unknown.
|
||||||
|
enum:
|
||||||
|
- "True"
|
||||||
|
- "False"
|
||||||
|
- Unknown
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||||
|
--- Many .condition.type values are consistent across resources
|
||||||
|
like Available, but because arbitrary conditions can be useful
|
||||||
|
(see .node.status.conditions), the ability to deconflict is
|
||||||
|
important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||||
|
maxLength: 316
|
||||||
|
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- lastTransitionTime
|
||||||
|
- message
|
||||||
|
- reason
|
||||||
|
- status
|
||||||
|
- type
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
x-kubernetes-list-map-keys:
|
||||||
|
- type
|
||||||
|
x-kubernetes-list-type: map
|
||||||
|
phase:
|
||||||
|
default: Pending
|
||||||
|
description: Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
enum:
|
||||||
|
- Pending
|
||||||
|
- Ready
|
||||||
|
- Error
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- spec
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
153
generated/1.18/README.adoc
generated
153
generated/1.18/README.adoc
generated
@ -748,6 +748,157 @@ Package v1alpha1 is the v1alpha1 version of the Pinniped supervisor identity pro
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider"]
|
||||||
|
==== ActiveDirectoryIdentityProvider
|
||||||
|
|
||||||
|
ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderlist[$$ActiveDirectoryIdentityProviderList$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`metadata`* __link:https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.18/#objectmeta-v1-meta[$$ObjectMeta$$]__ | Refer to Kubernetes API documentation for fields of `metadata`.
|
||||||
|
|
||||||
|
| *`spec`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]__ | Spec for configuring the identity provider.
|
||||||
|
| *`status`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus[$$ActiveDirectoryIdentityProviderStatus$$]__ | Status of the identity provider.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderbind"]
|
||||||
|
==== ActiveDirectoryIdentityProviderBind
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`secretName`* __string__ | SecretName contains the name of a namespace-local Secret object that provides the username and password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com". The password must be non-empty.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch"]
|
||||||
|
==== ActiveDirectoryIdentityProviderGroupSearch
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
||||||
|
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes"]
|
||||||
|
==== ActiveDirectoryIdentityProviderGroupSearchAttributes
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch[$$ActiveDirectoryIdentityProviderGroupSearch$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`groupName`* __string__ | GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name in the user's list of groups after a successful authentication. The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn". Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain", where domain is constructed from the domain components of the group DN.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec"]
|
||||||
|
==== ActiveDirectoryIdentityProviderSpec
|
||||||
|
|
||||||
|
Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider[$$ActiveDirectoryIdentityProvider$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`host`* __string__ | Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
| *`tls`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-tlsspec[$$TLSSpec$$]__ | TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
| *`bind`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderbind[$$ActiveDirectoryIdentityProviderBind$$]__ | Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
| *`userSearch`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch[$$ActiveDirectoryIdentityProviderUserSearch$$]__ | UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
| *`groupSearch`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch[$$ActiveDirectoryIdentityProviderGroupSearch$$]__ | GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus"]
|
||||||
|
==== ActiveDirectoryIdentityProviderStatus
|
||||||
|
|
||||||
|
Status of an Active Directory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider[$$ActiveDirectoryIdentityProvider$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`phase`* __ActiveDirectoryIdentityProviderPhase__ | Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
| *`conditions`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-condition[$$Condition$$] array__ | Represents the observations of an identity provider's current state.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch"]
|
||||||
|
==== ActiveDirectoryIdentityProviderUserSearch
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for users. It may make sense to specify a subtree as a search base if you wish to exclude some users or to make searches faster.
|
||||||
|
| *`filter`* __string__ | Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the username for which the search is being run. E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))' This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account, and is not shown in advanced view only (which would likely mean its a system created service account with advanced permissions). Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearchattributes[$$ActiveDirectoryIdentityProviderUserSearchAttributes$$]__ | Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as the result of the user search.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearchattributes"]
|
||||||
|
==== ActiveDirectoryIdentityProviderUserSearchAttributes
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch[$$ActiveDirectoryIdentityProviderUserSearch$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`username`* __string__ | Username specifies the name of the attribute in Active Directory entry whose value shall become the username of the user after a successful authentication. Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
| *`uid`* __string__ | UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely identify the user within this ActiveDirectory provider after a successful authentication. Optional, when empty this defaults to "objectGUID".
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-condition"]
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-condition"]
|
||||||
==== Condition
|
==== Condition
|
||||||
|
|
||||||
@ -755,6 +906,7 @@ Package v1alpha1 is the v1alpha1 version of the Pinniped supervisor identity pro
|
|||||||
|
|
||||||
.Appears In:
|
.Appears In:
|
||||||
****
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus[$$ActiveDirectoryIdentityProviderStatus$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-ldapidentityproviderstatus[$$LDAPIdentityProviderStatus$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-ldapidentityproviderstatus[$$LDAPIdentityProviderStatus$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-oidcidentityproviderstatus[$$OIDCIdentityProviderStatus$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-oidcidentityproviderstatus[$$OIDCIdentityProviderStatus$$]
|
||||||
****
|
****
|
||||||
@ -1055,6 +1207,7 @@ Status of an OIDC identity provider.
|
|||||||
|
|
||||||
.Appears In:
|
.Appears In:
|
||||||
****
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-ldapidentityproviderspec[$$LDAPIdentityProviderSpec$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-ldapidentityproviderspec[$$LDAPIdentityProviderSpec$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-oidcidentityproviderspec[$$OIDCIdentityProviderSpec$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-oidcidentityproviderspec[$$OIDCIdentityProviderSpec$$]
|
||||||
****
|
****
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
@ -34,6 +34,8 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||||||
&OIDCIdentityProviderList{},
|
&OIDCIdentityProviderList{},
|
||||||
&LDAPIdentityProvider{},
|
&LDAPIdentityProvider{},
|
||||||
&LDAPIdentityProviderList{},
|
&LDAPIdentityProviderList{},
|
||||||
|
&ActiveDirectoryIdentityProvider{},
|
||||||
|
&ActiveDirectoryIdentityProviderList{},
|
||||||
)
|
)
|
||||||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||||
return nil
|
return nil
|
||||||
|
182
generated/1.18/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
182
generated/1.18/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderPhase string
|
||||||
|
|
||||||
|
const (
|
||||||
|
// ActiveDirectoryPhasePending is the default phase for newly-created ActiveDirectoryIdentityProvider resources.
|
||||||
|
ActiveDirectoryPhasePending ActiveDirectoryIdentityProviderPhase = "Pending"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseReady is the phase for an ActiveDirectoryIdentityProvider resource in a healthy state.
|
||||||
|
ActiveDirectoryPhaseReady ActiveDirectoryIdentityProviderPhase = "Ready"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseError is the phase for an ActiveDirectoryIdentityProvider in an unhealthy state.
|
||||||
|
ActiveDirectoryPhaseError ActiveDirectoryIdentityProviderPhase = "Error"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Status of an Active Directory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderStatus struct {
|
||||||
|
// Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
// +kubebuilder:default=Pending
|
||||||
|
// +kubebuilder:validation:Enum=Pending;Ready;Error
|
||||||
|
Phase ActiveDirectoryIdentityProviderPhase `json:"phase,omitempty"`
|
||||||
|
|
||||||
|
// Represents the observations of an identity provider's current state.
|
||||||
|
// +patchMergeKey=type
|
||||||
|
// +patchStrategy=merge
|
||||||
|
// +listType=map
|
||||||
|
// +listMapKey=type
|
||||||
|
Conditions []Condition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderBind struct {
|
||||||
|
// SecretName contains the name of a namespace-local Secret object that provides the username and
|
||||||
|
// password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be
|
||||||
|
// of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value
|
||||||
|
// should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
// The password must be non-empty.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
SecretName string `json:"secretName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearchAttributes struct {
|
||||||
|
// Username specifies the name of the attribute in Active Directory entry whose value shall become the username
|
||||||
|
// of the user after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
// +optional
|
||||||
|
Username string `json:"username,omitempty"`
|
||||||
|
|
||||||
|
// UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely
|
||||||
|
// identify the user within this ActiveDirectory provider after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "objectGUID".
|
||||||
|
// +optional
|
||||||
|
UID string `json:"uid,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearchAttributes struct {
|
||||||
|
// GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name
|
||||||
|
// in the user's list of groups after a successful authentication.
|
||||||
|
// The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory
|
||||||
|
// server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn".
|
||||||
|
// Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
// where domain is constructed from the domain components of the group DN.
|
||||||
|
// +optional
|
||||||
|
GroupName string `json:"groupName,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for users.
|
||||||
|
// E.g. "ou=users,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for users.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some users
|
||||||
|
// or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur
|
||||||
|
// in the filter at least once and will be dynamically replaced by the username for which the search is being run.
|
||||||
|
// E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will be
|
||||||
|
// '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
// This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account,
|
||||||
|
// and is not shown in advanced view only
|
||||||
|
// (which would likely mean its a system created service account with advanced permissions).
|
||||||
|
// Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as
|
||||||
|
// the result of the user search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderUserSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g.
|
||||||
|
// "ou=groups,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for groups.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some groups
|
||||||
|
// for security reasons or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user.
|
||||||
|
// The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the
|
||||||
|
// dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or
|
||||||
|
// "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will act as if the filter were specified as
|
||||||
|
// "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
// This searches nested groups by default.
|
||||||
|
// Note that nested group search can be slow for some Active Directory servers. To disable it,
|
||||||
|
// you can set the filter to
|
||||||
|
// "(&(objectClass=group)(member={})"
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as
|
||||||
|
// the result of the group search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderSpec struct {
|
||||||
|
// Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
Host string `json:"host"`
|
||||||
|
|
||||||
|
// TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
TLS *TLSSpec `json:"tls,omitempty"`
|
||||||
|
|
||||||
|
// Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server
|
||||||
|
// to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
Bind ActiveDirectoryIdentityProviderBind `json:"bind,omitempty"`
|
||||||
|
|
||||||
|
// UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
UserSearch ActiveDirectoryIdentityProviderUserSearch `json:"userSearch,omitempty"`
|
||||||
|
|
||||||
|
// GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
GroupSearch ActiveDirectoryIdentityProviderGroupSearch `json:"groupSearch,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
// +genclient
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
// +kubebuilder:resource:categories=pinniped;pinniped-idp;pinniped-idps
|
||||||
|
// +kubebuilder:printcolumn:name="Host",type=string,JSONPath=`.spec.host`
|
||||||
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.phase`
|
||||||
|
// +kubebuilder:printcolumn:name="Age",type=date,JSONPath=`.metadata.creationTimestamp`
|
||||||
|
// +kubebuilder:subresource:status
|
||||||
|
type ActiveDirectoryIdentityProvider struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
// Spec for configuring the identity provider.
|
||||||
|
Spec ActiveDirectoryIdentityProviderSpec `json:"spec"`
|
||||||
|
|
||||||
|
// Status of the identity provider.
|
||||||
|
Status ActiveDirectoryIdentityProviderStatus `json:"status,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// List of ActiveDirectoryIdentityProvider objects.
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
type ActiveDirectoryIdentityProviderList struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ListMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
Items []ActiveDirectoryIdentityProvider `json:"items"`
|
||||||
|
}
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
@ -11,6 +11,196 @@ import (
|
|||||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyInto(out *ActiveDirectoryIdentityProvider) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ObjectMeta.DeepCopyInto(&out.ObjectMeta)
|
||||||
|
in.Spec.DeepCopyInto(&out.Spec)
|
||||||
|
in.Status.DeepCopyInto(&out.Status)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProvider.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopy() *ActiveDirectoryIdentityProvider {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProvider)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopyInto(out *ActiveDirectoryIdentityProviderBind) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderBind.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopy() *ActiveDirectoryIdentityProviderBind {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderBind)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyInto(out *ActiveDirectoryIdentityProviderList) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]ActiveDirectoryIdentityProvider, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderList.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopy() *ActiveDirectoryIdentityProviderList {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderList)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopyInto(out *ActiveDirectoryIdentityProviderSpec) {
|
||||||
|
*out = *in
|
||||||
|
if in.TLS != nil {
|
||||||
|
in, out := &in.TLS, &out.TLS
|
||||||
|
*out = new(TLSSpec)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
out.Bind = in.Bind
|
||||||
|
out.UserSearch = in.UserSearch
|
||||||
|
out.GroupSearch = in.GroupSearch
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderSpec.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopy() *ActiveDirectoryIdentityProviderSpec {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderSpec)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopyInto(out *ActiveDirectoryIdentityProviderStatus) {
|
||||||
|
*out = *in
|
||||||
|
if in.Conditions != nil {
|
||||||
|
in, out := &in.Conditions, &out.Conditions
|
||||||
|
*out = make([]Condition, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderStatus.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopy() *ActiveDirectoryIdentityProviderStatus {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderStatus)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopy() *ActiveDirectoryIdentityProviderUserSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderUserSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *Condition) DeepCopyInto(out *Condition) {
|
func (in *Condition) DeepCopyInto(out *Condition) {
|
||||||
*out = *in
|
*out = *in
|
||||||
|
@ -14,6 +14,7 @@ type IDPFlow string
|
|||||||
const (
|
const (
|
||||||
IDPTypeOIDC IDPType = "oidc"
|
IDPTypeOIDC IDPType = "oidc"
|
||||||
IDPTypeLDAP IDPType = "ldap"
|
IDPTypeLDAP IDPType = "ldap"
|
||||||
|
IDPTypeActiveDirectory IDPType = "activedirectory"
|
||||||
|
|
||||||
IDPFlowCLIPassword IDPFlow = "cli_password"
|
IDPFlowCLIPassword IDPFlow = "cli_password"
|
||||||
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
||||||
|
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.18/apis/supervisor/idp/v1alpha1"
|
||||||
|
scheme "go.pinniped.dev/generated/1.18/client/supervisor/clientset/versioned/scheme"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvidersGetter has a method to return a ActiveDirectoryIdentityProviderInterface.
|
||||||
|
// A group's client should implement this interface.
|
||||||
|
type ActiveDirectoryIdentityProvidersGetter interface {
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInterface has methods to work with ActiveDirectoryIdentityProvider resources.
|
||||||
|
type ActiveDirectoryIdentityProviderInterface interface {
|
||||||
|
Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Delete(ctx context.Context, name string, opts v1.DeleteOptions) error
|
||||||
|
DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error
|
||||||
|
Get(ctx context.Context, name string, opts v1.GetOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
List(ctx context.Context, opts v1.ListOptions) (*v1alpha1.ActiveDirectoryIdentityProviderList, error)
|
||||||
|
Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error)
|
||||||
|
Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
ActiveDirectoryIdentityProviderExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type activeDirectoryIdentityProviders struct {
|
||||||
|
client rest.Interface
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
// newActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviders
|
||||||
|
func newActiveDirectoryIdentityProviders(c *IDPV1alpha1Client, namespace string) *activeDirectoryIdentityProviders {
|
||||||
|
return &activeDirectoryIdentityProviders{
|
||||||
|
client: c.RESTClient(),
|
||||||
|
ns: namespace,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
VersionedParams(&options, scheme.ParameterCodec).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *activeDirectoryIdentityProviders) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProviderList{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
opts.Watch = true
|
||||||
|
return c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Watch(ctx)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Post().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *activeDirectoryIdentityProviders) UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
SubResource("status").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *activeDirectoryIdentityProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
var timeout time.Duration
|
||||||
|
if listOpts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&listOpts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Patch(pt).
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
SubResource(subresources...).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(data).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
@ -0,0 +1,129 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.18/apis/supervisor/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
labels "k8s.io/apimachinery/pkg/labels"
|
||||||
|
schema "k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FakeActiveDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type FakeActiveDirectoryIdentityProviders struct {
|
||||||
|
Fake *FakeIDPV1alpha1
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersResource = schema.GroupVersionResource{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Resource: "activedirectoryidentityproviders"}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersKind = schema.GroupVersionKind{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Kind: "ActiveDirectoryIdentityProvider"}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewGetAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewListAction(activedirectoryidentityprovidersResource, activedirectoryidentityprovidersKind, c.ns, opts), &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
label, _, _ := testing.ExtractFromListOptions(opts)
|
||||||
|
if label == nil {
|
||||||
|
label = labels.Everything()
|
||||||
|
}
|
||||||
|
list := &v1alpha1.ActiveDirectoryIdentityProviderList{ListMeta: obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).ListMeta}
|
||||||
|
for _, item := range obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).Items {
|
||||||
|
if label.Matches(labels.Set(item.Labels)) {
|
||||||
|
list.Items = append(list.Items, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return c.Fake.
|
||||||
|
InvokesWatch(testing.NewWatchAction(activedirectoryidentityprovidersResource, c.ns, opts))
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewCreateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateSubresourceAction(activedirectoryidentityprovidersResource, "status", c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
_, err := c.Fake.
|
||||||
|
Invokes(testing.NewDeleteAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
action := testing.NewDeleteCollectionAction(activedirectoryidentityprovidersResource, c.ns, listOpts)
|
||||||
|
|
||||||
|
_, err := c.Fake.Invokes(action, &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewPatchSubresourceAction(activedirectoryidentityprovidersResource, c.ns, name, pt, data, subresources...), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
@ -15,6 +15,10 @@ type FakeIDPV1alpha1 struct {
|
|||||||
*testing.Fake
|
*testing.Fake
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *FakeIDPV1alpha1) ActiveDirectoryIdentityProviders(namespace string) v1alpha1.ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return &FakeActiveDirectoryIdentityProviders{c, namespace}
|
||||||
|
}
|
||||||
|
|
||||||
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
||||||
return &FakeLDAPIdentityProviders{c, namespace}
|
return &FakeLDAPIdentityProviders{c, namespace}
|
||||||
}
|
}
|
||||||
|
@ -5,6 +5,8 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type LDAPIdentityProviderExpansion interface{}
|
type LDAPIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type OIDCIdentityProviderExpansion interface{}
|
type OIDCIdentityProviderExpansion interface{}
|
||||||
|
@ -13,6 +13,7 @@ import (
|
|||||||
|
|
||||||
type IDPV1alpha1Interface interface {
|
type IDPV1alpha1Interface interface {
|
||||||
RESTClient() rest.Interface
|
RESTClient() rest.Interface
|
||||||
|
ActiveDirectoryIdentityProvidersGetter
|
||||||
LDAPIdentityProvidersGetter
|
LDAPIdentityProvidersGetter
|
||||||
OIDCIdentityProvidersGetter
|
OIDCIdentityProvidersGetter
|
||||||
}
|
}
|
||||||
@ -22,6 +23,10 @@ type IDPV1alpha1Client struct {
|
|||||||
restClient rest.Interface
|
restClient rest.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *IDPV1alpha1Client) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return newActiveDirectoryIdentityProviders(c, namespace)
|
||||||
|
}
|
||||||
|
|
||||||
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
||||||
return newLDAPIdentityProviders(c, namespace)
|
return newLDAPIdentityProviders(c, namespace)
|
||||||
}
|
}
|
||||||
|
@ -45,6 +45,8 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
||||||
|
|
||||||
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
||||||
|
case idpv1alpha1.SchemeGroupVersion.WithResource("activedirectoryidentityproviders"):
|
||||||
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().ActiveDirectoryIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
||||||
|
@ -0,0 +1,77 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by informer-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
time "time"
|
||||||
|
|
||||||
|
idpv1alpha1 "go.pinniped.dev/generated/1.18/apis/supervisor/idp/v1alpha1"
|
||||||
|
versioned "go.pinniped.dev/generated/1.18/client/supervisor/clientset/versioned"
|
||||||
|
internalinterfaces "go.pinniped.dev/generated/1.18/client/supervisor/informers/externalversions/internalinterfaces"
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.18/client/supervisor/listers/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
cache "k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInformer provides access to a shared informer and lister for
|
||||||
|
// ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderInformer interface {
|
||||||
|
Informer() cache.SharedIndexInformer
|
||||||
|
Lister() v1alpha1.ActiveDirectoryIdentityProviderLister
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryIdentityProviderInformer struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
tweakListOptions internalinterfaces.TweakListOptionsFunc
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, namespace, resyncPeriod, indexers, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewFilteredActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewFilteredActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer {
|
||||||
|
return cache.NewSharedIndexInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).List(context.TODO(), options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).Watch(context.TODO(), options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&idpv1alpha1.ActiveDirectoryIdentityProvider{},
|
||||||
|
resyncPeriod,
|
||||||
|
indexers,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Informer() cache.SharedIndexInformer {
|
||||||
|
return f.factory.InformerFor(&idpv1alpha1.ActiveDirectoryIdentityProvider{}, f.defaultInformer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Lister() v1alpha1.ActiveDirectoryIdentityProviderLister {
|
||||||
|
return v1alpha1.NewActiveDirectoryIdentityProviderLister(f.Informer().GetIndexer())
|
||||||
|
}
|
@ -11,6 +11,8 @@ import (
|
|||||||
|
|
||||||
// Interface provides access to all the informers in this group version.
|
// Interface provides access to all the informers in this group version.
|
||||||
type Interface interface {
|
type Interface interface {
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
||||||
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
||||||
@ -28,6 +30,11 @@ func New(f internalinterfaces.SharedInformerFactory, namespace string, tweakList
|
|||||||
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
func (v *version) ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer {
|
||||||
|
return &activeDirectoryIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
}
|
||||||
|
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
||||||
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
81
generated/1.18/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
81
generated/1.18/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by lister-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.18/apis/supervisor/idp/v1alpha1"
|
||||||
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
|
"k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderLister helps list ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
ActiveDirectoryIdentityProviderListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderLister implements the ActiveDirectoryIdentityProviderLister interface.
|
||||||
|
type activeDirectoryIdentityProviderLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderLister returns a new ActiveDirectoryIdentityProviderLister.
|
||||||
|
func NewActiveDirectoryIdentityProviderLister(indexer cache.Indexer) ActiveDirectoryIdentityProviderLister {
|
||||||
|
return &activeDirectoryIdentityProviderLister{indexer: indexer}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister {
|
||||||
|
return activeDirectoryIdentityProviderNamespaceLister{indexer: s.indexer, namespace: namespace}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister helps list and get ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
ActiveDirectoryIdentityProviderNamespaceListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderNamespaceLister implements the ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
// interface.
|
||||||
|
type activeDirectoryIdentityProviderNamespaceLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, exists, err := s.indexer.GetByKey(s.namespace + "/" + name)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
return nil, errors.NewNotFound(v1alpha1.Resource("activedirectoryidentityprovider"), name)
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), nil
|
||||||
|
}
|
@ -5,6 +5,14 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderLister.
|
||||||
|
type ActiveDirectoryIdentityProviderListerExpansion interface{}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceListerExpansion interface{}
|
||||||
|
|
||||||
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
// LDAPIdentityProviderLister.
|
// LDAPIdentityProviderLister.
|
||||||
type LDAPIdentityProviderListerExpansion interface{}
|
type LDAPIdentityProviderListerExpansion interface{}
|
||||||
|
281
generated/1.18/crds/idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml
generated
Normal file
281
generated/1.18/crds/idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml
generated
Normal file
@ -0,0 +1,281 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.4.0
|
||||||
|
creationTimestamp: null
|
||||||
|
name: activedirectoryidentityproviders.idp.supervisor.pinniped.dev
|
||||||
|
spec:
|
||||||
|
group: idp.supervisor.pinniped.dev
|
||||||
|
names:
|
||||||
|
categories:
|
||||||
|
- pinniped
|
||||||
|
- pinniped-idp
|
||||||
|
- pinniped-idps
|
||||||
|
kind: ActiveDirectoryIdentityProvider
|
||||||
|
listKind: ActiveDirectoryIdentityProviderList
|
||||||
|
plural: activedirectoryidentityproviders
|
||||||
|
singular: activedirectoryidentityprovider
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- jsonPath: .spec.host
|
||||||
|
name: Host
|
||||||
|
type: string
|
||||||
|
- jsonPath: .status.phase
|
||||||
|
name: Status
|
||||||
|
type: string
|
||||||
|
- jsonPath: .metadata.creationTimestamp
|
||||||
|
name: Age
|
||||||
|
type: date
|
||||||
|
name: v1alpha1
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: ActiveDirectoryIdentityProvider describes the configuration of
|
||||||
|
an upstream Microsoft Active Directory identity provider.
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: Spec for configuring the identity provider.
|
||||||
|
properties:
|
||||||
|
bind:
|
||||||
|
description: Bind contains the configuration for how to provide access
|
||||||
|
credentials during an initial bind to the ActiveDirectory server
|
||||||
|
to be allowed to perform searches and binds to validate a user's
|
||||||
|
credentials during a user's authentication attempt.
|
||||||
|
properties:
|
||||||
|
secretName:
|
||||||
|
description: SecretName contains the name of a namespace-local
|
||||||
|
Secret object that provides the username and password for an
|
||||||
|
Active Directory bind user. This account will be used to perform
|
||||||
|
LDAP searches. The Secret should be of type "kubernetes.io/basic-auth"
|
||||||
|
which includes "username" and "password" keys. The username
|
||||||
|
value should be the full dn (distinguished name) of your bind
|
||||||
|
account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
The password must be non-empty.
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- secretName
|
||||||
|
type: object
|
||||||
|
groupSearch:
|
||||||
|
description: GroupSearch contains the configuration for searching
|
||||||
|
for a user's group membership in ActiveDirectory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the group's information
|
||||||
|
should be read from each ActiveDirectory entry which was found
|
||||||
|
as the result of the group search.
|
||||||
|
properties:
|
||||||
|
groupName:
|
||||||
|
description: GroupName specifies the name of the attribute
|
||||||
|
in the Active Directory entries whose value shall become
|
||||||
|
a group name in the user's list of groups after a successful
|
||||||
|
authentication. The value of this field is case-sensitive
|
||||||
|
and must match the case of the attribute name returned by
|
||||||
|
the ActiveDirectory server in the user's entry. E.g. "cn"
|
||||||
|
for common name. Distinguished names can be used by specifying
|
||||||
|
lower-case "dn". Optional. When not specified, this defaults
|
||||||
|
to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
where domain is constructed from the domain components of
|
||||||
|
the group DN.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for groups.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some groups for security reasons or to make
|
||||||
|
searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the ActiveDirectory search filter which
|
||||||
|
should be applied when searching for groups for a user. The
|
||||||
|
pattern "{}" must occur in the filter at least once and will
|
||||||
|
be dynamically replaced by the dn (distinguished name) of the
|
||||||
|
user entry found as a result of the user search. E.g. "member={}"
|
||||||
|
or "&(objectClass=groupOfNames)(member={})". For more information
|
||||||
|
about ActiveDirectory filters, see https://ldap.com/ldap-filters.
|
||||||
|
Note that the dn (distinguished name) is not an attribute of
|
||||||
|
an entry, so "dn={}" cannot be used. Optional. When not specified,
|
||||||
|
the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
This searches nested groups by default. Note that nested group
|
||||||
|
search can be slow for some Active Directory servers. To disable
|
||||||
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
host:
|
||||||
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
provider, i.e., where to connect. For example: ldap.example.com:636.'
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
tls:
|
||||||
|
description: TLS contains the connection settings for how to establish
|
||||||
|
the connection to the Host.
|
||||||
|
properties:
|
||||||
|
certificateAuthorityData:
|
||||||
|
description: X.509 Certificate Authority (base64-encoded PEM bundle).
|
||||||
|
If omitted, a default set of system roots will be trusted.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
userSearch:
|
||||||
|
description: UserSearch contains the configuration for searching for
|
||||||
|
a user by name in Active Directory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the user's information should
|
||||||
|
be read from the ActiveDirectory entry which was found as the
|
||||||
|
result of the user search.
|
||||||
|
properties:
|
||||||
|
uid:
|
||||||
|
description: UID specifies the name of the attribute in the
|
||||||
|
ActiveDirectory entry which whose value shall be used to
|
||||||
|
uniquely identify the user within this ActiveDirectory provider
|
||||||
|
after a successful authentication. Optional, when empty
|
||||||
|
this defaults to "objectGUID".
|
||||||
|
type: string
|
||||||
|
username:
|
||||||
|
description: Username specifies the name of the attribute
|
||||||
|
in Active Directory entry whose value shall become the username
|
||||||
|
of the user after a successful authentication. Optional,
|
||||||
|
when empty this defaults to "userPrincipalName".
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for users.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some users or to make searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the search filter which should be applied
|
||||||
|
when searching for users. The pattern "{}" must occur in the
|
||||||
|
filter at least once and will be dynamically replaced by the
|
||||||
|
username for which the search is being run. E.g. "mail={}" or
|
||||||
|
"&(objectClass=person)(uid={})". For more information about
|
||||||
|
LDAP filters, see https://ldap.com/ldap-filters. Note that the
|
||||||
|
dn (distinguished name) is not an attribute of an entry, so
|
||||||
|
"dn={}" cannot be used. Optional. When not specified, the default
|
||||||
|
will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
This means that the user is a person, is not a computer, the
|
||||||
|
sAMAccountType is for a normal user account, and is not shown
|
||||||
|
in advanced view only (which would likely mean its a system
|
||||||
|
created service account with advanced permissions). Also, either
|
||||||
|
the sAMAccountName, the userPrincipalName, or the mail attribute
|
||||||
|
matches the input username.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- host
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
description: Status of the identity provider.
|
||||||
|
properties:
|
||||||
|
conditions:
|
||||||
|
description: Represents the observations of an identity provider's
|
||||||
|
current state.
|
||||||
|
items:
|
||||||
|
description: Condition status of a resource (mirrored from the metav1.Condition
|
||||||
|
type added in Kubernetes 1.19). In a future API version we can
|
||||||
|
switch to using the upstream type. See https://github.com/kubernetes/apimachinery/blob/v0.19.0/pkg/apis/meta/v1/types.go#L1353-L1413.
|
||||||
|
properties:
|
||||||
|
lastTransitionTime:
|
||||||
|
description: lastTransitionTime is the last time the condition
|
||||||
|
transitioned from one status to another. This should be when
|
||||||
|
the underlying condition changed. If that is not known, then
|
||||||
|
using the time when the API field changed is acceptable.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
message:
|
||||||
|
description: message is a human readable message indicating
|
||||||
|
details about the transition. This may be an empty string.
|
||||||
|
maxLength: 32768
|
||||||
|
type: string
|
||||||
|
observedGeneration:
|
||||||
|
description: observedGeneration represents the .metadata.generation
|
||||||
|
that the condition was set based upon. For instance, if .metadata.generation
|
||||||
|
is currently 12, but the .status.conditions[x].observedGeneration
|
||||||
|
is 9, the condition is out of date with respect to the current
|
||||||
|
state of the instance.
|
||||||
|
format: int64
|
||||||
|
minimum: 0
|
||||||
|
type: integer
|
||||||
|
reason:
|
||||||
|
description: reason contains a programmatic identifier indicating
|
||||||
|
the reason for the condition's last transition. Producers
|
||||||
|
of specific condition types may define expected values and
|
||||||
|
meanings for this field, and whether the values are considered
|
||||||
|
a guaranteed API. The value should be a CamelCase string.
|
||||||
|
This field may not be empty.
|
||||||
|
maxLength: 1024
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
description: status of the condition, one of True, False, Unknown.
|
||||||
|
enum:
|
||||||
|
- "True"
|
||||||
|
- "False"
|
||||||
|
- Unknown
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||||
|
--- Many .condition.type values are consistent across resources
|
||||||
|
like Available, but because arbitrary conditions can be useful
|
||||||
|
(see .node.status.conditions), the ability to deconflict is
|
||||||
|
important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||||
|
maxLength: 316
|
||||||
|
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- lastTransitionTime
|
||||||
|
- message
|
||||||
|
- reason
|
||||||
|
- status
|
||||||
|
- type
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
x-kubernetes-list-map-keys:
|
||||||
|
- type
|
||||||
|
x-kubernetes-list-type: map
|
||||||
|
phase:
|
||||||
|
default: Pending
|
||||||
|
description: Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
enum:
|
||||||
|
- Pending
|
||||||
|
- Ready
|
||||||
|
- Error
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- spec
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
153
generated/1.19/README.adoc
generated
153
generated/1.19/README.adoc
generated
@ -748,6 +748,157 @@ Package v1alpha1 is the v1alpha1 version of the Pinniped supervisor identity pro
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider"]
|
||||||
|
==== ActiveDirectoryIdentityProvider
|
||||||
|
|
||||||
|
ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderlist[$$ActiveDirectoryIdentityProviderList$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`metadata`* __link:https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.19/#objectmeta-v1-meta[$$ObjectMeta$$]__ | Refer to Kubernetes API documentation for fields of `metadata`.
|
||||||
|
|
||||||
|
| *`spec`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]__ | Spec for configuring the identity provider.
|
||||||
|
| *`status`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus[$$ActiveDirectoryIdentityProviderStatus$$]__ | Status of the identity provider.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderbind"]
|
||||||
|
==== ActiveDirectoryIdentityProviderBind
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`secretName`* __string__ | SecretName contains the name of a namespace-local Secret object that provides the username and password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com". The password must be non-empty.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch"]
|
||||||
|
==== ActiveDirectoryIdentityProviderGroupSearch
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
||||||
|
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes"]
|
||||||
|
==== ActiveDirectoryIdentityProviderGroupSearchAttributes
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch[$$ActiveDirectoryIdentityProviderGroupSearch$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`groupName`* __string__ | GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name in the user's list of groups after a successful authentication. The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn". Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain", where domain is constructed from the domain components of the group DN.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec"]
|
||||||
|
==== ActiveDirectoryIdentityProviderSpec
|
||||||
|
|
||||||
|
Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider[$$ActiveDirectoryIdentityProvider$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`host`* __string__ | Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
| *`tls`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-tlsspec[$$TLSSpec$$]__ | TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
| *`bind`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderbind[$$ActiveDirectoryIdentityProviderBind$$]__ | Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
| *`userSearch`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch[$$ActiveDirectoryIdentityProviderUserSearch$$]__ | UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
| *`groupSearch`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch[$$ActiveDirectoryIdentityProviderGroupSearch$$]__ | GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus"]
|
||||||
|
==== ActiveDirectoryIdentityProviderStatus
|
||||||
|
|
||||||
|
Status of an Active Directory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider[$$ActiveDirectoryIdentityProvider$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`phase`* __ActiveDirectoryIdentityProviderPhase__ | Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
| *`conditions`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-condition[$$Condition$$] array__ | Represents the observations of an identity provider's current state.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch"]
|
||||||
|
==== ActiveDirectoryIdentityProviderUserSearch
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for users. It may make sense to specify a subtree as a search base if you wish to exclude some users or to make searches faster.
|
||||||
|
| *`filter`* __string__ | Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the username for which the search is being run. E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))' This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account, and is not shown in advanced view only (which would likely mean its a system created service account with advanced permissions). Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearchattributes[$$ActiveDirectoryIdentityProviderUserSearchAttributes$$]__ | Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as the result of the user search.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearchattributes"]
|
||||||
|
==== ActiveDirectoryIdentityProviderUserSearchAttributes
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch[$$ActiveDirectoryIdentityProviderUserSearch$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`username`* __string__ | Username specifies the name of the attribute in Active Directory entry whose value shall become the username of the user after a successful authentication. Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
| *`uid`* __string__ | UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely identify the user within this ActiveDirectory provider after a successful authentication. Optional, when empty this defaults to "objectGUID".
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-condition"]
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-condition"]
|
||||||
==== Condition
|
==== Condition
|
||||||
|
|
||||||
@ -755,6 +906,7 @@ Package v1alpha1 is the v1alpha1 version of the Pinniped supervisor identity pro
|
|||||||
|
|
||||||
.Appears In:
|
.Appears In:
|
||||||
****
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus[$$ActiveDirectoryIdentityProviderStatus$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-ldapidentityproviderstatus[$$LDAPIdentityProviderStatus$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-ldapidentityproviderstatus[$$LDAPIdentityProviderStatus$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-oidcidentityproviderstatus[$$OIDCIdentityProviderStatus$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-oidcidentityproviderstatus[$$OIDCIdentityProviderStatus$$]
|
||||||
****
|
****
|
||||||
@ -1055,6 +1207,7 @@ Status of an OIDC identity provider.
|
|||||||
|
|
||||||
.Appears In:
|
.Appears In:
|
||||||
****
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-ldapidentityproviderspec[$$LDAPIdentityProviderSpec$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-ldapidentityproviderspec[$$LDAPIdentityProviderSpec$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-oidcidentityproviderspec[$$OIDCIdentityProviderSpec$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-oidcidentityproviderspec[$$OIDCIdentityProviderSpec$$]
|
||||||
****
|
****
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
@ -34,6 +34,8 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||||||
&OIDCIdentityProviderList{},
|
&OIDCIdentityProviderList{},
|
||||||
&LDAPIdentityProvider{},
|
&LDAPIdentityProvider{},
|
||||||
&LDAPIdentityProviderList{},
|
&LDAPIdentityProviderList{},
|
||||||
|
&ActiveDirectoryIdentityProvider{},
|
||||||
|
&ActiveDirectoryIdentityProviderList{},
|
||||||
)
|
)
|
||||||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||||
return nil
|
return nil
|
||||||
|
182
generated/1.19/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
182
generated/1.19/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderPhase string
|
||||||
|
|
||||||
|
const (
|
||||||
|
// ActiveDirectoryPhasePending is the default phase for newly-created ActiveDirectoryIdentityProvider resources.
|
||||||
|
ActiveDirectoryPhasePending ActiveDirectoryIdentityProviderPhase = "Pending"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseReady is the phase for an ActiveDirectoryIdentityProvider resource in a healthy state.
|
||||||
|
ActiveDirectoryPhaseReady ActiveDirectoryIdentityProviderPhase = "Ready"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseError is the phase for an ActiveDirectoryIdentityProvider in an unhealthy state.
|
||||||
|
ActiveDirectoryPhaseError ActiveDirectoryIdentityProviderPhase = "Error"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Status of an Active Directory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderStatus struct {
|
||||||
|
// Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
// +kubebuilder:default=Pending
|
||||||
|
// +kubebuilder:validation:Enum=Pending;Ready;Error
|
||||||
|
Phase ActiveDirectoryIdentityProviderPhase `json:"phase,omitempty"`
|
||||||
|
|
||||||
|
// Represents the observations of an identity provider's current state.
|
||||||
|
// +patchMergeKey=type
|
||||||
|
// +patchStrategy=merge
|
||||||
|
// +listType=map
|
||||||
|
// +listMapKey=type
|
||||||
|
Conditions []Condition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderBind struct {
|
||||||
|
// SecretName contains the name of a namespace-local Secret object that provides the username and
|
||||||
|
// password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be
|
||||||
|
// of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value
|
||||||
|
// should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
// The password must be non-empty.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
SecretName string `json:"secretName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearchAttributes struct {
|
||||||
|
// Username specifies the name of the attribute in Active Directory entry whose value shall become the username
|
||||||
|
// of the user after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
// +optional
|
||||||
|
Username string `json:"username,omitempty"`
|
||||||
|
|
||||||
|
// UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely
|
||||||
|
// identify the user within this ActiveDirectory provider after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "objectGUID".
|
||||||
|
// +optional
|
||||||
|
UID string `json:"uid,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearchAttributes struct {
|
||||||
|
// GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name
|
||||||
|
// in the user's list of groups after a successful authentication.
|
||||||
|
// The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory
|
||||||
|
// server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn".
|
||||||
|
// Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
// where domain is constructed from the domain components of the group DN.
|
||||||
|
// +optional
|
||||||
|
GroupName string `json:"groupName,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for users.
|
||||||
|
// E.g. "ou=users,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for users.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some users
|
||||||
|
// or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur
|
||||||
|
// in the filter at least once and will be dynamically replaced by the username for which the search is being run.
|
||||||
|
// E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will be
|
||||||
|
// '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
// This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account,
|
||||||
|
// and is not shown in advanced view only
|
||||||
|
// (which would likely mean its a system created service account with advanced permissions).
|
||||||
|
// Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as
|
||||||
|
// the result of the user search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderUserSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g.
|
||||||
|
// "ou=groups,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for groups.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some groups
|
||||||
|
// for security reasons or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user.
|
||||||
|
// The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the
|
||||||
|
// dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or
|
||||||
|
// "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will act as if the filter were specified as
|
||||||
|
// "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
// This searches nested groups by default.
|
||||||
|
// Note that nested group search can be slow for some Active Directory servers. To disable it,
|
||||||
|
// you can set the filter to
|
||||||
|
// "(&(objectClass=group)(member={})"
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as
|
||||||
|
// the result of the group search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderSpec struct {
|
||||||
|
// Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
Host string `json:"host"`
|
||||||
|
|
||||||
|
// TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
TLS *TLSSpec `json:"tls,omitempty"`
|
||||||
|
|
||||||
|
// Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server
|
||||||
|
// to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
Bind ActiveDirectoryIdentityProviderBind `json:"bind,omitempty"`
|
||||||
|
|
||||||
|
// UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
UserSearch ActiveDirectoryIdentityProviderUserSearch `json:"userSearch,omitempty"`
|
||||||
|
|
||||||
|
// GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
GroupSearch ActiveDirectoryIdentityProviderGroupSearch `json:"groupSearch,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
// +genclient
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
// +kubebuilder:resource:categories=pinniped;pinniped-idp;pinniped-idps
|
||||||
|
// +kubebuilder:printcolumn:name="Host",type=string,JSONPath=`.spec.host`
|
||||||
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.phase`
|
||||||
|
// +kubebuilder:printcolumn:name="Age",type=date,JSONPath=`.metadata.creationTimestamp`
|
||||||
|
// +kubebuilder:subresource:status
|
||||||
|
type ActiveDirectoryIdentityProvider struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
// Spec for configuring the identity provider.
|
||||||
|
Spec ActiveDirectoryIdentityProviderSpec `json:"spec"`
|
||||||
|
|
||||||
|
// Status of the identity provider.
|
||||||
|
Status ActiveDirectoryIdentityProviderStatus `json:"status,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// List of ActiveDirectoryIdentityProvider objects.
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
type ActiveDirectoryIdentityProviderList struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ListMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
Items []ActiveDirectoryIdentityProvider `json:"items"`
|
||||||
|
}
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
@ -11,6 +11,196 @@ import (
|
|||||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyInto(out *ActiveDirectoryIdentityProvider) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ObjectMeta.DeepCopyInto(&out.ObjectMeta)
|
||||||
|
in.Spec.DeepCopyInto(&out.Spec)
|
||||||
|
in.Status.DeepCopyInto(&out.Status)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProvider.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopy() *ActiveDirectoryIdentityProvider {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProvider)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopyInto(out *ActiveDirectoryIdentityProviderBind) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderBind.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopy() *ActiveDirectoryIdentityProviderBind {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderBind)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyInto(out *ActiveDirectoryIdentityProviderList) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]ActiveDirectoryIdentityProvider, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderList.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopy() *ActiveDirectoryIdentityProviderList {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderList)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopyInto(out *ActiveDirectoryIdentityProviderSpec) {
|
||||||
|
*out = *in
|
||||||
|
if in.TLS != nil {
|
||||||
|
in, out := &in.TLS, &out.TLS
|
||||||
|
*out = new(TLSSpec)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
out.Bind = in.Bind
|
||||||
|
out.UserSearch = in.UserSearch
|
||||||
|
out.GroupSearch = in.GroupSearch
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderSpec.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopy() *ActiveDirectoryIdentityProviderSpec {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderSpec)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopyInto(out *ActiveDirectoryIdentityProviderStatus) {
|
||||||
|
*out = *in
|
||||||
|
if in.Conditions != nil {
|
||||||
|
in, out := &in.Conditions, &out.Conditions
|
||||||
|
*out = make([]Condition, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderStatus.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopy() *ActiveDirectoryIdentityProviderStatus {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderStatus)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopy() *ActiveDirectoryIdentityProviderUserSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderUserSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *Condition) DeepCopyInto(out *Condition) {
|
func (in *Condition) DeepCopyInto(out *Condition) {
|
||||||
*out = *in
|
*out = *in
|
||||||
|
@ -14,6 +14,7 @@ type IDPFlow string
|
|||||||
const (
|
const (
|
||||||
IDPTypeOIDC IDPType = "oidc"
|
IDPTypeOIDC IDPType = "oidc"
|
||||||
IDPTypeLDAP IDPType = "ldap"
|
IDPTypeLDAP IDPType = "ldap"
|
||||||
|
IDPTypeActiveDirectory IDPType = "activedirectory"
|
||||||
|
|
||||||
IDPFlowCLIPassword IDPFlow = "cli_password"
|
IDPFlowCLIPassword IDPFlow = "cli_password"
|
||||||
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
||||||
|
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.19/apis/supervisor/idp/v1alpha1"
|
||||||
|
scheme "go.pinniped.dev/generated/1.19/client/supervisor/clientset/versioned/scheme"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvidersGetter has a method to return a ActiveDirectoryIdentityProviderInterface.
|
||||||
|
// A group's client should implement this interface.
|
||||||
|
type ActiveDirectoryIdentityProvidersGetter interface {
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInterface has methods to work with ActiveDirectoryIdentityProvider resources.
|
||||||
|
type ActiveDirectoryIdentityProviderInterface interface {
|
||||||
|
Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Delete(ctx context.Context, name string, opts v1.DeleteOptions) error
|
||||||
|
DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error
|
||||||
|
Get(ctx context.Context, name string, opts v1.GetOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
List(ctx context.Context, opts v1.ListOptions) (*v1alpha1.ActiveDirectoryIdentityProviderList, error)
|
||||||
|
Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error)
|
||||||
|
Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
ActiveDirectoryIdentityProviderExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type activeDirectoryIdentityProviders struct {
|
||||||
|
client rest.Interface
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
// newActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviders
|
||||||
|
func newActiveDirectoryIdentityProviders(c *IDPV1alpha1Client, namespace string) *activeDirectoryIdentityProviders {
|
||||||
|
return &activeDirectoryIdentityProviders{
|
||||||
|
client: c.RESTClient(),
|
||||||
|
ns: namespace,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
VersionedParams(&options, scheme.ParameterCodec).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *activeDirectoryIdentityProviders) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProviderList{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
opts.Watch = true
|
||||||
|
return c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Watch(ctx)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Post().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *activeDirectoryIdentityProviders) UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
SubResource("status").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *activeDirectoryIdentityProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
var timeout time.Duration
|
||||||
|
if listOpts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&listOpts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Patch(pt).
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
SubResource(subresources...).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(data).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
@ -0,0 +1,129 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.19/apis/supervisor/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
labels "k8s.io/apimachinery/pkg/labels"
|
||||||
|
schema "k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FakeActiveDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type FakeActiveDirectoryIdentityProviders struct {
|
||||||
|
Fake *FakeIDPV1alpha1
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersResource = schema.GroupVersionResource{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Resource: "activedirectoryidentityproviders"}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersKind = schema.GroupVersionKind{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Kind: "ActiveDirectoryIdentityProvider"}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewGetAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewListAction(activedirectoryidentityprovidersResource, activedirectoryidentityprovidersKind, c.ns, opts), &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
label, _, _ := testing.ExtractFromListOptions(opts)
|
||||||
|
if label == nil {
|
||||||
|
label = labels.Everything()
|
||||||
|
}
|
||||||
|
list := &v1alpha1.ActiveDirectoryIdentityProviderList{ListMeta: obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).ListMeta}
|
||||||
|
for _, item := range obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).Items {
|
||||||
|
if label.Matches(labels.Set(item.Labels)) {
|
||||||
|
list.Items = append(list.Items, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return c.Fake.
|
||||||
|
InvokesWatch(testing.NewWatchAction(activedirectoryidentityprovidersResource, c.ns, opts))
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewCreateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateSubresourceAction(activedirectoryidentityprovidersResource, "status", c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
_, err := c.Fake.
|
||||||
|
Invokes(testing.NewDeleteAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
action := testing.NewDeleteCollectionAction(activedirectoryidentityprovidersResource, c.ns, listOpts)
|
||||||
|
|
||||||
|
_, err := c.Fake.Invokes(action, &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewPatchSubresourceAction(activedirectoryidentityprovidersResource, c.ns, name, pt, data, subresources...), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
@ -15,6 +15,10 @@ type FakeIDPV1alpha1 struct {
|
|||||||
*testing.Fake
|
*testing.Fake
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *FakeIDPV1alpha1) ActiveDirectoryIdentityProviders(namespace string) v1alpha1.ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return &FakeActiveDirectoryIdentityProviders{c, namespace}
|
||||||
|
}
|
||||||
|
|
||||||
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
||||||
return &FakeLDAPIdentityProviders{c, namespace}
|
return &FakeLDAPIdentityProviders{c, namespace}
|
||||||
}
|
}
|
||||||
|
@ -5,6 +5,8 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type LDAPIdentityProviderExpansion interface{}
|
type LDAPIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type OIDCIdentityProviderExpansion interface{}
|
type OIDCIdentityProviderExpansion interface{}
|
||||||
|
@ -13,6 +13,7 @@ import (
|
|||||||
|
|
||||||
type IDPV1alpha1Interface interface {
|
type IDPV1alpha1Interface interface {
|
||||||
RESTClient() rest.Interface
|
RESTClient() rest.Interface
|
||||||
|
ActiveDirectoryIdentityProvidersGetter
|
||||||
LDAPIdentityProvidersGetter
|
LDAPIdentityProvidersGetter
|
||||||
OIDCIdentityProvidersGetter
|
OIDCIdentityProvidersGetter
|
||||||
}
|
}
|
||||||
@ -22,6 +23,10 @@ type IDPV1alpha1Client struct {
|
|||||||
restClient rest.Interface
|
restClient rest.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *IDPV1alpha1Client) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return newActiveDirectoryIdentityProviders(c, namespace)
|
||||||
|
}
|
||||||
|
|
||||||
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
||||||
return newLDAPIdentityProviders(c, namespace)
|
return newLDAPIdentityProviders(c, namespace)
|
||||||
}
|
}
|
||||||
|
@ -45,6 +45,8 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
||||||
|
|
||||||
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
||||||
|
case idpv1alpha1.SchemeGroupVersion.WithResource("activedirectoryidentityproviders"):
|
||||||
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().ActiveDirectoryIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
||||||
|
@ -0,0 +1,77 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by informer-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
time "time"
|
||||||
|
|
||||||
|
idpv1alpha1 "go.pinniped.dev/generated/1.19/apis/supervisor/idp/v1alpha1"
|
||||||
|
versioned "go.pinniped.dev/generated/1.19/client/supervisor/clientset/versioned"
|
||||||
|
internalinterfaces "go.pinniped.dev/generated/1.19/client/supervisor/informers/externalversions/internalinterfaces"
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.19/client/supervisor/listers/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
cache "k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInformer provides access to a shared informer and lister for
|
||||||
|
// ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderInformer interface {
|
||||||
|
Informer() cache.SharedIndexInformer
|
||||||
|
Lister() v1alpha1.ActiveDirectoryIdentityProviderLister
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryIdentityProviderInformer struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
tweakListOptions internalinterfaces.TweakListOptionsFunc
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, namespace, resyncPeriod, indexers, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewFilteredActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewFilteredActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer {
|
||||||
|
return cache.NewSharedIndexInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).List(context.TODO(), options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).Watch(context.TODO(), options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&idpv1alpha1.ActiveDirectoryIdentityProvider{},
|
||||||
|
resyncPeriod,
|
||||||
|
indexers,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Informer() cache.SharedIndexInformer {
|
||||||
|
return f.factory.InformerFor(&idpv1alpha1.ActiveDirectoryIdentityProvider{}, f.defaultInformer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Lister() v1alpha1.ActiveDirectoryIdentityProviderLister {
|
||||||
|
return v1alpha1.NewActiveDirectoryIdentityProviderLister(f.Informer().GetIndexer())
|
||||||
|
}
|
@ -11,6 +11,8 @@ import (
|
|||||||
|
|
||||||
// Interface provides access to all the informers in this group version.
|
// Interface provides access to all the informers in this group version.
|
||||||
type Interface interface {
|
type Interface interface {
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
||||||
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
||||||
@ -28,6 +30,11 @@ func New(f internalinterfaces.SharedInformerFactory, namespace string, tweakList
|
|||||||
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
func (v *version) ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer {
|
||||||
|
return &activeDirectoryIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
}
|
||||||
|
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
||||||
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
86
generated/1.19/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
86
generated/1.19/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by lister-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.19/apis/supervisor/idp/v1alpha1"
|
||||||
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
|
"k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderLister helps list ActiveDirectoryIdentityProviders.
|
||||||
|
// All objects returned here must be treated as read-only.
|
||||||
|
type ActiveDirectoryIdentityProviderLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
ActiveDirectoryIdentityProviderListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderLister implements the ActiveDirectoryIdentityProviderLister interface.
|
||||||
|
type activeDirectoryIdentityProviderLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderLister returns a new ActiveDirectoryIdentityProviderLister.
|
||||||
|
func NewActiveDirectoryIdentityProviderLister(indexer cache.Indexer) ActiveDirectoryIdentityProviderLister {
|
||||||
|
return &activeDirectoryIdentityProviderLister{indexer: indexer}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister {
|
||||||
|
return activeDirectoryIdentityProviderNamespaceLister{indexer: s.indexer, namespace: namespace}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister helps list and get ActiveDirectoryIdentityProviders.
|
||||||
|
// All objects returned here must be treated as read-only.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
ActiveDirectoryIdentityProviderNamespaceListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderNamespaceLister implements the ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
// interface.
|
||||||
|
type activeDirectoryIdentityProviderNamespaceLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, exists, err := s.indexer.GetByKey(s.namespace + "/" + name)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
return nil, errors.NewNotFound(v1alpha1.Resource("activedirectoryidentityprovider"), name)
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), nil
|
||||||
|
}
|
@ -5,6 +5,14 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderLister.
|
||||||
|
type ActiveDirectoryIdentityProviderListerExpansion interface{}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceListerExpansion interface{}
|
||||||
|
|
||||||
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
// LDAPIdentityProviderLister.
|
// LDAPIdentityProviderLister.
|
||||||
type LDAPIdentityProviderListerExpansion interface{}
|
type LDAPIdentityProviderListerExpansion interface{}
|
||||||
|
281
generated/1.19/crds/idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml
generated
Normal file
281
generated/1.19/crds/idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml
generated
Normal file
@ -0,0 +1,281 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.4.0
|
||||||
|
creationTimestamp: null
|
||||||
|
name: activedirectoryidentityproviders.idp.supervisor.pinniped.dev
|
||||||
|
spec:
|
||||||
|
group: idp.supervisor.pinniped.dev
|
||||||
|
names:
|
||||||
|
categories:
|
||||||
|
- pinniped
|
||||||
|
- pinniped-idp
|
||||||
|
- pinniped-idps
|
||||||
|
kind: ActiveDirectoryIdentityProvider
|
||||||
|
listKind: ActiveDirectoryIdentityProviderList
|
||||||
|
plural: activedirectoryidentityproviders
|
||||||
|
singular: activedirectoryidentityprovider
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- jsonPath: .spec.host
|
||||||
|
name: Host
|
||||||
|
type: string
|
||||||
|
- jsonPath: .status.phase
|
||||||
|
name: Status
|
||||||
|
type: string
|
||||||
|
- jsonPath: .metadata.creationTimestamp
|
||||||
|
name: Age
|
||||||
|
type: date
|
||||||
|
name: v1alpha1
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: ActiveDirectoryIdentityProvider describes the configuration of
|
||||||
|
an upstream Microsoft Active Directory identity provider.
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: Spec for configuring the identity provider.
|
||||||
|
properties:
|
||||||
|
bind:
|
||||||
|
description: Bind contains the configuration for how to provide access
|
||||||
|
credentials during an initial bind to the ActiveDirectory server
|
||||||
|
to be allowed to perform searches and binds to validate a user's
|
||||||
|
credentials during a user's authentication attempt.
|
||||||
|
properties:
|
||||||
|
secretName:
|
||||||
|
description: SecretName contains the name of a namespace-local
|
||||||
|
Secret object that provides the username and password for an
|
||||||
|
Active Directory bind user. This account will be used to perform
|
||||||
|
LDAP searches. The Secret should be of type "kubernetes.io/basic-auth"
|
||||||
|
which includes "username" and "password" keys. The username
|
||||||
|
value should be the full dn (distinguished name) of your bind
|
||||||
|
account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
The password must be non-empty.
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- secretName
|
||||||
|
type: object
|
||||||
|
groupSearch:
|
||||||
|
description: GroupSearch contains the configuration for searching
|
||||||
|
for a user's group membership in ActiveDirectory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the group's information
|
||||||
|
should be read from each ActiveDirectory entry which was found
|
||||||
|
as the result of the group search.
|
||||||
|
properties:
|
||||||
|
groupName:
|
||||||
|
description: GroupName specifies the name of the attribute
|
||||||
|
in the Active Directory entries whose value shall become
|
||||||
|
a group name in the user's list of groups after a successful
|
||||||
|
authentication. The value of this field is case-sensitive
|
||||||
|
and must match the case of the attribute name returned by
|
||||||
|
the ActiveDirectory server in the user's entry. E.g. "cn"
|
||||||
|
for common name. Distinguished names can be used by specifying
|
||||||
|
lower-case "dn". Optional. When not specified, this defaults
|
||||||
|
to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
where domain is constructed from the domain components of
|
||||||
|
the group DN.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for groups.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some groups for security reasons or to make
|
||||||
|
searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the ActiveDirectory search filter which
|
||||||
|
should be applied when searching for groups for a user. The
|
||||||
|
pattern "{}" must occur in the filter at least once and will
|
||||||
|
be dynamically replaced by the dn (distinguished name) of the
|
||||||
|
user entry found as a result of the user search. E.g. "member={}"
|
||||||
|
or "&(objectClass=groupOfNames)(member={})". For more information
|
||||||
|
about ActiveDirectory filters, see https://ldap.com/ldap-filters.
|
||||||
|
Note that the dn (distinguished name) is not an attribute of
|
||||||
|
an entry, so "dn={}" cannot be used. Optional. When not specified,
|
||||||
|
the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
This searches nested groups by default. Note that nested group
|
||||||
|
search can be slow for some Active Directory servers. To disable
|
||||||
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
host:
|
||||||
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
provider, i.e., where to connect. For example: ldap.example.com:636.'
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
tls:
|
||||||
|
description: TLS contains the connection settings for how to establish
|
||||||
|
the connection to the Host.
|
||||||
|
properties:
|
||||||
|
certificateAuthorityData:
|
||||||
|
description: X.509 Certificate Authority (base64-encoded PEM bundle).
|
||||||
|
If omitted, a default set of system roots will be trusted.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
userSearch:
|
||||||
|
description: UserSearch contains the configuration for searching for
|
||||||
|
a user by name in Active Directory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the user's information should
|
||||||
|
be read from the ActiveDirectory entry which was found as the
|
||||||
|
result of the user search.
|
||||||
|
properties:
|
||||||
|
uid:
|
||||||
|
description: UID specifies the name of the attribute in the
|
||||||
|
ActiveDirectory entry which whose value shall be used to
|
||||||
|
uniquely identify the user within this ActiveDirectory provider
|
||||||
|
after a successful authentication. Optional, when empty
|
||||||
|
this defaults to "objectGUID".
|
||||||
|
type: string
|
||||||
|
username:
|
||||||
|
description: Username specifies the name of the attribute
|
||||||
|
in Active Directory entry whose value shall become the username
|
||||||
|
of the user after a successful authentication. Optional,
|
||||||
|
when empty this defaults to "userPrincipalName".
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for users.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some users or to make searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the search filter which should be applied
|
||||||
|
when searching for users. The pattern "{}" must occur in the
|
||||||
|
filter at least once and will be dynamically replaced by the
|
||||||
|
username for which the search is being run. E.g. "mail={}" or
|
||||||
|
"&(objectClass=person)(uid={})". For more information about
|
||||||
|
LDAP filters, see https://ldap.com/ldap-filters. Note that the
|
||||||
|
dn (distinguished name) is not an attribute of an entry, so
|
||||||
|
"dn={}" cannot be used. Optional. When not specified, the default
|
||||||
|
will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
This means that the user is a person, is not a computer, the
|
||||||
|
sAMAccountType is for a normal user account, and is not shown
|
||||||
|
in advanced view only (which would likely mean its a system
|
||||||
|
created service account with advanced permissions). Also, either
|
||||||
|
the sAMAccountName, the userPrincipalName, or the mail attribute
|
||||||
|
matches the input username.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- host
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
description: Status of the identity provider.
|
||||||
|
properties:
|
||||||
|
conditions:
|
||||||
|
description: Represents the observations of an identity provider's
|
||||||
|
current state.
|
||||||
|
items:
|
||||||
|
description: Condition status of a resource (mirrored from the metav1.Condition
|
||||||
|
type added in Kubernetes 1.19). In a future API version we can
|
||||||
|
switch to using the upstream type. See https://github.com/kubernetes/apimachinery/blob/v0.19.0/pkg/apis/meta/v1/types.go#L1353-L1413.
|
||||||
|
properties:
|
||||||
|
lastTransitionTime:
|
||||||
|
description: lastTransitionTime is the last time the condition
|
||||||
|
transitioned from one status to another. This should be when
|
||||||
|
the underlying condition changed. If that is not known, then
|
||||||
|
using the time when the API field changed is acceptable.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
message:
|
||||||
|
description: message is a human readable message indicating
|
||||||
|
details about the transition. This may be an empty string.
|
||||||
|
maxLength: 32768
|
||||||
|
type: string
|
||||||
|
observedGeneration:
|
||||||
|
description: observedGeneration represents the .metadata.generation
|
||||||
|
that the condition was set based upon. For instance, if .metadata.generation
|
||||||
|
is currently 12, but the .status.conditions[x].observedGeneration
|
||||||
|
is 9, the condition is out of date with respect to the current
|
||||||
|
state of the instance.
|
||||||
|
format: int64
|
||||||
|
minimum: 0
|
||||||
|
type: integer
|
||||||
|
reason:
|
||||||
|
description: reason contains a programmatic identifier indicating
|
||||||
|
the reason for the condition's last transition. Producers
|
||||||
|
of specific condition types may define expected values and
|
||||||
|
meanings for this field, and whether the values are considered
|
||||||
|
a guaranteed API. The value should be a CamelCase string.
|
||||||
|
This field may not be empty.
|
||||||
|
maxLength: 1024
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
description: status of the condition, one of True, False, Unknown.
|
||||||
|
enum:
|
||||||
|
- "True"
|
||||||
|
- "False"
|
||||||
|
- Unknown
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||||
|
--- Many .condition.type values are consistent across resources
|
||||||
|
like Available, but because arbitrary conditions can be useful
|
||||||
|
(see .node.status.conditions), the ability to deconflict is
|
||||||
|
important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||||
|
maxLength: 316
|
||||||
|
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- lastTransitionTime
|
||||||
|
- message
|
||||||
|
- reason
|
||||||
|
- status
|
||||||
|
- type
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
x-kubernetes-list-map-keys:
|
||||||
|
- type
|
||||||
|
x-kubernetes-list-type: map
|
||||||
|
phase:
|
||||||
|
default: Pending
|
||||||
|
description: Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
enum:
|
||||||
|
- Pending
|
||||||
|
- Ready
|
||||||
|
- Error
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- spec
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
153
generated/1.20/README.adoc
generated
153
generated/1.20/README.adoc
generated
@ -748,6 +748,157 @@ Package v1alpha1 is the v1alpha1 version of the Pinniped supervisor identity pro
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider"]
|
||||||
|
==== ActiveDirectoryIdentityProvider
|
||||||
|
|
||||||
|
ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderlist[$$ActiveDirectoryIdentityProviderList$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`metadata`* __link:https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.2/#objectmeta-v1-meta[$$ObjectMeta$$]__ | Refer to Kubernetes API documentation for fields of `metadata`.
|
||||||
|
|
||||||
|
| *`spec`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]__ | Spec for configuring the identity provider.
|
||||||
|
| *`status`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus[$$ActiveDirectoryIdentityProviderStatus$$]__ | Status of the identity provider.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderbind"]
|
||||||
|
==== ActiveDirectoryIdentityProviderBind
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`secretName`* __string__ | SecretName contains the name of a namespace-local Secret object that provides the username and password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com". The password must be non-empty.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch"]
|
||||||
|
==== ActiveDirectoryIdentityProviderGroupSearch
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
||||||
|
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes"]
|
||||||
|
==== ActiveDirectoryIdentityProviderGroupSearchAttributes
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch[$$ActiveDirectoryIdentityProviderGroupSearch$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`groupName`* __string__ | GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name in the user's list of groups after a successful authentication. The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn". Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain", where domain is constructed from the domain components of the group DN.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec"]
|
||||||
|
==== ActiveDirectoryIdentityProviderSpec
|
||||||
|
|
||||||
|
Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider[$$ActiveDirectoryIdentityProvider$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`host`* __string__ | Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
| *`tls`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-tlsspec[$$TLSSpec$$]__ | TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
| *`bind`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderbind[$$ActiveDirectoryIdentityProviderBind$$]__ | Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
| *`userSearch`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch[$$ActiveDirectoryIdentityProviderUserSearch$$]__ | UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
| *`groupSearch`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearch[$$ActiveDirectoryIdentityProviderGroupSearch$$]__ | GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus"]
|
||||||
|
==== ActiveDirectoryIdentityProviderStatus
|
||||||
|
|
||||||
|
Status of an Active Directory identity provider.
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovider[$$ActiveDirectoryIdentityProvider$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`phase`* __ActiveDirectoryIdentityProviderPhase__ | Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
| *`conditions`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-condition[$$Condition$$] array__ | Represents the observations of an identity provider's current state.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch"]
|
||||||
|
==== ActiveDirectoryIdentityProviderUserSearch
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for users. It may make sense to specify a subtree as a search base if you wish to exclude some users or to make searches faster.
|
||||||
|
| *`filter`* __string__ | Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the username for which the search is being run. E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))' This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account, and is not shown in advanced view only (which would likely mean its a system created service account with advanced permissions). Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearchattributes[$$ActiveDirectoryIdentityProviderUserSearchAttributes$$]__ | Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as the result of the user search.
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearchattributes"]
|
||||||
|
==== ActiveDirectoryIdentityProviderUserSearchAttributes
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.Appears In:
|
||||||
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderusersearch[$$ActiveDirectoryIdentityProviderUserSearch$$]
|
||||||
|
****
|
||||||
|
|
||||||
|
[cols="25a,75a", options="header"]
|
||||||
|
|===
|
||||||
|
| Field | Description
|
||||||
|
| *`username`* __string__ | Username specifies the name of the attribute in Active Directory entry whose value shall become the username of the user after a successful authentication. Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
| *`uid`* __string__ | UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely identify the user within this ActiveDirectory provider after a successful authentication. Optional, when empty this defaults to "objectGUID".
|
||||||
|
|===
|
||||||
|
|
||||||
|
|
||||||
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-condition"]
|
[id="{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-condition"]
|
||||||
==== Condition
|
==== Condition
|
||||||
|
|
||||||
@ -755,6 +906,7 @@ Package v1alpha1 is the v1alpha1 version of the Pinniped supervisor identity pro
|
|||||||
|
|
||||||
.Appears In:
|
.Appears In:
|
||||||
****
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderstatus[$$ActiveDirectoryIdentityProviderStatus$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-ldapidentityproviderstatus[$$LDAPIdentityProviderStatus$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-ldapidentityproviderstatus[$$LDAPIdentityProviderStatus$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-oidcidentityproviderstatus[$$OIDCIdentityProviderStatus$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-oidcidentityproviderstatus[$$OIDCIdentityProviderStatus$$]
|
||||||
****
|
****
|
||||||
@ -1055,6 +1207,7 @@ Status of an OIDC identity provider.
|
|||||||
|
|
||||||
.Appears In:
|
.Appears In:
|
||||||
****
|
****
|
||||||
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityproviderspec[$$ActiveDirectoryIdentityProviderSpec$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-ldapidentityproviderspec[$$LDAPIdentityProviderSpec$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-ldapidentityproviderspec[$$LDAPIdentityProviderSpec$$]
|
||||||
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-oidcidentityproviderspec[$$OIDCIdentityProviderSpec$$]
|
- xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-oidcidentityproviderspec[$$OIDCIdentityProviderSpec$$]
|
||||||
****
|
****
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
@ -34,6 +34,8 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||||||
&OIDCIdentityProviderList{},
|
&OIDCIdentityProviderList{},
|
||||||
&LDAPIdentityProvider{},
|
&LDAPIdentityProvider{},
|
||||||
&LDAPIdentityProviderList{},
|
&LDAPIdentityProviderList{},
|
||||||
|
&ActiveDirectoryIdentityProvider{},
|
||||||
|
&ActiveDirectoryIdentityProviderList{},
|
||||||
)
|
)
|
||||||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||||
return nil
|
return nil
|
||||||
|
182
generated/1.20/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
182
generated/1.20/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderPhase string
|
||||||
|
|
||||||
|
const (
|
||||||
|
// ActiveDirectoryPhasePending is the default phase for newly-created ActiveDirectoryIdentityProvider resources.
|
||||||
|
ActiveDirectoryPhasePending ActiveDirectoryIdentityProviderPhase = "Pending"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseReady is the phase for an ActiveDirectoryIdentityProvider resource in a healthy state.
|
||||||
|
ActiveDirectoryPhaseReady ActiveDirectoryIdentityProviderPhase = "Ready"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseError is the phase for an ActiveDirectoryIdentityProvider in an unhealthy state.
|
||||||
|
ActiveDirectoryPhaseError ActiveDirectoryIdentityProviderPhase = "Error"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Status of an Active Directory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderStatus struct {
|
||||||
|
// Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
// +kubebuilder:default=Pending
|
||||||
|
// +kubebuilder:validation:Enum=Pending;Ready;Error
|
||||||
|
Phase ActiveDirectoryIdentityProviderPhase `json:"phase,omitempty"`
|
||||||
|
|
||||||
|
// Represents the observations of an identity provider's current state.
|
||||||
|
// +patchMergeKey=type
|
||||||
|
// +patchStrategy=merge
|
||||||
|
// +listType=map
|
||||||
|
// +listMapKey=type
|
||||||
|
Conditions []Condition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderBind struct {
|
||||||
|
// SecretName contains the name of a namespace-local Secret object that provides the username and
|
||||||
|
// password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be
|
||||||
|
// of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value
|
||||||
|
// should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
// The password must be non-empty.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
SecretName string `json:"secretName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearchAttributes struct {
|
||||||
|
// Username specifies the name of the attribute in Active Directory entry whose value shall become the username
|
||||||
|
// of the user after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
// +optional
|
||||||
|
Username string `json:"username,omitempty"`
|
||||||
|
|
||||||
|
// UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely
|
||||||
|
// identify the user within this ActiveDirectory provider after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "objectGUID".
|
||||||
|
// +optional
|
||||||
|
UID string `json:"uid,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearchAttributes struct {
|
||||||
|
// GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name
|
||||||
|
// in the user's list of groups after a successful authentication.
|
||||||
|
// The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory
|
||||||
|
// server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn".
|
||||||
|
// Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
// where domain is constructed from the domain components of the group DN.
|
||||||
|
// +optional
|
||||||
|
GroupName string `json:"groupName,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for users.
|
||||||
|
// E.g. "ou=users,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for users.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some users
|
||||||
|
// or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur
|
||||||
|
// in the filter at least once and will be dynamically replaced by the username for which the search is being run.
|
||||||
|
// E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will be
|
||||||
|
// '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
// This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account,
|
||||||
|
// and is not shown in advanced view only
|
||||||
|
// (which would likely mean its a system created service account with advanced permissions).
|
||||||
|
// Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as
|
||||||
|
// the result of the user search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderUserSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g.
|
||||||
|
// "ou=groups,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for groups.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some groups
|
||||||
|
// for security reasons or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user.
|
||||||
|
// The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the
|
||||||
|
// dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or
|
||||||
|
// "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will act as if the filter were specified as
|
||||||
|
// "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
// This searches nested groups by default.
|
||||||
|
// Note that nested group search can be slow for some Active Directory servers. To disable it,
|
||||||
|
// you can set the filter to
|
||||||
|
// "(&(objectClass=group)(member={})"
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as
|
||||||
|
// the result of the group search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderSpec struct {
|
||||||
|
// Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
Host string `json:"host"`
|
||||||
|
|
||||||
|
// TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
TLS *TLSSpec `json:"tls,omitempty"`
|
||||||
|
|
||||||
|
// Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server
|
||||||
|
// to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
Bind ActiveDirectoryIdentityProviderBind `json:"bind,omitempty"`
|
||||||
|
|
||||||
|
// UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
UserSearch ActiveDirectoryIdentityProviderUserSearch `json:"userSearch,omitempty"`
|
||||||
|
|
||||||
|
// GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
GroupSearch ActiveDirectoryIdentityProviderGroupSearch `json:"groupSearch,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
// +genclient
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
// +kubebuilder:resource:categories=pinniped;pinniped-idp;pinniped-idps
|
||||||
|
// +kubebuilder:printcolumn:name="Host",type=string,JSONPath=`.spec.host`
|
||||||
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.phase`
|
||||||
|
// +kubebuilder:printcolumn:name="Age",type=date,JSONPath=`.metadata.creationTimestamp`
|
||||||
|
// +kubebuilder:subresource:status
|
||||||
|
type ActiveDirectoryIdentityProvider struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
// Spec for configuring the identity provider.
|
||||||
|
Spec ActiveDirectoryIdentityProviderSpec `json:"spec"`
|
||||||
|
|
||||||
|
// Status of the identity provider.
|
||||||
|
Status ActiveDirectoryIdentityProviderStatus `json:"status,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// List of ActiveDirectoryIdentityProvider objects.
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
type ActiveDirectoryIdentityProviderList struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ListMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
Items []ActiveDirectoryIdentityProvider `json:"items"`
|
||||||
|
}
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
@ -11,6 +11,196 @@ import (
|
|||||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyInto(out *ActiveDirectoryIdentityProvider) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ObjectMeta.DeepCopyInto(&out.ObjectMeta)
|
||||||
|
in.Spec.DeepCopyInto(&out.Spec)
|
||||||
|
in.Status.DeepCopyInto(&out.Status)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProvider.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopy() *ActiveDirectoryIdentityProvider {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProvider)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopyInto(out *ActiveDirectoryIdentityProviderBind) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderBind.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopy() *ActiveDirectoryIdentityProviderBind {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderBind)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyInto(out *ActiveDirectoryIdentityProviderList) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]ActiveDirectoryIdentityProvider, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderList.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopy() *ActiveDirectoryIdentityProviderList {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderList)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopyInto(out *ActiveDirectoryIdentityProviderSpec) {
|
||||||
|
*out = *in
|
||||||
|
if in.TLS != nil {
|
||||||
|
in, out := &in.TLS, &out.TLS
|
||||||
|
*out = new(TLSSpec)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
out.Bind = in.Bind
|
||||||
|
out.UserSearch = in.UserSearch
|
||||||
|
out.GroupSearch = in.GroupSearch
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderSpec.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopy() *ActiveDirectoryIdentityProviderSpec {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderSpec)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopyInto(out *ActiveDirectoryIdentityProviderStatus) {
|
||||||
|
*out = *in
|
||||||
|
if in.Conditions != nil {
|
||||||
|
in, out := &in.Conditions, &out.Conditions
|
||||||
|
*out = make([]Condition, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderStatus.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopy() *ActiveDirectoryIdentityProviderStatus {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderStatus)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopy() *ActiveDirectoryIdentityProviderUserSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderUserSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *Condition) DeepCopyInto(out *Condition) {
|
func (in *Condition) DeepCopyInto(out *Condition) {
|
||||||
*out = *in
|
*out = *in
|
||||||
|
@ -14,6 +14,7 @@ type IDPFlow string
|
|||||||
const (
|
const (
|
||||||
IDPTypeOIDC IDPType = "oidc"
|
IDPTypeOIDC IDPType = "oidc"
|
||||||
IDPTypeLDAP IDPType = "ldap"
|
IDPTypeLDAP IDPType = "ldap"
|
||||||
|
IDPTypeActiveDirectory IDPType = "activedirectory"
|
||||||
|
|
||||||
IDPFlowCLIPassword IDPFlow = "cli_password"
|
IDPFlowCLIPassword IDPFlow = "cli_password"
|
||||||
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
||||||
|
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.20/apis/supervisor/idp/v1alpha1"
|
||||||
|
scheme "go.pinniped.dev/generated/1.20/client/supervisor/clientset/versioned/scheme"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvidersGetter has a method to return a ActiveDirectoryIdentityProviderInterface.
|
||||||
|
// A group's client should implement this interface.
|
||||||
|
type ActiveDirectoryIdentityProvidersGetter interface {
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInterface has methods to work with ActiveDirectoryIdentityProvider resources.
|
||||||
|
type ActiveDirectoryIdentityProviderInterface interface {
|
||||||
|
Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Delete(ctx context.Context, name string, opts v1.DeleteOptions) error
|
||||||
|
DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error
|
||||||
|
Get(ctx context.Context, name string, opts v1.GetOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
List(ctx context.Context, opts v1.ListOptions) (*v1alpha1.ActiveDirectoryIdentityProviderList, error)
|
||||||
|
Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error)
|
||||||
|
Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
ActiveDirectoryIdentityProviderExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type activeDirectoryIdentityProviders struct {
|
||||||
|
client rest.Interface
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
// newActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviders
|
||||||
|
func newActiveDirectoryIdentityProviders(c *IDPV1alpha1Client, namespace string) *activeDirectoryIdentityProviders {
|
||||||
|
return &activeDirectoryIdentityProviders{
|
||||||
|
client: c.RESTClient(),
|
||||||
|
ns: namespace,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
VersionedParams(&options, scheme.ParameterCodec).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *activeDirectoryIdentityProviders) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProviderList{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
opts.Watch = true
|
||||||
|
return c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Watch(ctx)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Post().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *activeDirectoryIdentityProviders) UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
SubResource("status").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *activeDirectoryIdentityProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
var timeout time.Duration
|
||||||
|
if listOpts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&listOpts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Patch(pt).
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
SubResource(subresources...).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(data).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
@ -0,0 +1,129 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.20/apis/supervisor/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
labels "k8s.io/apimachinery/pkg/labels"
|
||||||
|
schema "k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FakeActiveDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type FakeActiveDirectoryIdentityProviders struct {
|
||||||
|
Fake *FakeIDPV1alpha1
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersResource = schema.GroupVersionResource{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Resource: "activedirectoryidentityproviders"}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersKind = schema.GroupVersionKind{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Kind: "ActiveDirectoryIdentityProvider"}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewGetAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewListAction(activedirectoryidentityprovidersResource, activedirectoryidentityprovidersKind, c.ns, opts), &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
label, _, _ := testing.ExtractFromListOptions(opts)
|
||||||
|
if label == nil {
|
||||||
|
label = labels.Everything()
|
||||||
|
}
|
||||||
|
list := &v1alpha1.ActiveDirectoryIdentityProviderList{ListMeta: obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).ListMeta}
|
||||||
|
for _, item := range obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).Items {
|
||||||
|
if label.Matches(labels.Set(item.Labels)) {
|
||||||
|
list.Items = append(list.Items, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return c.Fake.
|
||||||
|
InvokesWatch(testing.NewWatchAction(activedirectoryidentityprovidersResource, c.ns, opts))
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewCreateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateSubresourceAction(activedirectoryidentityprovidersResource, "status", c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
_, err := c.Fake.
|
||||||
|
Invokes(testing.NewDeleteAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
action := testing.NewDeleteCollectionAction(activedirectoryidentityprovidersResource, c.ns, listOpts)
|
||||||
|
|
||||||
|
_, err := c.Fake.Invokes(action, &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewPatchSubresourceAction(activedirectoryidentityprovidersResource, c.ns, name, pt, data, subresources...), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
@ -15,6 +15,10 @@ type FakeIDPV1alpha1 struct {
|
|||||||
*testing.Fake
|
*testing.Fake
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *FakeIDPV1alpha1) ActiveDirectoryIdentityProviders(namespace string) v1alpha1.ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return &FakeActiveDirectoryIdentityProviders{c, namespace}
|
||||||
|
}
|
||||||
|
|
||||||
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
||||||
return &FakeLDAPIdentityProviders{c, namespace}
|
return &FakeLDAPIdentityProviders{c, namespace}
|
||||||
}
|
}
|
||||||
|
@ -5,6 +5,8 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type LDAPIdentityProviderExpansion interface{}
|
type LDAPIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type OIDCIdentityProviderExpansion interface{}
|
type OIDCIdentityProviderExpansion interface{}
|
||||||
|
@ -13,6 +13,7 @@ import (
|
|||||||
|
|
||||||
type IDPV1alpha1Interface interface {
|
type IDPV1alpha1Interface interface {
|
||||||
RESTClient() rest.Interface
|
RESTClient() rest.Interface
|
||||||
|
ActiveDirectoryIdentityProvidersGetter
|
||||||
LDAPIdentityProvidersGetter
|
LDAPIdentityProvidersGetter
|
||||||
OIDCIdentityProvidersGetter
|
OIDCIdentityProvidersGetter
|
||||||
}
|
}
|
||||||
@ -22,6 +23,10 @@ type IDPV1alpha1Client struct {
|
|||||||
restClient rest.Interface
|
restClient rest.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *IDPV1alpha1Client) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return newActiveDirectoryIdentityProviders(c, namespace)
|
||||||
|
}
|
||||||
|
|
||||||
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
||||||
return newLDAPIdentityProviders(c, namespace)
|
return newLDAPIdentityProviders(c, namespace)
|
||||||
}
|
}
|
||||||
|
@ -45,6 +45,8 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
||||||
|
|
||||||
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
||||||
|
case idpv1alpha1.SchemeGroupVersion.WithResource("activedirectoryidentityproviders"):
|
||||||
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().ActiveDirectoryIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
||||||
|
@ -0,0 +1,77 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by informer-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
time "time"
|
||||||
|
|
||||||
|
idpv1alpha1 "go.pinniped.dev/generated/1.20/apis/supervisor/idp/v1alpha1"
|
||||||
|
versioned "go.pinniped.dev/generated/1.20/client/supervisor/clientset/versioned"
|
||||||
|
internalinterfaces "go.pinniped.dev/generated/1.20/client/supervisor/informers/externalversions/internalinterfaces"
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.20/client/supervisor/listers/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
cache "k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInformer provides access to a shared informer and lister for
|
||||||
|
// ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderInformer interface {
|
||||||
|
Informer() cache.SharedIndexInformer
|
||||||
|
Lister() v1alpha1.ActiveDirectoryIdentityProviderLister
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryIdentityProviderInformer struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
tweakListOptions internalinterfaces.TweakListOptionsFunc
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, namespace, resyncPeriod, indexers, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewFilteredActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewFilteredActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer {
|
||||||
|
return cache.NewSharedIndexInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).List(context.TODO(), options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).Watch(context.TODO(), options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&idpv1alpha1.ActiveDirectoryIdentityProvider{},
|
||||||
|
resyncPeriod,
|
||||||
|
indexers,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Informer() cache.SharedIndexInformer {
|
||||||
|
return f.factory.InformerFor(&idpv1alpha1.ActiveDirectoryIdentityProvider{}, f.defaultInformer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Lister() v1alpha1.ActiveDirectoryIdentityProviderLister {
|
||||||
|
return v1alpha1.NewActiveDirectoryIdentityProviderLister(f.Informer().GetIndexer())
|
||||||
|
}
|
@ -11,6 +11,8 @@ import (
|
|||||||
|
|
||||||
// Interface provides access to all the informers in this group version.
|
// Interface provides access to all the informers in this group version.
|
||||||
type Interface interface {
|
type Interface interface {
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
||||||
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
||||||
@ -28,6 +30,11 @@ func New(f internalinterfaces.SharedInformerFactory, namespace string, tweakList
|
|||||||
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
func (v *version) ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer {
|
||||||
|
return &activeDirectoryIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
}
|
||||||
|
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
||||||
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
86
generated/1.20/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
86
generated/1.20/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by lister-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/1.20/apis/supervisor/idp/v1alpha1"
|
||||||
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
|
"k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderLister helps list ActiveDirectoryIdentityProviders.
|
||||||
|
// All objects returned here must be treated as read-only.
|
||||||
|
type ActiveDirectoryIdentityProviderLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
ActiveDirectoryIdentityProviderListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderLister implements the ActiveDirectoryIdentityProviderLister interface.
|
||||||
|
type activeDirectoryIdentityProviderLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderLister returns a new ActiveDirectoryIdentityProviderLister.
|
||||||
|
func NewActiveDirectoryIdentityProviderLister(indexer cache.Indexer) ActiveDirectoryIdentityProviderLister {
|
||||||
|
return &activeDirectoryIdentityProviderLister{indexer: indexer}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister {
|
||||||
|
return activeDirectoryIdentityProviderNamespaceLister{indexer: s.indexer, namespace: namespace}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister helps list and get ActiveDirectoryIdentityProviders.
|
||||||
|
// All objects returned here must be treated as read-only.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
ActiveDirectoryIdentityProviderNamespaceListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderNamespaceLister implements the ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
// interface.
|
||||||
|
type activeDirectoryIdentityProviderNamespaceLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, exists, err := s.indexer.GetByKey(s.namespace + "/" + name)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
return nil, errors.NewNotFound(v1alpha1.Resource("activedirectoryidentityprovider"), name)
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), nil
|
||||||
|
}
|
@ -5,6 +5,14 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderLister.
|
||||||
|
type ActiveDirectoryIdentityProviderListerExpansion interface{}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceListerExpansion interface{}
|
||||||
|
|
||||||
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
// LDAPIdentityProviderLister.
|
// LDAPIdentityProviderLister.
|
||||||
type LDAPIdentityProviderListerExpansion interface{}
|
type LDAPIdentityProviderListerExpansion interface{}
|
||||||
|
281
generated/1.20/crds/idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml
generated
Normal file
281
generated/1.20/crds/idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml
generated
Normal file
@ -0,0 +1,281 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.4.0
|
||||||
|
creationTimestamp: null
|
||||||
|
name: activedirectoryidentityproviders.idp.supervisor.pinniped.dev
|
||||||
|
spec:
|
||||||
|
group: idp.supervisor.pinniped.dev
|
||||||
|
names:
|
||||||
|
categories:
|
||||||
|
- pinniped
|
||||||
|
- pinniped-idp
|
||||||
|
- pinniped-idps
|
||||||
|
kind: ActiveDirectoryIdentityProvider
|
||||||
|
listKind: ActiveDirectoryIdentityProviderList
|
||||||
|
plural: activedirectoryidentityproviders
|
||||||
|
singular: activedirectoryidentityprovider
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- jsonPath: .spec.host
|
||||||
|
name: Host
|
||||||
|
type: string
|
||||||
|
- jsonPath: .status.phase
|
||||||
|
name: Status
|
||||||
|
type: string
|
||||||
|
- jsonPath: .metadata.creationTimestamp
|
||||||
|
name: Age
|
||||||
|
type: date
|
||||||
|
name: v1alpha1
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: ActiveDirectoryIdentityProvider describes the configuration of
|
||||||
|
an upstream Microsoft Active Directory identity provider.
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: Spec for configuring the identity provider.
|
||||||
|
properties:
|
||||||
|
bind:
|
||||||
|
description: Bind contains the configuration for how to provide access
|
||||||
|
credentials during an initial bind to the ActiveDirectory server
|
||||||
|
to be allowed to perform searches and binds to validate a user's
|
||||||
|
credentials during a user's authentication attempt.
|
||||||
|
properties:
|
||||||
|
secretName:
|
||||||
|
description: SecretName contains the name of a namespace-local
|
||||||
|
Secret object that provides the username and password for an
|
||||||
|
Active Directory bind user. This account will be used to perform
|
||||||
|
LDAP searches. The Secret should be of type "kubernetes.io/basic-auth"
|
||||||
|
which includes "username" and "password" keys. The username
|
||||||
|
value should be the full dn (distinguished name) of your bind
|
||||||
|
account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
The password must be non-empty.
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- secretName
|
||||||
|
type: object
|
||||||
|
groupSearch:
|
||||||
|
description: GroupSearch contains the configuration for searching
|
||||||
|
for a user's group membership in ActiveDirectory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the group's information
|
||||||
|
should be read from each ActiveDirectory entry which was found
|
||||||
|
as the result of the group search.
|
||||||
|
properties:
|
||||||
|
groupName:
|
||||||
|
description: GroupName specifies the name of the attribute
|
||||||
|
in the Active Directory entries whose value shall become
|
||||||
|
a group name in the user's list of groups after a successful
|
||||||
|
authentication. The value of this field is case-sensitive
|
||||||
|
and must match the case of the attribute name returned by
|
||||||
|
the ActiveDirectory server in the user's entry. E.g. "cn"
|
||||||
|
for common name. Distinguished names can be used by specifying
|
||||||
|
lower-case "dn". Optional. When not specified, this defaults
|
||||||
|
to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
where domain is constructed from the domain components of
|
||||||
|
the group DN.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for groups.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some groups for security reasons or to make
|
||||||
|
searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the ActiveDirectory search filter which
|
||||||
|
should be applied when searching for groups for a user. The
|
||||||
|
pattern "{}" must occur in the filter at least once and will
|
||||||
|
be dynamically replaced by the dn (distinguished name) of the
|
||||||
|
user entry found as a result of the user search. E.g. "member={}"
|
||||||
|
or "&(objectClass=groupOfNames)(member={})". For more information
|
||||||
|
about ActiveDirectory filters, see https://ldap.com/ldap-filters.
|
||||||
|
Note that the dn (distinguished name) is not an attribute of
|
||||||
|
an entry, so "dn={}" cannot be used. Optional. When not specified,
|
||||||
|
the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
This searches nested groups by default. Note that nested group
|
||||||
|
search can be slow for some Active Directory servers. To disable
|
||||||
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
host:
|
||||||
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
provider, i.e., where to connect. For example: ldap.example.com:636.'
|
||||||
|
minLength: 1
|
||||||
|
type: string
|
||||||
|
tls:
|
||||||
|
description: TLS contains the connection settings for how to establish
|
||||||
|
the connection to the Host.
|
||||||
|
properties:
|
||||||
|
certificateAuthorityData:
|
||||||
|
description: X.509 Certificate Authority (base64-encoded PEM bundle).
|
||||||
|
If omitted, a default set of system roots will be trusted.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
userSearch:
|
||||||
|
description: UserSearch contains the configuration for searching for
|
||||||
|
a user by name in Active Directory.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
description: Attributes specifies how the user's information should
|
||||||
|
be read from the ActiveDirectory entry which was found as the
|
||||||
|
result of the user search.
|
||||||
|
properties:
|
||||||
|
uid:
|
||||||
|
description: UID specifies the name of the attribute in the
|
||||||
|
ActiveDirectory entry which whose value shall be used to
|
||||||
|
uniquely identify the user within this ActiveDirectory provider
|
||||||
|
after a successful authentication. Optional, when empty
|
||||||
|
this defaults to "objectGUID".
|
||||||
|
type: string
|
||||||
|
username:
|
||||||
|
description: Username specifies the name of the attribute
|
||||||
|
in Active Directory entry whose value shall become the username
|
||||||
|
of the user after a successful authentication. Optional,
|
||||||
|
when empty this defaults to "userPrincipalName".
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
base:
|
||||||
|
description: Base is the dn (distinguished name) that should be
|
||||||
|
used as the search base when searching for users. E.g. "ou=users,dc=example,dc=com".
|
||||||
|
Optional, when not specified it will be based on the result
|
||||||
|
of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
The default behavior searches your entire domain for users.
|
||||||
|
It may make sense to specify a subtree as a search base if you
|
||||||
|
wish to exclude some users or to make searches faster.
|
||||||
|
type: string
|
||||||
|
filter:
|
||||||
|
description: Filter is the search filter which should be applied
|
||||||
|
when searching for users. The pattern "{}" must occur in the
|
||||||
|
filter at least once and will be dynamically replaced by the
|
||||||
|
username for which the search is being run. E.g. "mail={}" or
|
||||||
|
"&(objectClass=person)(uid={})". For more information about
|
||||||
|
LDAP filters, see https://ldap.com/ldap-filters. Note that the
|
||||||
|
dn (distinguished name) is not an attribute of an entry, so
|
||||||
|
"dn={}" cannot be used. Optional. When not specified, the default
|
||||||
|
will be '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
This means that the user is a person, is not a computer, the
|
||||||
|
sAMAccountType is for a normal user account, and is not shown
|
||||||
|
in advanced view only (which would likely mean its a system
|
||||||
|
created service account with advanced permissions). Also, either
|
||||||
|
the sAMAccountName, the userPrincipalName, or the mail attribute
|
||||||
|
matches the input username.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- host
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
description: Status of the identity provider.
|
||||||
|
properties:
|
||||||
|
conditions:
|
||||||
|
description: Represents the observations of an identity provider's
|
||||||
|
current state.
|
||||||
|
items:
|
||||||
|
description: Condition status of a resource (mirrored from the metav1.Condition
|
||||||
|
type added in Kubernetes 1.19). In a future API version we can
|
||||||
|
switch to using the upstream type. See https://github.com/kubernetes/apimachinery/blob/v0.19.0/pkg/apis/meta/v1/types.go#L1353-L1413.
|
||||||
|
properties:
|
||||||
|
lastTransitionTime:
|
||||||
|
description: lastTransitionTime is the last time the condition
|
||||||
|
transitioned from one status to another. This should be when
|
||||||
|
the underlying condition changed. If that is not known, then
|
||||||
|
using the time when the API field changed is acceptable.
|
||||||
|
format: date-time
|
||||||
|
type: string
|
||||||
|
message:
|
||||||
|
description: message is a human readable message indicating
|
||||||
|
details about the transition. This may be an empty string.
|
||||||
|
maxLength: 32768
|
||||||
|
type: string
|
||||||
|
observedGeneration:
|
||||||
|
description: observedGeneration represents the .metadata.generation
|
||||||
|
that the condition was set based upon. For instance, if .metadata.generation
|
||||||
|
is currently 12, but the .status.conditions[x].observedGeneration
|
||||||
|
is 9, the condition is out of date with respect to the current
|
||||||
|
state of the instance.
|
||||||
|
format: int64
|
||||||
|
minimum: 0
|
||||||
|
type: integer
|
||||||
|
reason:
|
||||||
|
description: reason contains a programmatic identifier indicating
|
||||||
|
the reason for the condition's last transition. Producers
|
||||||
|
of specific condition types may define expected values and
|
||||||
|
meanings for this field, and whether the values are considered
|
||||||
|
a guaranteed API. The value should be a CamelCase string.
|
||||||
|
This field may not be empty.
|
||||||
|
maxLength: 1024
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
description: status of the condition, one of True, False, Unknown.
|
||||||
|
enum:
|
||||||
|
- "True"
|
||||||
|
- "False"
|
||||||
|
- Unknown
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: type of condition in CamelCase or in foo.example.com/CamelCase.
|
||||||
|
--- Many .condition.type values are consistent across resources
|
||||||
|
like Available, but because arbitrary conditions can be useful
|
||||||
|
(see .node.status.conditions), the ability to deconflict is
|
||||||
|
important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
|
||||||
|
maxLength: 316
|
||||||
|
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- lastTransitionTime
|
||||||
|
- message
|
||||||
|
- reason
|
||||||
|
- status
|
||||||
|
- type
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
x-kubernetes-list-map-keys:
|
||||||
|
- type
|
||||||
|
x-kubernetes-list-type: map
|
||||||
|
phase:
|
||||||
|
default: Pending
|
||||||
|
description: Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
enum:
|
||||||
|
- Pending
|
||||||
|
- Ready
|
||||||
|
- Error
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- spec
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
@ -34,6 +34,8 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||||||
&OIDCIdentityProviderList{},
|
&OIDCIdentityProviderList{},
|
||||||
&LDAPIdentityProvider{},
|
&LDAPIdentityProvider{},
|
||||||
&LDAPIdentityProviderList{},
|
&LDAPIdentityProviderList{},
|
||||||
|
&ActiveDirectoryIdentityProvider{},
|
||||||
|
&ActiveDirectoryIdentityProviderList{},
|
||||||
)
|
)
|
||||||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||||
return nil
|
return nil
|
||||||
|
182
generated/latest/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
182
generated/latest/apis/supervisor/idp/v1alpha1/types_activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderPhase string
|
||||||
|
|
||||||
|
const (
|
||||||
|
// ActiveDirectoryPhasePending is the default phase for newly-created ActiveDirectoryIdentityProvider resources.
|
||||||
|
ActiveDirectoryPhasePending ActiveDirectoryIdentityProviderPhase = "Pending"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseReady is the phase for an ActiveDirectoryIdentityProvider resource in a healthy state.
|
||||||
|
ActiveDirectoryPhaseReady ActiveDirectoryIdentityProviderPhase = "Ready"
|
||||||
|
|
||||||
|
// ActiveDirectoryPhaseError is the phase for an ActiveDirectoryIdentityProvider in an unhealthy state.
|
||||||
|
ActiveDirectoryPhaseError ActiveDirectoryIdentityProviderPhase = "Error"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Status of an Active Directory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderStatus struct {
|
||||||
|
// Phase summarizes the overall status of the ActiveDirectoryIdentityProvider.
|
||||||
|
// +kubebuilder:default=Pending
|
||||||
|
// +kubebuilder:validation:Enum=Pending;Ready;Error
|
||||||
|
Phase ActiveDirectoryIdentityProviderPhase `json:"phase,omitempty"`
|
||||||
|
|
||||||
|
// Represents the observations of an identity provider's current state.
|
||||||
|
// +patchMergeKey=type
|
||||||
|
// +patchStrategy=merge
|
||||||
|
// +listType=map
|
||||||
|
// +listMapKey=type
|
||||||
|
Conditions []Condition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderBind struct {
|
||||||
|
// SecretName contains the name of a namespace-local Secret object that provides the username and
|
||||||
|
// password for an Active Directory bind user. This account will be used to perform LDAP searches. The Secret should be
|
||||||
|
// of type "kubernetes.io/basic-auth" which includes "username" and "password" keys. The username value
|
||||||
|
// should be the full dn (distinguished name) of your bind account, e.g. "cn=bind-account,ou=users,dc=example,dc=com".
|
||||||
|
// The password must be non-empty.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
SecretName string `json:"secretName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearchAttributes struct {
|
||||||
|
// Username specifies the name of the attribute in Active Directory entry whose value shall become the username
|
||||||
|
// of the user after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "userPrincipalName".
|
||||||
|
// +optional
|
||||||
|
Username string `json:"username,omitempty"`
|
||||||
|
|
||||||
|
// UID specifies the name of the attribute in the ActiveDirectory entry which whose value shall be used to uniquely
|
||||||
|
// identify the user within this ActiveDirectory provider after a successful authentication.
|
||||||
|
// Optional, when empty this defaults to "objectGUID".
|
||||||
|
// +optional
|
||||||
|
UID string `json:"uid,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearchAttributes struct {
|
||||||
|
// GroupName specifies the name of the attribute in the Active Directory entries whose value shall become a group name
|
||||||
|
// in the user's list of groups after a successful authentication.
|
||||||
|
// The value of this field is case-sensitive and must match the case of the attribute name returned by the ActiveDirectory
|
||||||
|
// server in the user's entry. E.g. "cn" for common name. Distinguished names can be used by specifying lower-case "dn".
|
||||||
|
// Optional. When not specified, this defaults to a custom field that looks like "sAMAccountName@domain",
|
||||||
|
// where domain is constructed from the domain components of the group DN.
|
||||||
|
// +optional
|
||||||
|
GroupName string `json:"groupName,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderUserSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for users.
|
||||||
|
// E.g. "ou=users,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for users.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some users
|
||||||
|
// or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the search filter which should be applied when searching for users. The pattern "{}" must occur
|
||||||
|
// in the filter at least once and will be dynamically replaced by the username for which the search is being run.
|
||||||
|
// E.g. "mail={}" or "&(objectClass=person)(uid={})". For more information about LDAP filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will be
|
||||||
|
// '(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={}")(mail={})(userPrincipalName={})(sAMAccountType=805306368))'
|
||||||
|
// This means that the user is a person, is not a computer, the sAMAccountType is for a normal user account,
|
||||||
|
// and is not shown in advanced view only
|
||||||
|
// (which would likely mean its a system created service account with advanced permissions).
|
||||||
|
// Also, either the sAMAccountName, the userPrincipalName, or the mail attribute matches the input username.
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the user's information should be read from the ActiveDirectory entry which was found as
|
||||||
|
// the result of the user search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderUserSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderGroupSearch struct {
|
||||||
|
// Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g.
|
||||||
|
// "ou=groups,dc=example,dc=com".
|
||||||
|
// Optional, when not specified it will be based on the result of a query for the defaultNamingContext
|
||||||
|
// (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse).
|
||||||
|
// The default behavior searches your entire domain for groups.
|
||||||
|
// It may make sense to specify a subtree as a search base if you wish to exclude some groups
|
||||||
|
// for security reasons or to make searches faster.
|
||||||
|
// +optional
|
||||||
|
Base string `json:"base,omitempty"`
|
||||||
|
|
||||||
|
// Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user.
|
||||||
|
// The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the
|
||||||
|
// dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or
|
||||||
|
// "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see
|
||||||
|
// https://ldap.com/ldap-filters.
|
||||||
|
// Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used.
|
||||||
|
// Optional. When not specified, the default will act as if the filter were specified as
|
||||||
|
// "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})".
|
||||||
|
// This searches nested groups by default.
|
||||||
|
// Note that nested group search can be slow for some Active Directory servers. To disable it,
|
||||||
|
// you can set the filter to
|
||||||
|
// "(&(objectClass=group)(member={})"
|
||||||
|
// +optional
|
||||||
|
Filter string `json:"filter,omitempty"`
|
||||||
|
|
||||||
|
// Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as
|
||||||
|
// the result of the group search.
|
||||||
|
// +optional
|
||||||
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
type ActiveDirectoryIdentityProviderSpec struct {
|
||||||
|
// Host is the hostname of this Active Directory identity provider, i.e., where to connect. For example: ldap.example.com:636.
|
||||||
|
// +kubebuilder:validation:MinLength=1
|
||||||
|
Host string `json:"host"`
|
||||||
|
|
||||||
|
// TLS contains the connection settings for how to establish the connection to the Host.
|
||||||
|
TLS *TLSSpec `json:"tls,omitempty"`
|
||||||
|
|
||||||
|
// Bind contains the configuration for how to provide access credentials during an initial bind to the ActiveDirectory server
|
||||||
|
// to be allowed to perform searches and binds to validate a user's credentials during a user's authentication attempt.
|
||||||
|
Bind ActiveDirectoryIdentityProviderBind `json:"bind,omitempty"`
|
||||||
|
|
||||||
|
// UserSearch contains the configuration for searching for a user by name in Active Directory.
|
||||||
|
UserSearch ActiveDirectoryIdentityProviderUserSearch `json:"userSearch,omitempty"`
|
||||||
|
|
||||||
|
// GroupSearch contains the configuration for searching for a user's group membership in ActiveDirectory.
|
||||||
|
GroupSearch ActiveDirectoryIdentityProviderGroupSearch `json:"groupSearch,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvider describes the configuration of an upstream Microsoft Active Directory identity provider.
|
||||||
|
// +genclient
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
// +kubebuilder:resource:categories=pinniped;pinniped-idp;pinniped-idps
|
||||||
|
// +kubebuilder:printcolumn:name="Host",type=string,JSONPath=`.spec.host`
|
||||||
|
// +kubebuilder:printcolumn:name="Status",type=string,JSONPath=`.status.phase`
|
||||||
|
// +kubebuilder:printcolumn:name="Age",type=date,JSONPath=`.metadata.creationTimestamp`
|
||||||
|
// +kubebuilder:subresource:status
|
||||||
|
type ActiveDirectoryIdentityProvider struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
// Spec for configuring the identity provider.
|
||||||
|
Spec ActiveDirectoryIdentityProviderSpec `json:"spec"`
|
||||||
|
|
||||||
|
// Status of the identity provider.
|
||||||
|
Status ActiveDirectoryIdentityProviderStatus `json:"status,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// List of ActiveDirectoryIdentityProvider objects.
|
||||||
|
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
|
||||||
|
type ActiveDirectoryIdentityProviderList struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
metav1.ListMeta `json:"metadata,omitempty"`
|
||||||
|
|
||||||
|
Items []ActiveDirectoryIdentityProvider `json:"items"`
|
||||||
|
}
|
@ -1,4 +1,4 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
@ -11,6 +11,196 @@ import (
|
|||||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyInto(out *ActiveDirectoryIdentityProvider) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ObjectMeta.DeepCopyInto(&out.ObjectMeta)
|
||||||
|
in.Spec.DeepCopyInto(&out.Spec)
|
||||||
|
in.Status.DeepCopyInto(&out.Status)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProvider.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopy() *ActiveDirectoryIdentityProvider {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProvider)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProvider) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopyInto(out *ActiveDirectoryIdentityProviderBind) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderBind.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderBind) DeepCopy() *ActiveDirectoryIdentityProviderBind {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderBind)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearch) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderGroupSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderGroupSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderGroupSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderGroupSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderGroupSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyInto(out *ActiveDirectoryIdentityProviderList) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]ActiveDirectoryIdentityProvider, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderList.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopy() *ActiveDirectoryIdentityProviderList {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderList)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderList) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopyInto(out *ActiveDirectoryIdentityProviderSpec) {
|
||||||
|
*out = *in
|
||||||
|
if in.TLS != nil {
|
||||||
|
in, out := &in.TLS, &out.TLS
|
||||||
|
*out = new(TLSSpec)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
out.Bind = in.Bind
|
||||||
|
out.UserSearch = in.UserSearch
|
||||||
|
out.GroupSearch = in.GroupSearch
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderSpec.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderSpec) DeepCopy() *ActiveDirectoryIdentityProviderSpec {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderSpec)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopyInto(out *ActiveDirectoryIdentityProviderStatus) {
|
||||||
|
*out = *in
|
||||||
|
if in.Conditions != nil {
|
||||||
|
in, out := &in.Conditions, &out.Conditions
|
||||||
|
*out = make([]Condition, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderStatus.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderStatus) DeepCopy() *ActiveDirectoryIdentityProviderStatus {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderStatus)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearch) {
|
||||||
|
*out = *in
|
||||||
|
out.Attributes = in.Attributes
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearch.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearch) DeepCopy() *ActiveDirectoryIdentityProviderUserSearch {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearch)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopyInto(out *ActiveDirectoryIdentityProviderUserSearchAttributes) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryIdentityProviderUserSearchAttributes.
|
||||||
|
func (in *ActiveDirectoryIdentityProviderUserSearchAttributes) DeepCopy() *ActiveDirectoryIdentityProviderUserSearchAttributes {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ActiveDirectoryIdentityProviderUserSearchAttributes)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in *Condition) DeepCopyInto(out *Condition) {
|
func (in *Condition) DeepCopyInto(out *Condition) {
|
||||||
*out = *in
|
*out = *in
|
||||||
|
@ -14,6 +14,7 @@ type IDPFlow string
|
|||||||
const (
|
const (
|
||||||
IDPTypeOIDC IDPType = "oidc"
|
IDPTypeOIDC IDPType = "oidc"
|
||||||
IDPTypeLDAP IDPType = "ldap"
|
IDPTypeLDAP IDPType = "ldap"
|
||||||
|
IDPTypeActiveDirectory IDPType = "activedirectory"
|
||||||
|
|
||||||
IDPFlowCLIPassword IDPFlow = "cli_password"
|
IDPFlowCLIPassword IDPFlow = "cli_password"
|
||||||
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
IDPFlowBrowserAuthcode IDPFlow = "browser_authcode"
|
||||||
|
@ -0,0 +1,182 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/latest/apis/supervisor/idp/v1alpha1"
|
||||||
|
scheme "go.pinniped.dev/generated/latest/client/supervisor/clientset/versioned/scheme"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProvidersGetter has a method to return a ActiveDirectoryIdentityProviderInterface.
|
||||||
|
// A group's client should implement this interface.
|
||||||
|
type ActiveDirectoryIdentityProvidersGetter interface {
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInterface has methods to work with ActiveDirectoryIdentityProvider resources.
|
||||||
|
type ActiveDirectoryIdentityProviderInterface interface {
|
||||||
|
Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
Delete(ctx context.Context, name string, opts v1.DeleteOptions) error
|
||||||
|
DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error
|
||||||
|
Get(ctx context.Context, name string, opts v1.GetOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
List(ctx context.Context, opts v1.ListOptions) (*v1alpha1.ActiveDirectoryIdentityProviderList, error)
|
||||||
|
Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error)
|
||||||
|
Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
ActiveDirectoryIdentityProviderExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type activeDirectoryIdentityProviders struct {
|
||||||
|
client rest.Interface
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
// newActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviders
|
||||||
|
func newActiveDirectoryIdentityProviders(c *IDPV1alpha1Client, namespace string) *activeDirectoryIdentityProviders {
|
||||||
|
return &activeDirectoryIdentityProviders{
|
||||||
|
client: c.RESTClient(),
|
||||||
|
ns: namespace,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
VersionedParams(&options, scheme.ParameterCodec).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *activeDirectoryIdentityProviders) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProviderList{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
opts.Watch = true
|
||||||
|
return c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Watch(ctx)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Post().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *activeDirectoryIdentityProviders) UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(activeDirectoryIdentityProvider.Name).
|
||||||
|
SubResource("status").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(activeDirectoryIdentityProvider).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *activeDirectoryIdentityProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
var timeout time.Duration
|
||||||
|
if listOpts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
VersionedParams(&listOpts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *activeDirectoryIdentityProviders) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
result = &v1alpha1.ActiveDirectoryIdentityProvider{}
|
||||||
|
err = c.client.Patch(pt).
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("activedirectoryidentityproviders").
|
||||||
|
Name(name).
|
||||||
|
SubResource(subresources...).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(data).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
@ -0,0 +1,129 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/latest/apis/supervisor/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
labels "k8s.io/apimachinery/pkg/labels"
|
||||||
|
schema "k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FakeActiveDirectoryIdentityProviders implements ActiveDirectoryIdentityProviderInterface
|
||||||
|
type FakeActiveDirectoryIdentityProviders struct {
|
||||||
|
Fake *FakeIDPV1alpha1
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersResource = schema.GroupVersionResource{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Resource: "activedirectoryidentityproviders"}
|
||||||
|
|
||||||
|
var activedirectoryidentityprovidersKind = schema.GroupVersionKind{Group: "idp.supervisor.pinniped.dev", Version: "v1alpha1", Kind: "ActiveDirectoryIdentityProvider"}
|
||||||
|
|
||||||
|
// Get takes name of the activeDirectoryIdentityProvider, and returns the corresponding activeDirectoryIdentityProvider object, and an error if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewGetAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ActiveDirectoryIdentityProviders that match those selectors.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ActiveDirectoryIdentityProviderList, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewListAction(activedirectoryidentityprovidersResource, activedirectoryidentityprovidersKind, c.ns, opts), &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
label, _, _ := testing.ExtractFromListOptions(opts)
|
||||||
|
if label == nil {
|
||||||
|
label = labels.Everything()
|
||||||
|
}
|
||||||
|
list := &v1alpha1.ActiveDirectoryIdentityProviderList{ListMeta: obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).ListMeta}
|
||||||
|
for _, item := range obj.(*v1alpha1.ActiveDirectoryIdentityProviderList).Items {
|
||||||
|
if label.Matches(labels.Set(item.Labels)) {
|
||||||
|
list.Items = append(list.Items, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested activeDirectoryIdentityProviders.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return c.Fake.
|
||||||
|
InvokesWatch(testing.NewWatchAction(activedirectoryidentityprovidersResource, c.ns, opts))
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a activeDirectoryIdentityProvider and creates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Create(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.CreateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewCreateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a activeDirectoryIdentityProvider and updates it. Returns the server's representation of the activeDirectoryIdentityProvider, and an error, if there is any.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Update(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateAction(activedirectoryidentityprovidersResource, c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateStatus was generated because the type contains a Status member.
|
||||||
|
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) UpdateStatus(ctx context.Context, activeDirectoryIdentityProvider *v1alpha1.ActiveDirectoryIdentityProvider, opts v1.UpdateOptions) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateSubresourceAction(activedirectoryidentityprovidersResource, "status", c.ns, activeDirectoryIdentityProvider), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the activeDirectoryIdentityProvider and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
_, err := c.Fake.
|
||||||
|
Invokes(testing.NewDeleteAction(activedirectoryidentityprovidersResource, c.ns, name), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
action := testing.NewDeleteCollectionAction(activedirectoryidentityprovidersResource, c.ns, listOpts)
|
||||||
|
|
||||||
|
_, err := c.Fake.Invokes(action, &v1alpha1.ActiveDirectoryIdentityProviderList{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched activeDirectoryIdentityProvider.
|
||||||
|
func (c *FakeActiveDirectoryIdentityProviders) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewPatchSubresourceAction(activedirectoryidentityprovidersResource, c.ns, name, pt, data, subresources...), &v1alpha1.ActiveDirectoryIdentityProvider{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), err
|
||||||
|
}
|
@ -15,6 +15,10 @@ type FakeIDPV1alpha1 struct {
|
|||||||
*testing.Fake
|
*testing.Fake
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *FakeIDPV1alpha1) ActiveDirectoryIdentityProviders(namespace string) v1alpha1.ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return &FakeActiveDirectoryIdentityProviders{c, namespace}
|
||||||
|
}
|
||||||
|
|
||||||
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
func (c *FakeIDPV1alpha1) LDAPIdentityProviders(namespace string) v1alpha1.LDAPIdentityProviderInterface {
|
||||||
return &FakeLDAPIdentityProviders{c, namespace}
|
return &FakeLDAPIdentityProviders{c, namespace}
|
||||||
}
|
}
|
||||||
|
@ -5,6 +5,8 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
type ActiveDirectoryIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type LDAPIdentityProviderExpansion interface{}
|
type LDAPIdentityProviderExpansion interface{}
|
||||||
|
|
||||||
type OIDCIdentityProviderExpansion interface{}
|
type OIDCIdentityProviderExpansion interface{}
|
||||||
|
@ -13,6 +13,7 @@ import (
|
|||||||
|
|
||||||
type IDPV1alpha1Interface interface {
|
type IDPV1alpha1Interface interface {
|
||||||
RESTClient() rest.Interface
|
RESTClient() rest.Interface
|
||||||
|
ActiveDirectoryIdentityProvidersGetter
|
||||||
LDAPIdentityProvidersGetter
|
LDAPIdentityProvidersGetter
|
||||||
OIDCIdentityProvidersGetter
|
OIDCIdentityProvidersGetter
|
||||||
}
|
}
|
||||||
@ -22,6 +23,10 @@ type IDPV1alpha1Client struct {
|
|||||||
restClient rest.Interface
|
restClient rest.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *IDPV1alpha1Client) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderInterface {
|
||||||
|
return newActiveDirectoryIdentityProviders(c, namespace)
|
||||||
|
}
|
||||||
|
|
||||||
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
func (c *IDPV1alpha1Client) LDAPIdentityProviders(namespace string) LDAPIdentityProviderInterface {
|
||||||
return newLDAPIdentityProviders(c, namespace)
|
return newLDAPIdentityProviders(c, namespace)
|
||||||
}
|
}
|
||||||
|
@ -45,6 +45,8 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Config().V1alpha1().FederationDomains().Informer()}, nil
|
||||||
|
|
||||||
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
// Group=idp.supervisor.pinniped.dev, Version=v1alpha1
|
||||||
|
case idpv1alpha1.SchemeGroupVersion.WithResource("activedirectoryidentityproviders"):
|
||||||
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().ActiveDirectoryIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("ldapidentityproviders"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.IDP().V1alpha1().LDAPIdentityProviders().Informer()}, nil
|
||||||
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
case idpv1alpha1.SchemeGroupVersion.WithResource("oidcidentityproviders"):
|
||||||
|
@ -0,0 +1,77 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by informer-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
time "time"
|
||||||
|
|
||||||
|
idpv1alpha1 "go.pinniped.dev/generated/latest/apis/supervisor/idp/v1alpha1"
|
||||||
|
versioned "go.pinniped.dev/generated/latest/client/supervisor/clientset/versioned"
|
||||||
|
internalinterfaces "go.pinniped.dev/generated/latest/client/supervisor/informers/externalversions/internalinterfaces"
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/latest/client/supervisor/listers/idp/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
cache "k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderInformer provides access to a shared informer and lister for
|
||||||
|
// ActiveDirectoryIdentityProviders.
|
||||||
|
type ActiveDirectoryIdentityProviderInformer interface {
|
||||||
|
Informer() cache.SharedIndexInformer
|
||||||
|
Lister() v1alpha1.ActiveDirectoryIdentityProviderLister
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryIdentityProviderInformer struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
tweakListOptions internalinterfaces.TweakListOptionsFunc
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, namespace, resyncPeriod, indexers, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewFilteredActiveDirectoryIdentityProviderInformer constructs a new informer for ActiveDirectoryIdentityProvider type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewFilteredActiveDirectoryIdentityProviderInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer {
|
||||||
|
return cache.NewSharedIndexInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).List(context.TODO(), options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.IDPV1alpha1().ActiveDirectoryIdentityProviders(namespace).Watch(context.TODO(), options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&idpv1alpha1.ActiveDirectoryIdentityProvider{},
|
||||||
|
resyncPeriod,
|
||||||
|
indexers,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredActiveDirectoryIdentityProviderInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Informer() cache.SharedIndexInformer {
|
||||||
|
return f.factory.InformerFor(&idpv1alpha1.ActiveDirectoryIdentityProvider{}, f.defaultInformer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *activeDirectoryIdentityProviderInformer) Lister() v1alpha1.ActiveDirectoryIdentityProviderLister {
|
||||||
|
return v1alpha1.NewActiveDirectoryIdentityProviderLister(f.Informer().GetIndexer())
|
||||||
|
}
|
@ -11,6 +11,8 @@ import (
|
|||||||
|
|
||||||
// Interface provides access to all the informers in this group version.
|
// Interface provides access to all the informers in this group version.
|
||||||
type Interface interface {
|
type Interface interface {
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
LDAPIdentityProviders() LDAPIdentityProviderInformer
|
||||||
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
// OIDCIdentityProviders returns a OIDCIdentityProviderInformer.
|
||||||
@ -28,6 +30,11 @@ func New(f internalinterfaces.SharedInformerFactory, namespace string, tweakList
|
|||||||
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns a ActiveDirectoryIdentityProviderInformer.
|
||||||
|
func (v *version) ActiveDirectoryIdentityProviders() ActiveDirectoryIdentityProviderInformer {
|
||||||
|
return &activeDirectoryIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
}
|
||||||
|
|
||||||
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
// LDAPIdentityProviders returns a LDAPIdentityProviderInformer.
|
||||||
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
func (v *version) LDAPIdentityProviders() LDAPIdentityProviderInformer {
|
||||||
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
return &lDAPIdentityProviderInformer{factory: v.factory, namespace: v.namespace, tweakListOptions: v.tweakListOptions}
|
||||||
|
86
generated/latest/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
86
generated/latest/client/supervisor/listers/idp/v1alpha1/activedirectoryidentityprovider.go
generated
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Code generated by lister-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1alpha1 "go.pinniped.dev/generated/latest/apis/supervisor/idp/v1alpha1"
|
||||||
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
|
"k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderLister helps list ActiveDirectoryIdentityProviders.
|
||||||
|
// All objects returned here must be treated as read-only.
|
||||||
|
type ActiveDirectoryIdentityProviderLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
ActiveDirectoryIdentityProviderListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderLister implements the ActiveDirectoryIdentityProviderLister interface.
|
||||||
|
type activeDirectoryIdentityProviderLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewActiveDirectoryIdentityProviderLister returns a new ActiveDirectoryIdentityProviderLister.
|
||||||
|
func NewActiveDirectoryIdentityProviderLister(indexer cache.Indexer) ActiveDirectoryIdentityProviderLister {
|
||||||
|
return &activeDirectoryIdentityProviderLister{indexer: indexer}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviders returns an object that can list and get ActiveDirectoryIdentityProviders.
|
||||||
|
func (s *activeDirectoryIdentityProviderLister) ActiveDirectoryIdentityProviders(namespace string) ActiveDirectoryIdentityProviderNamespaceLister {
|
||||||
|
return activeDirectoryIdentityProviderNamespaceLister{indexer: s.indexer, namespace: namespace}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister helps list and get ActiveDirectoryIdentityProviders.
|
||||||
|
// All objects returned here must be treated as read-only.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceLister interface {
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error)
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error)
|
||||||
|
ActiveDirectoryIdentityProviderNamespaceListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// activeDirectoryIdentityProviderNamespaceLister implements the ActiveDirectoryIdentityProviderNamespaceLister
|
||||||
|
// interface.
|
||||||
|
type activeDirectoryIdentityProviderNamespaceLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ActiveDirectoryIdentityProviders in the indexer for a given namespace.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) List(selector labels.Selector) (ret []*v1alpha1.ActiveDirectoryIdentityProvider, err error) {
|
||||||
|
err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ActiveDirectoryIdentityProvider))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get retrieves the ActiveDirectoryIdentityProvider from the indexer for a given namespace and name.
|
||||||
|
func (s activeDirectoryIdentityProviderNamespaceLister) Get(name string) (*v1alpha1.ActiveDirectoryIdentityProvider, error) {
|
||||||
|
obj, exists, err := s.indexer.GetByKey(s.namespace + "/" + name)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
return nil, errors.NewNotFound(v1alpha1.Resource("activedirectoryidentityprovider"), name)
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ActiveDirectoryIdentityProvider), nil
|
||||||
|
}
|
@ -5,6 +5,14 @@
|
|||||||
|
|
||||||
package v1alpha1
|
package v1alpha1
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderLister.
|
||||||
|
type ActiveDirectoryIdentityProviderListerExpansion interface{}
|
||||||
|
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceListerExpansion allows custom methods to be added to
|
||||||
|
// ActiveDirectoryIdentityProviderNamespaceLister.
|
||||||
|
type ActiveDirectoryIdentityProviderNamespaceListerExpansion interface{}
|
||||||
|
|
||||||
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
// LDAPIdentityProviderListerExpansion allows custom methods to be added to
|
||||||
// LDAPIdentityProviderLister.
|
// LDAPIdentityProviderLister.
|
||||||
type LDAPIdentityProviderListerExpansion interface{}
|
type LDAPIdentityProviderListerExpansion interface{}
|
||||||
|
1
go.mod
1
go.mod
@ -14,6 +14,7 @@ require (
|
|||||||
github.com/golang/mock v1.6.0
|
github.com/golang/mock v1.6.0
|
||||||
github.com/google/go-cmp v0.5.6
|
github.com/google/go-cmp v0.5.6
|
||||||
github.com/google/gofuzz v1.2.0
|
github.com/google/gofuzz v1.2.0
|
||||||
|
github.com/google/uuid v1.1.2
|
||||||
github.com/gorilla/securecookie v1.1.1
|
github.com/gorilla/securecookie v1.1.1
|
||||||
github.com/gorilla/websocket v1.4.2
|
github.com/gorilla/websocket v1.4.2
|
||||||
github.com/ory/fosite v0.40.2
|
github.com/ory/fosite v0.40.2
|
||||||
|
@ -50,6 +50,7 @@ skip_build=no
|
|||||||
clean_kind=no
|
clean_kind=no
|
||||||
api_group_suffix="pinniped.dev" # same default as in the values.yaml ytt file
|
api_group_suffix="pinniped.dev" # same default as in the values.yaml ytt file
|
||||||
skip_chromedriver_check=no
|
skip_chromedriver_check=no
|
||||||
|
get_active_directory_vars="" # specify a filename for a script to get AD related env variables
|
||||||
|
|
||||||
while (("$#")); do
|
while (("$#")); do
|
||||||
case "$1" in
|
case "$1" in
|
||||||
@ -79,6 +80,16 @@ while (("$#")); do
|
|||||||
skip_chromedriver_check=yes
|
skip_chromedriver_check=yes
|
||||||
shift
|
shift
|
||||||
;;
|
;;
|
||||||
|
--get-active-directory-vars)
|
||||||
|
shift
|
||||||
|
# If there are no more command line arguments, or there is another command line argument but it starts with a dash, then error
|
||||||
|
if [[ "$#" == "0" || "$1" == -* ]]; then
|
||||||
|
log_error "--get-active-directory-vars requires a script name to be specified"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
get_active_directory_vars=$1
|
||||||
|
shift
|
||||||
|
;;
|
||||||
-*)
|
-*)
|
||||||
log_error "Unsupported flag $1" >&2
|
log_error "Unsupported flag $1" >&2
|
||||||
exit 1
|
exit 1
|
||||||
@ -100,6 +111,7 @@ if [[ "$help" == "yes" ]]; then
|
|||||||
log_note " -c, --clean: destroy the current kind cluster and make a new one"
|
log_note " -c, --clean: destroy the current kind cluster and make a new one"
|
||||||
log_note " -g, --api-group-suffix: deploy Pinniped with an alternate API group suffix"
|
log_note " -g, --api-group-suffix: deploy Pinniped with an alternate API group suffix"
|
||||||
log_note " -s, --skip-build: reuse the most recently built image of the app instead of building"
|
log_note " -s, --skip-build: reuse the most recently built image of the app instead of building"
|
||||||
|
log_note " --get-active-directory-vars: specify a script that exports active directory environment variables"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -371,6 +383,15 @@ export PINNIPED_TEST_API_GROUP_SUFFIX='${api_group_suffix}'
|
|||||||
# PINNIPED_TEST_SHELL_CONTAINER_IMAGE should be a container which includes bash and sleep, used by some tests.
|
# PINNIPED_TEST_SHELL_CONTAINER_IMAGE should be a container which includes bash and sleep, used by some tests.
|
||||||
export PINNIPED_TEST_SHELL_CONTAINER_IMAGE="ghcr.io/pinniped-ci-bot/test-kubectl:latest"
|
export PINNIPED_TEST_SHELL_CONTAINER_IMAGE="ghcr.io/pinniped-ci-bot/test-kubectl:latest"
|
||||||
|
|
||||||
|
# We can't set up an in-cluster active directory instance, but
|
||||||
|
# if you have an active directory instance that you wish to run the tests against,
|
||||||
|
# specify a script to set the ad-related environment variables.
|
||||||
|
# You will need to set the environment variables that start with "PINNIPED_TEST_AD_"
|
||||||
|
# found in pinniped/test/testlib/env.go.
|
||||||
|
if [[ "$get_active_directory_vars" != "" ]]; then
|
||||||
|
source $get_active_directory_vars
|
||||||
|
fi
|
||||||
|
|
||||||
read -r -d '' PINNIPED_TEST_CLUSTER_CAPABILITY_YAML << PINNIPED_TEST_CLUSTER_CAPABILITY_YAML_EOF || true
|
read -r -d '' PINNIPED_TEST_CLUSTER_CAPABILITY_YAML << PINNIPED_TEST_CLUSTER_CAPABILITY_YAML_EOF || true
|
||||||
${pinniped_cluster_capability_file_content}
|
${pinniped_cluster_capability_file_content}
|
||||||
PINNIPED_TEST_CLUSTER_CAPABILITY_YAML_EOF
|
PINNIPED_TEST_CLUSTER_CAPABILITY_YAML_EOF
|
||||||
|
@ -0,0 +1,354 @@
|
|||||||
|
// Copyright 2021 the Pinniped contributors. All Rights Reserved.
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
|
// Package activedirectoryupstreamwatcher implements a controller which watches ActiveDirectoryIdentityProviders.
|
||||||
|
package activedirectoryupstreamwatcher
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/go-ldap/ldap/v3"
|
||||||
|
|
||||||
|
"k8s.io/apimachinery/pkg/api/equality"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
|
corev1informers "k8s.io/client-go/informers/core/v1"
|
||||||
|
"k8s.io/klog/v2/klogr"
|
||||||
|
|
||||||
|
"go.pinniped.dev/generated/latest/apis/supervisor/idp/v1alpha1"
|
||||||
|
pinnipedclientset "go.pinniped.dev/generated/latest/client/supervisor/clientset/versioned"
|
||||||
|
idpinformers "go.pinniped.dev/generated/latest/client/supervisor/informers/externalversions/idp/v1alpha1"
|
||||||
|
pinnipedcontroller "go.pinniped.dev/internal/controller"
|
||||||
|
"go.pinniped.dev/internal/controller/conditionsutil"
|
||||||
|
"go.pinniped.dev/internal/controller/supervisorconfig/upstreamwatchers"
|
||||||
|
"go.pinniped.dev/internal/controllerlib"
|
||||||
|
"go.pinniped.dev/internal/oidc/provider"
|
||||||
|
"go.pinniped.dev/internal/upstreamldap"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
activeDirectoryControllerName = "active-directory-upstream-observer"
|
||||||
|
|
||||||
|
// Default values for active directory config.
|
||||||
|
defaultActiveDirectoryUsernameAttributeName = "userPrincipalName"
|
||||||
|
defaultActiveDirectoryUIDAttributeName = "objectGUID"
|
||||||
|
|
||||||
|
// By default this group name attribute is the sAMAccountName with special mapping.
|
||||||
|
// Each group will look like sAMAccountName + "@" + domain.
|
||||||
|
// For example if your group sAMAccountName is "mammals" and your domain is
|
||||||
|
// "activedirectory.example.com", it would be mammals@activedirectory.example.com.
|
||||||
|
// This is because sAMAccountName is only unique within a domain, not a forest.
|
||||||
|
defaultActiveDirectoryGroupNameAttributeName = "sAMAccountName"
|
||||||
|
|
||||||
|
// - is a person.
|
||||||
|
// - is not a computer.
|
||||||
|
// - is not shown in advanced view only (which would likely mean its a system created service account with advanced permissions).
|
||||||
|
// - either the sAMAccountName, the userPrincipalName or the mail attribute matches the input username.
|
||||||
|
// - the sAMAccountType is for a normal user account.
|
||||||
|
defaultActiveDirectoryUserSearchFilter = "(&(objectClass=person)(!(objectClass=computer))(!(showInAdvancedViewOnly=TRUE))(|(sAMAccountName={})(mail={})(userPrincipalName={}))(sAMAccountType=805306368))"
|
||||||
|
|
||||||
|
// - is a group.
|
||||||
|
// - has a member that matches the DN of the user we successfully logged in as.
|
||||||
|
// - perform nested group search by default.
|
||||||
|
defaultActiveDirectoryGroupSearchFilter = "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={}))"
|
||||||
|
)
|
||||||
|
|
||||||
|
type activeDirectoryUpstreamGenericLDAPImpl struct {
|
||||||
|
activeDirectoryIdentityProvider v1alpha1.ActiveDirectoryIdentityProvider
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *activeDirectoryUpstreamGenericLDAPImpl) Spec() upstreamwatchers.UpstreamGenericLDAPSpec {
|
||||||
|
return &activeDirectoryUpstreamGenericLDAPSpec{g.activeDirectoryIdentityProvider}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *activeDirectoryUpstreamGenericLDAPImpl) Namespace() string {
|
||||||
|
return g.activeDirectoryIdentityProvider.Namespace
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *activeDirectoryUpstreamGenericLDAPImpl) Name() string {
|
||||||
|
return g.activeDirectoryIdentityProvider.Name
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *activeDirectoryUpstreamGenericLDAPImpl) Generation() int64 {
|
||||||
|
return g.activeDirectoryIdentityProvider.Generation
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *activeDirectoryUpstreamGenericLDAPImpl) Status() upstreamwatchers.UpstreamGenericLDAPStatus {
|
||||||
|
return &activeDirectoryUpstreamGenericLDAPStatus{g.activeDirectoryIdentityProvider}
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryUpstreamGenericLDAPSpec struct {
|
||||||
|
activeDirectoryIdentityProvider v1alpha1.ActiveDirectoryIdentityProvider
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *activeDirectoryUpstreamGenericLDAPSpec) Host() string {
|
||||||
|
return s.activeDirectoryIdentityProvider.Spec.Host
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *activeDirectoryUpstreamGenericLDAPSpec) TLSSpec() *v1alpha1.TLSSpec {
|
||||||
|
return s.activeDirectoryIdentityProvider.Spec.TLS
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *activeDirectoryUpstreamGenericLDAPSpec) BindSecretName() string {
|
||||||
|
return s.activeDirectoryIdentityProvider.Spec.Bind.SecretName
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *activeDirectoryUpstreamGenericLDAPSpec) UserSearch() upstreamwatchers.UpstreamGenericLDAPUserSearch {
|
||||||
|
return &activeDirectoryUpstreamGenericLDAPUserSearch{s.activeDirectoryIdentityProvider.Spec.UserSearch}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *activeDirectoryUpstreamGenericLDAPSpec) GroupSearch() upstreamwatchers.UpstreamGenericLDAPGroupSearch {
|
||||||
|
return &activeDirectoryUpstreamGenericLDAPGroupSearch{s.activeDirectoryIdentityProvider.Spec.GroupSearch}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *activeDirectoryUpstreamGenericLDAPSpec) DetectAndSetSearchBase(ctx context.Context, config *upstreamldap.ProviderConfig) *v1alpha1.Condition {
|
||||||
|
config.GroupSearch.Base = s.activeDirectoryIdentityProvider.Spec.GroupSearch.Base
|
||||||
|
config.UserSearch.Base = s.activeDirectoryIdentityProvider.Spec.UserSearch.Base
|
||||||
|
if config.GroupSearch.Base != "" && config.UserSearch.Base != "" {
|
||||||
|
// Both were already set in spec so just return; no need to query the RootDSE
|
||||||
|
return &v1alpha1.Condition{
|
||||||
|
Type: upstreamwatchers.TypeSearchBaseFound,
|
||||||
|
Status: v1alpha1.ConditionTrue,
|
||||||
|
Reason: upstreamwatchers.ReasonUsingConfigurationFromSpec,
|
||||||
|
Message: "Using search base from ActiveDirectoryIdentityProvider config.",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ldapProvider := upstreamldap.New(*config)
|
||||||
|
// Query your AD server for the defaultNamingContext to get a DN to use as the search base
|
||||||
|
// when it isn't specified.
|
||||||
|
// https://ldapwiki.com/wiki/DefaultNamingContext
|
||||||
|
defaultNamingContext, err := ldapProvider.SearchForDefaultNamingContext(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return &v1alpha1.Condition{
|
||||||
|
Type: upstreamwatchers.TypeSearchBaseFound,
|
||||||
|
Status: v1alpha1.ConditionFalse,
|
||||||
|
Reason: upstreamwatchers.ReasonErrorFetchingSearchBase,
|
||||||
|
Message: fmt.Sprintf(`Error finding search base: %s`, err.Error()),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if config.UserSearch.Base == "" {
|
||||||
|
config.UserSearch.Base = defaultNamingContext
|
||||||
|
}
|
||||||
|
if config.GroupSearch.Base == "" {
|
||||||
|
config.GroupSearch.Base = defaultNamingContext
|
||||||
|
}
|
||||||
|
return &v1alpha1.Condition{
|
||||||
|
Type: upstreamwatchers.TypeSearchBaseFound,
|
||||||
|
Status: v1alpha1.ConditionTrue,
|
||||||
|
Reason: upstreamwatchers.ReasonSuccess,
|
||||||
|
Message: "Successfully fetched defaultNamingContext to use as default search base from RootDSE.",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryUpstreamGenericLDAPUserSearch struct {
|
||||||
|
userSearch v1alpha1.ActiveDirectoryIdentityProviderUserSearch
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *activeDirectoryUpstreamGenericLDAPUserSearch) Base() string {
|
||||||
|
return u.userSearch.Base
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *activeDirectoryUpstreamGenericLDAPUserSearch) Filter() string {
|
||||||
|
if len(u.userSearch.Filter) == 0 {
|
||||||
|
return defaultActiveDirectoryUserSearchFilter
|
||||||
|
}
|
||||||
|
return u.userSearch.Filter
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *activeDirectoryUpstreamGenericLDAPUserSearch) UsernameAttribute() string {
|
||||||
|
if len(u.userSearch.Attributes.Username) == 0 {
|
||||||
|
return defaultActiveDirectoryUsernameAttributeName
|
||||||
|
}
|
||||||
|
return u.userSearch.Attributes.Username
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *activeDirectoryUpstreamGenericLDAPUserSearch) UIDAttribute() string {
|
||||||
|
if len(u.userSearch.Attributes.UID) == 0 {
|
||||||
|
return defaultActiveDirectoryUIDAttributeName
|
||||||
|
}
|
||||||
|
return u.userSearch.Attributes.UID
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryUpstreamGenericLDAPGroupSearch struct {
|
||||||
|
groupSearch v1alpha1.ActiveDirectoryIdentityProviderGroupSearch
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *activeDirectoryUpstreamGenericLDAPGroupSearch) Base() string {
|
||||||
|
return g.groupSearch.Base
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *activeDirectoryUpstreamGenericLDAPGroupSearch) Filter() string {
|
||||||
|
if len(g.groupSearch.Filter) == 0 {
|
||||||
|
return defaultActiveDirectoryGroupSearchFilter
|
||||||
|
}
|
||||||
|
return g.groupSearch.Filter
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *activeDirectoryUpstreamGenericLDAPGroupSearch) GroupNameAttribute() string {
|
||||||
|
if len(g.groupSearch.Attributes.GroupName) == 0 {
|
||||||
|
return defaultActiveDirectoryGroupNameAttributeName
|
||||||
|
}
|
||||||
|
return g.groupSearch.Attributes.GroupName
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryUpstreamGenericLDAPStatus struct {
|
||||||
|
activeDirectoryIdentityProvider v1alpha1.ActiveDirectoryIdentityProvider
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *activeDirectoryUpstreamGenericLDAPStatus) Conditions() []v1alpha1.Condition {
|
||||||
|
return s.activeDirectoryIdentityProvider.Status.Conditions
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpstreamActiveDirectoryIdentityProviderICache is a thread safe cache that holds a list of validated upstream LDAP IDP configurations.
|
||||||
|
type UpstreamActiveDirectoryIdentityProviderICache interface {
|
||||||
|
SetActiveDirectoryIdentityProviders([]provider.UpstreamLDAPIdentityProviderI)
|
||||||
|
}
|
||||||
|
|
||||||
|
type activeDirectoryWatcherController struct {
|
||||||
|
cache UpstreamActiveDirectoryIdentityProviderICache
|
||||||
|
validatedSecretVersionsCache *upstreamwatchers.SecretVersionCache
|
||||||
|
ldapDialer upstreamldap.LDAPDialer
|
||||||
|
client pinnipedclientset.Interface
|
||||||
|
activeDirectoryIdentityProviderInformer idpinformers.ActiveDirectoryIdentityProviderInformer
|
||||||
|
secretInformer corev1informers.SecretInformer
|
||||||
|
}
|
||||||
|
|
||||||
|
// New instantiates a new controllerlib.Controller which will populate the provided UpstreamActiveDirectoryIdentityProviderICache.
|
||||||
|
func New(
|
||||||
|
idpCache UpstreamActiveDirectoryIdentityProviderICache,
|
||||||
|
client pinnipedclientset.Interface,
|
||||||
|
activeDirectoryIdentityProviderInformer idpinformers.ActiveDirectoryIdentityProviderInformer,
|
||||||
|
secretInformer corev1informers.SecretInformer,
|
||||||
|
withInformer pinnipedcontroller.WithInformerOptionFunc,
|
||||||
|
) controllerlib.Controller {
|
||||||
|
return newInternal(
|
||||||
|
idpCache,
|
||||||
|
// start with an empty secretVersionCache
|
||||||
|
upstreamwatchers.NewSecretVersionCache(),
|
||||||
|
// nil means to use a real production dialer when creating objects to add to the cache
|
||||||
|
nil,
|
||||||
|
client,
|
||||||
|
activeDirectoryIdentityProviderInformer,
|
||||||
|
secretInformer,
|
||||||
|
withInformer,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// For test dependency injection purposes.
|
||||||
|
func newInternal(
|
||||||
|
idpCache UpstreamActiveDirectoryIdentityProviderICache,
|
||||||
|
validatedSecretVersionsCache *upstreamwatchers.SecretVersionCache,
|
||||||
|
ldapDialer upstreamldap.LDAPDialer,
|
||||||
|
client pinnipedclientset.Interface,
|
||||||
|
activeDirectoryIdentityProviderInformer idpinformers.ActiveDirectoryIdentityProviderInformer,
|
||||||
|
secretInformer corev1informers.SecretInformer,
|
||||||
|
withInformer pinnipedcontroller.WithInformerOptionFunc,
|
||||||
|
) controllerlib.Controller {
|
||||||
|
c := activeDirectoryWatcherController{
|
||||||
|
cache: idpCache,
|
||||||
|
validatedSecretVersionsCache: validatedSecretVersionsCache,
|
||||||
|
ldapDialer: ldapDialer,
|
||||||
|
client: client,
|
||||||
|
activeDirectoryIdentityProviderInformer: activeDirectoryIdentityProviderInformer,
|
||||||
|
secretInformer: secretInformer,
|
||||||
|
}
|
||||||
|
return controllerlib.New(
|
||||||
|
controllerlib.Config{Name: activeDirectoryControllerName, Syncer: &c},
|
||||||
|
withInformer(
|
||||||
|
activeDirectoryIdentityProviderInformer,
|
||||||
|
pinnipedcontroller.MatchAnythingFilter(pinnipedcontroller.SingletonQueue()),
|
||||||
|
controllerlib.InformerOption{},
|
||||||
|
),
|
||||||
|
withInformer(
|
||||||
|
secretInformer,
|
||||||
|
pinnipedcontroller.MatchAnySecretOfTypeFilter(upstreamwatchers.LDAPBindAccountSecretType, pinnipedcontroller.SingletonQueue()),
|
||||||
|
controllerlib.InformerOption{},
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Sync implements controllerlib.Syncer.
|
||||||
|
func (c *activeDirectoryWatcherController) Sync(ctx controllerlib.Context) error {
|
||||||
|
actualUpstreams, err := c.activeDirectoryIdentityProviderInformer.Lister().List(labels.Everything())
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to list ActiveDirectoryIdentityProviders: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
requeue := false
|
||||||
|
validatedUpstreams := make([]provider.UpstreamLDAPIdentityProviderI, 0, len(actualUpstreams))
|
||||||
|
for _, upstream := range actualUpstreams {
|
||||||
|
valid, requestedRequeue := c.validateUpstream(ctx.Context, upstream)
|
||||||
|
if valid != nil {
|
||||||
|
validatedUpstreams = append(validatedUpstreams, valid)
|
||||||
|
}
|
||||||
|
if requestedRequeue {
|
||||||
|
requeue = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
c.cache.SetActiveDirectoryIdentityProviders(validatedUpstreams)
|
||||||
|
|
||||||
|
if requeue {
|
||||||
|
return controllerlib.ErrSyntheticRequeue
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *activeDirectoryWatcherController) validateUpstream(ctx context.Context, upstream *v1alpha1.ActiveDirectoryIdentityProvider) (p provider.UpstreamLDAPIdentityProviderI, requeue bool) {
|
||||||
|
spec := upstream.Spec
|
||||||
|
|
||||||
|
adUpstreamImpl := &activeDirectoryUpstreamGenericLDAPImpl{activeDirectoryIdentityProvider: *upstream}
|
||||||
|
|
||||||
|
config := &upstreamldap.ProviderConfig{
|
||||||
|
Name: upstream.Name,
|
||||||
|
Host: spec.Host,
|
||||||
|
UserSearch: upstreamldap.UserSearchConfig{
|
||||||
|
Base: spec.UserSearch.Base,
|
||||||
|
Filter: adUpstreamImpl.Spec().UserSearch().Filter(),
|
||||||
|
UsernameAttribute: adUpstreamImpl.Spec().UserSearch().UsernameAttribute(),
|
||||||
|
UIDAttribute: adUpstreamImpl.Spec().UserSearch().UIDAttribute(),
|
||||||
|
},
|
||||||
|
GroupSearch: upstreamldap.GroupSearchConfig{
|
||||||
|
Base: spec.GroupSearch.Base,
|
||||||
|
Filter: adUpstreamImpl.Spec().GroupSearch().Filter(),
|
||||||
|
GroupNameAttribute: adUpstreamImpl.Spec().GroupSearch().GroupNameAttribute(),
|
||||||
|
},
|
||||||
|
Dialer: c.ldapDialer,
|
||||||
|
UIDAttributeParsingOverrides: map[string]func(*ldap.Entry) (string, error){"objectGUID": upstreamldap.MicrosoftUUIDFromBinary("objectGUID")},
|
||||||
|
}
|
||||||
|
|
||||||
|
if spec.GroupSearch.Attributes.GroupName == "" {
|
||||||
|
config.GroupAttributeParsingOverrides = map[string]func(*ldap.Entry) (string, error){defaultActiveDirectoryGroupNameAttributeName: upstreamldap.GroupSAMAccountNameWithDomainSuffix}
|
||||||
|
}
|
||||||
|
|
||||||
|
conditions := upstreamwatchers.ValidateGenericLDAP(ctx, adUpstreamImpl, c.secretInformer, c.validatedSecretVersionsCache, config)
|
||||||
|
|
||||||
|
c.updateStatus(ctx, upstream, conditions.Conditions())
|
||||||
|
|
||||||
|
return upstreamwatchers.EvaluateConditions(conditions, config)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *activeDirectoryWatcherController) updateStatus(ctx context.Context, upstream *v1alpha1.ActiveDirectoryIdentityProvider, conditions []*v1alpha1.Condition) {
|
||||||
|
log := klogr.New().WithValues("namespace", upstream.Namespace, "name", upstream.Name)
|
||||||
|
updated := upstream.DeepCopy()
|
||||||
|
|
||||||
|
hadErrorCondition := conditionsutil.Merge(conditions, upstream.Generation, &updated.Status.Conditions, log)
|
||||||
|
|
||||||
|
updated.Status.Phase = v1alpha1.ActiveDirectoryPhaseReady
|
||||||
|
if hadErrorCondition {
|
||||||
|
updated.Status.Phase = v1alpha1.ActiveDirectoryPhaseError
|
||||||
|
}
|
||||||
|
|
||||||
|
if equality.Semantic.DeepEqual(upstream, updated) {
|
||||||
|
return // nothing to update
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err := c.client.
|
||||||
|
IDPV1alpha1().
|
||||||
|
ActiveDirectoryIdentityProviders(upstream.Namespace).
|
||||||
|
UpdateStatus(ctx, updated, metav1.UpdateOptions{})
|
||||||
|
if err != nil {
|
||||||
|
log.Error(err, "failed to update status")
|
||||||
|
}
|
||||||
|
}
|
File diff suppressed because it is too large
Load Diff
@ -6,12 +6,8 @@ package ldapupstreamwatcher
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"crypto/x509"
|
|
||||||
"encoding/base64"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"time"
|
|
||||||
|
|
||||||
corev1 "k8s.io/api/core/v1"
|
|
||||||
"k8s.io/apimachinery/pkg/api/equality"
|
"k8s.io/apimachinery/pkg/api/equality"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
@ -26,24 +22,111 @@ import (
|
|||||||
"go.pinniped.dev/internal/controller/supervisorconfig/upstreamwatchers"
|
"go.pinniped.dev/internal/controller/supervisorconfig/upstreamwatchers"
|
||||||
"go.pinniped.dev/internal/controllerlib"
|
"go.pinniped.dev/internal/controllerlib"
|
||||||
"go.pinniped.dev/internal/oidc/provider"
|
"go.pinniped.dev/internal/oidc/provider"
|
||||||
"go.pinniped.dev/internal/plog"
|
|
||||||
"go.pinniped.dev/internal/upstreamldap"
|
"go.pinniped.dev/internal/upstreamldap"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
ldapControllerName = "ldap-upstream-observer"
|
ldapControllerName = "ldap-upstream-observer"
|
||||||
ldapBindAccountSecretType = corev1.SecretTypeBasicAuth
|
|
||||||
testLDAPConnectionTimeout = 90 * time.Second
|
|
||||||
|
|
||||||
// Constants related to conditions.
|
|
||||||
typeBindSecretValid = "BindSecretValid"
|
|
||||||
typeTLSConfigurationValid = "TLSConfigurationValid"
|
|
||||||
typeLDAPConnectionValid = "LDAPConnectionValid"
|
|
||||||
reasonLDAPConnectionError = "LDAPConnectionError"
|
|
||||||
noTLSConfigurationMessage = "no TLS configuration provided"
|
|
||||||
loadedTLSConfigurationMessage = "loaded TLS configuration"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type ldapUpstreamGenericLDAPImpl struct {
|
||||||
|
ldapIdentityProvider v1alpha1.LDAPIdentityProvider
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *ldapUpstreamGenericLDAPImpl) Spec() upstreamwatchers.UpstreamGenericLDAPSpec {
|
||||||
|
return &ldapUpstreamGenericLDAPSpec{g.ldapIdentityProvider}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *ldapUpstreamGenericLDAPImpl) Namespace() string {
|
||||||
|
return g.ldapIdentityProvider.Namespace
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *ldapUpstreamGenericLDAPImpl) Name() string {
|
||||||
|
return g.ldapIdentityProvider.Name
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *ldapUpstreamGenericLDAPImpl) Generation() int64 {
|
||||||
|
return g.ldapIdentityProvider.Generation
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *ldapUpstreamGenericLDAPImpl) Status() upstreamwatchers.UpstreamGenericLDAPStatus {
|
||||||
|
return &ldapUpstreamGenericLDAPStatus{g.ldapIdentityProvider}
|
||||||
|
}
|
||||||
|
|
||||||
|
type ldapUpstreamGenericLDAPSpec struct {
|
||||||
|
ldapIdentityProvider v1alpha1.LDAPIdentityProvider
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ldapUpstreamGenericLDAPSpec) Host() string {
|
||||||
|
return s.ldapIdentityProvider.Spec.Host
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ldapUpstreamGenericLDAPSpec) TLSSpec() *v1alpha1.TLSSpec {
|
||||||
|
return s.ldapIdentityProvider.Spec.TLS
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ldapUpstreamGenericLDAPSpec) BindSecretName() string {
|
||||||
|
return s.ldapIdentityProvider.Spec.Bind.SecretName
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ldapUpstreamGenericLDAPSpec) UserSearch() upstreamwatchers.UpstreamGenericLDAPUserSearch {
|
||||||
|
return &ldapUpstreamGenericLDAPUserSearch{s.ldapIdentityProvider.Spec.UserSearch}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ldapUpstreamGenericLDAPSpec) GroupSearch() upstreamwatchers.UpstreamGenericLDAPGroupSearch {
|
||||||
|
return &ldapUpstreamGenericLDAPGroupSearch{s.ldapIdentityProvider.Spec.GroupSearch}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ldapUpstreamGenericLDAPSpec) DetectAndSetSearchBase(_ context.Context, config *upstreamldap.ProviderConfig) *v1alpha1.Condition {
|
||||||
|
config.GroupSearch.Base = s.ldapIdentityProvider.Spec.GroupSearch.Base
|
||||||
|
config.UserSearch.Base = s.ldapIdentityProvider.Spec.UserSearch.Base
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type ldapUpstreamGenericLDAPUserSearch struct {
|
||||||
|
userSearch v1alpha1.LDAPIdentityProviderUserSearch
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *ldapUpstreamGenericLDAPUserSearch) Base() string {
|
||||||
|
return u.userSearch.Base
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *ldapUpstreamGenericLDAPUserSearch) Filter() string {
|
||||||
|
return u.userSearch.Filter
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *ldapUpstreamGenericLDAPUserSearch) UsernameAttribute() string {
|
||||||
|
return u.userSearch.Attributes.Username
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *ldapUpstreamGenericLDAPUserSearch) UIDAttribute() string {
|
||||||
|
return u.userSearch.Attributes.UID
|
||||||
|
}
|
||||||
|
|
||||||
|
type ldapUpstreamGenericLDAPGroupSearch struct {
|
||||||
|
groupSearch v1alpha1.LDAPIdentityProviderGroupSearch
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *ldapUpstreamGenericLDAPGroupSearch) Base() string {
|
||||||
|
return g.groupSearch.Base
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *ldapUpstreamGenericLDAPGroupSearch) Filter() string {
|
||||||
|
return g.groupSearch.Filter
|
||||||
|
}
|
||||||
|
|
||||||
|
func (g *ldapUpstreamGenericLDAPGroupSearch) GroupNameAttribute() string {
|
||||||
|
return g.groupSearch.Attributes.GroupName
|
||||||
|
}
|
||||||
|
|
||||||
|
type ldapUpstreamGenericLDAPStatus struct {
|
||||||
|
ldapIdentityProvider v1alpha1.LDAPIdentityProvider
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ldapUpstreamGenericLDAPStatus) Conditions() []v1alpha1.Condition {
|
||||||
|
return s.ldapIdentityProvider.Status.Conditions
|
||||||
|
}
|
||||||
|
|
||||||
// UpstreamLDAPIdentityProviderICache is a thread safe cache that holds a list of validated upstream LDAP IDP configurations.
|
// UpstreamLDAPIdentityProviderICache is a thread safe cache that holds a list of validated upstream LDAP IDP configurations.
|
||||||
type UpstreamLDAPIdentityProviderICache interface {
|
type UpstreamLDAPIdentityProviderICache interface {
|
||||||
SetLDAPIdentityProviders([]provider.UpstreamLDAPIdentityProviderI)
|
SetLDAPIdentityProviders([]provider.UpstreamLDAPIdentityProviderI)
|
||||||
@ -51,28 +134,13 @@ type UpstreamLDAPIdentityProviderICache interface {
|
|||||||
|
|
||||||
type ldapWatcherController struct {
|
type ldapWatcherController struct {
|
||||||
cache UpstreamLDAPIdentityProviderICache
|
cache UpstreamLDAPIdentityProviderICache
|
||||||
validatedSecretVersionsCache *secretVersionCache
|
validatedSecretVersionsCache *upstreamwatchers.SecretVersionCache
|
||||||
ldapDialer upstreamldap.LDAPDialer
|
ldapDialer upstreamldap.LDAPDialer
|
||||||
client pinnipedclientset.Interface
|
client pinnipedclientset.Interface
|
||||||
ldapIdentityProviderInformer idpinformers.LDAPIdentityProviderInformer
|
ldapIdentityProviderInformer idpinformers.LDAPIdentityProviderInformer
|
||||||
secretInformer corev1informers.SecretInformer
|
secretInformer corev1informers.SecretInformer
|
||||||
}
|
}
|
||||||
|
|
||||||
// An in-memory cache with an entry for each LDAPIdentityProvider, to keep track of which ResourceVersion
|
|
||||||
// of the bind Secret and which TLS/StartTLS setting was used during the most recent successful validation.
|
|
||||||
type secretVersionCache struct {
|
|
||||||
ValidatedSettingsByName map[string]validatedSettings
|
|
||||||
}
|
|
||||||
|
|
||||||
type validatedSettings struct {
|
|
||||||
BindSecretResourceVersion string
|
|
||||||
LDAPConnectionProtocol upstreamldap.LDAPConnectionProtocol
|
|
||||||
}
|
|
||||||
|
|
||||||
func newSecretVersionCache() *secretVersionCache {
|
|
||||||
return &secretVersionCache{ValidatedSettingsByName: map[string]validatedSettings{}}
|
|
||||||
}
|
|
||||||
|
|
||||||
// New instantiates a new controllerlib.Controller which will populate the provided UpstreamLDAPIdentityProviderICache.
|
// New instantiates a new controllerlib.Controller which will populate the provided UpstreamLDAPIdentityProviderICache.
|
||||||
func New(
|
func New(
|
||||||
idpCache UpstreamLDAPIdentityProviderICache,
|
idpCache UpstreamLDAPIdentityProviderICache,
|
||||||
@ -84,7 +152,7 @@ func New(
|
|||||||
return newInternal(
|
return newInternal(
|
||||||
idpCache,
|
idpCache,
|
||||||
// start with an empty secretVersionCache
|
// start with an empty secretVersionCache
|
||||||
newSecretVersionCache(),
|
upstreamwatchers.NewSecretVersionCache(),
|
||||||
// nil means to use a real production dialer when creating objects to add to the cache
|
// nil means to use a real production dialer when creating objects to add to the cache
|
||||||
nil,
|
nil,
|
||||||
client,
|
client,
|
||||||
@ -97,7 +165,7 @@ func New(
|
|||||||
// For test dependency injection purposes.
|
// For test dependency injection purposes.
|
||||||
func newInternal(
|
func newInternal(
|
||||||
idpCache UpstreamLDAPIdentityProviderICache,
|
idpCache UpstreamLDAPIdentityProviderICache,
|
||||||
validatedSecretVersionsCache *secretVersionCache,
|
validatedSecretVersionsCache *upstreamwatchers.SecretVersionCache,
|
||||||
ldapDialer upstreamldap.LDAPDialer,
|
ldapDialer upstreamldap.LDAPDialer,
|
||||||
client pinnipedclientset.Interface,
|
client pinnipedclientset.Interface,
|
||||||
ldapIdentityProviderInformer idpinformers.LDAPIdentityProviderInformer,
|
ldapIdentityProviderInformer idpinformers.LDAPIdentityProviderInformer,
|
||||||
@ -121,7 +189,7 @@ func newInternal(
|
|||||||
),
|
),
|
||||||
withInformer(
|
withInformer(
|
||||||
secretInformer,
|
secretInformer,
|
||||||
pinnipedcontroller.MatchAnySecretOfTypeFilter(ldapBindAccountSecretType, pinnipedcontroller.SingletonQueue()),
|
pinnipedcontroller.MatchAnySecretOfTypeFilter(upstreamwatchers.LDAPBindAccountSecretType, pinnipedcontroller.SingletonQueue()),
|
||||||
controllerlib.InformerOption{},
|
controllerlib.InformerOption{},
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
@ -174,212 +242,11 @@ func (c *ldapWatcherController) validateUpstream(ctx context.Context, upstream *
|
|||||||
Dialer: c.ldapDialer,
|
Dialer: c.ldapDialer,
|
||||||
}
|
}
|
||||||
|
|
||||||
conditions := []*v1alpha1.Condition{}
|
conditions := upstreamwatchers.ValidateGenericLDAP(ctx, &ldapUpstreamGenericLDAPImpl{*upstream}, c.secretInformer, c.validatedSecretVersionsCache, config)
|
||||||
secretValidCondition, currentSecretVersion := c.validateSecret(upstream, config)
|
|
||||||
tlsValidCondition := c.validateTLSConfig(upstream, config)
|
|
||||||
conditions = append(conditions, secretValidCondition, tlsValidCondition)
|
|
||||||
|
|
||||||
// No point in trying to connect to the server if the config was already determined to be invalid.
|
c.updateStatus(ctx, upstream, conditions.Conditions())
|
||||||
var finishedConfigCondition *v1alpha1.Condition
|
|
||||||
if secretValidCondition.Status == v1alpha1.ConditionTrue && tlsValidCondition.Status == v1alpha1.ConditionTrue {
|
|
||||||
finishedConfigCondition = c.validateFinishedConfig(ctx, upstream, config, currentSecretVersion)
|
|
||||||
if finishedConfigCondition != nil {
|
|
||||||
conditions = append(conditions, finishedConfigCondition)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
c.updateStatus(ctx, upstream, conditions)
|
return upstreamwatchers.EvaluateConditions(conditions, config)
|
||||||
|
|
||||||
switch {
|
|
||||||
case secretValidCondition.Status != v1alpha1.ConditionTrue || tlsValidCondition.Status != v1alpha1.ConditionTrue:
|
|
||||||
// Invalid provider, so do not load it into the cache.
|
|
||||||
p = nil
|
|
||||||
requeue = true
|
|
||||||
case finishedConfigCondition != nil && finishedConfigCondition.Status != v1alpha1.ConditionTrue:
|
|
||||||
// Error but load it into the cache anyway, treating this condition failure more like a warning.
|
|
||||||
p = upstreamldap.New(*config)
|
|
||||||
// Try again hoping that the condition will improve.
|
|
||||||
requeue = true
|
|
||||||
default:
|
|
||||||
// Fully validated provider, so load it into the cache.
|
|
||||||
p = upstreamldap.New(*config)
|
|
||||||
requeue = false
|
|
||||||
}
|
|
||||||
|
|
||||||
return p, requeue
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *ldapWatcherController) validateTLSConfig(upstream *v1alpha1.LDAPIdentityProvider, config *upstreamldap.ProviderConfig) *v1alpha1.Condition {
|
|
||||||
tlsSpec := upstream.Spec.TLS
|
|
||||||
if tlsSpec == nil {
|
|
||||||
return c.validTLSCondition(noTLSConfigurationMessage)
|
|
||||||
}
|
|
||||||
if len(tlsSpec.CertificateAuthorityData) == 0 {
|
|
||||||
return c.validTLSCondition(loadedTLSConfigurationMessage)
|
|
||||||
}
|
|
||||||
|
|
||||||
bundle, err := base64.StdEncoding.DecodeString(tlsSpec.CertificateAuthorityData)
|
|
||||||
if err != nil {
|
|
||||||
return c.invalidTLSCondition(fmt.Sprintf("certificateAuthorityData is invalid: %s", err.Error()))
|
|
||||||
}
|
|
||||||
|
|
||||||
ca := x509.NewCertPool()
|
|
||||||
ok := ca.AppendCertsFromPEM(bundle)
|
|
||||||
if !ok {
|
|
||||||
return c.invalidTLSCondition(fmt.Sprintf("certificateAuthorityData is invalid: %s", upstreamwatchers.ErrNoCertificates))
|
|
||||||
}
|
|
||||||
|
|
||||||
config.CABundle = bundle
|
|
||||||
return c.validTLSCondition(loadedTLSConfigurationMessage)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *ldapWatcherController) validateFinishedConfig(ctx context.Context, upstream *v1alpha1.LDAPIdentityProvider, config *upstreamldap.ProviderConfig, currentSecretVersion string) *v1alpha1.Condition {
|
|
||||||
if c.hasPreviousSuccessfulConditionForCurrentSpecGenerationAndSecretVersion(upstream, currentSecretVersion, config) {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
testConnectionTimeout, cancelFunc := context.WithTimeout(ctx, testLDAPConnectionTimeout)
|
|
||||||
defer cancelFunc()
|
|
||||||
|
|
||||||
condition := c.testConnection(testConnectionTimeout, upstream, config, currentSecretVersion)
|
|
||||||
|
|
||||||
if condition.Status == v1alpha1.ConditionTrue {
|
|
||||||
// Remember (in-memory for this pod) that the controller has successfully validated the LDAP provider
|
|
||||||
// using this version of the Secret. This is for performance reasons, to avoid attempting to connect to
|
|
||||||
// the LDAP server more than is needed. If the pod restarts, it will attempt this validation again.
|
|
||||||
c.validatedSecretVersionsCache.ValidatedSettingsByName[upstream.GetName()] = validatedSettings{
|
|
||||||
BindSecretResourceVersion: currentSecretVersion,
|
|
||||||
LDAPConnectionProtocol: config.ConnectionProtocol,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return condition
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *ldapWatcherController) testConnection(
|
|
||||||
ctx context.Context,
|
|
||||||
upstream *v1alpha1.LDAPIdentityProvider,
|
|
||||||
config *upstreamldap.ProviderConfig,
|
|
||||||
currentSecretVersion string,
|
|
||||||
) *v1alpha1.Condition {
|
|
||||||
// First try using TLS.
|
|
||||||
config.ConnectionProtocol = upstreamldap.TLS
|
|
||||||
tlsLDAPProvider := upstreamldap.New(*config)
|
|
||||||
err := tlsLDAPProvider.TestConnection(ctx)
|
|
||||||
if err != nil {
|
|
||||||
plog.InfoErr("testing LDAP connection using TLS failed, so trying again with StartTLS", err, "host", config.Host)
|
|
||||||
// If there was any error, try again with StartTLS instead.
|
|
||||||
config.ConnectionProtocol = upstreamldap.StartTLS
|
|
||||||
startTLSLDAPProvider := upstreamldap.New(*config)
|
|
||||||
startTLSErr := startTLSLDAPProvider.TestConnection(ctx)
|
|
||||||
if startTLSErr == nil {
|
|
||||||
plog.Info("testing LDAP connection using StartTLS succeeded", "host", config.Host)
|
|
||||||
// Successfully able to fall back to using StartTLS, so clear the original
|
|
||||||
// error and consider the connection test to be successful.
|
|
||||||
err = nil
|
|
||||||
} else {
|
|
||||||
plog.InfoErr("testing LDAP connection using StartTLS also failed", err, "host", config.Host)
|
|
||||||
// Falling back to StartTLS also failed, so put TLS back into the config
|
|
||||||
// and consider the connection test to be failed.
|
|
||||||
config.ConnectionProtocol = upstreamldap.TLS
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
return &v1alpha1.Condition{
|
|
||||||
Type: typeLDAPConnectionValid,
|
|
||||||
Status: v1alpha1.ConditionFalse,
|
|
||||||
Reason: reasonLDAPConnectionError,
|
|
||||||
Message: fmt.Sprintf(`could not successfully connect to "%s" and bind as user "%s": %s`,
|
|
||||||
config.Host, config.BindUsername, err.Error()),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return &v1alpha1.Condition{
|
|
||||||
Type: typeLDAPConnectionValid,
|
|
||||||
Status: v1alpha1.ConditionTrue,
|
|
||||||
Reason: upstreamwatchers.ReasonSuccess,
|
|
||||||
Message: fmt.Sprintf(`successfully able to connect to "%s" and bind as user "%s" [validated with Secret "%s" at version "%s"]`,
|
|
||||||
config.Host, config.BindUsername, upstream.Spec.Bind.SecretName, currentSecretVersion),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *ldapWatcherController) hasPreviousSuccessfulConditionForCurrentSpecGenerationAndSecretVersion(upstream *v1alpha1.LDAPIdentityProvider, currentSecretVersion string, config *upstreamldap.ProviderConfig) bool {
|
|
||||||
currentGeneration := upstream.Generation
|
|
||||||
for _, cond := range upstream.Status.Conditions {
|
|
||||||
if cond.Type == typeLDAPConnectionValid && cond.Status == v1alpha1.ConditionTrue && cond.ObservedGeneration == currentGeneration {
|
|
||||||
// Found a previously successful condition for the current spec generation.
|
|
||||||
// Now figure out which version of the bind Secret was used during that previous validation, if any.
|
|
||||||
validatedSecretVersion := c.validatedSecretVersionsCache.ValidatedSettingsByName[upstream.GetName()]
|
|
||||||
if validatedSecretVersion.BindSecretResourceVersion == currentSecretVersion {
|
|
||||||
// Reload the TLS vs StartTLS setting that was previously validated.
|
|
||||||
config.ConnectionProtocol = validatedSecretVersion.LDAPConnectionProtocol
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *ldapWatcherController) validTLSCondition(message string) *v1alpha1.Condition {
|
|
||||||
return &v1alpha1.Condition{
|
|
||||||
Type: typeTLSConfigurationValid,
|
|
||||||
Status: v1alpha1.ConditionTrue,
|
|
||||||
Reason: upstreamwatchers.ReasonSuccess,
|
|
||||||
Message: message,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *ldapWatcherController) invalidTLSCondition(message string) *v1alpha1.Condition {
|
|
||||||
return &v1alpha1.Condition{
|
|
||||||
Type: typeTLSConfigurationValid,
|
|
||||||
Status: v1alpha1.ConditionFalse,
|
|
||||||
Reason: upstreamwatchers.ReasonInvalidTLSConfig,
|
|
||||||
Message: message,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *ldapWatcherController) validateSecret(upstream *v1alpha1.LDAPIdentityProvider, config *upstreamldap.ProviderConfig) (*v1alpha1.Condition, string) {
|
|
||||||
secretName := upstream.Spec.Bind.SecretName
|
|
||||||
|
|
||||||
secret, err := c.secretInformer.Lister().Secrets(upstream.Namespace).Get(secretName)
|
|
||||||
if err != nil {
|
|
||||||
return &v1alpha1.Condition{
|
|
||||||
Type: typeBindSecretValid,
|
|
||||||
Status: v1alpha1.ConditionFalse,
|
|
||||||
Reason: upstreamwatchers.ReasonNotFound,
|
|
||||||
Message: err.Error(),
|
|
||||||
}, ""
|
|
||||||
}
|
|
||||||
|
|
||||||
if secret.Type != corev1.SecretTypeBasicAuth {
|
|
||||||
return &v1alpha1.Condition{
|
|
||||||
Type: typeBindSecretValid,
|
|
||||||
Status: v1alpha1.ConditionFalse,
|
|
||||||
Reason: upstreamwatchers.ReasonWrongType,
|
|
||||||
Message: fmt.Sprintf("referenced Secret %q has wrong type %q (should be %q)",
|
|
||||||
secretName, secret.Type, corev1.SecretTypeBasicAuth),
|
|
||||||
}, secret.ResourceVersion
|
|
||||||
}
|
|
||||||
|
|
||||||
config.BindUsername = string(secret.Data[corev1.BasicAuthUsernameKey])
|
|
||||||
config.BindPassword = string(secret.Data[corev1.BasicAuthPasswordKey])
|
|
||||||
if len(config.BindUsername) == 0 || len(config.BindPassword) == 0 {
|
|
||||||
return &v1alpha1.Condition{
|
|
||||||
Type: typeBindSecretValid,
|
|
||||||
Status: v1alpha1.ConditionFalse,
|
|
||||||
Reason: upstreamwatchers.ReasonMissingKeys,
|
|
||||||
Message: fmt.Sprintf("referenced Secret %q is missing required keys %q",
|
|
||||||
secretName, []string{corev1.BasicAuthUsernameKey, corev1.BasicAuthPasswordKey}),
|
|
||||||
}, secret.ResourceVersion
|
|
||||||
}
|
|
||||||
|
|
||||||
return &v1alpha1.Condition{
|
|
||||||
Type: typeBindSecretValid,
|
|
||||||
Status: v1alpha1.ConditionTrue,
|
|
||||||
Reason: upstreamwatchers.ReasonSuccess,
|
|
||||||
Message: "loaded bind secret",
|
|
||||||
}, secret.ResourceVersion
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *ldapWatcherController) updateStatus(ctx context.Context, upstream *v1alpha1.LDAPIdentityProvider, conditions []*v1alpha1.Condition) {
|
func (c *ldapWatcherController) updateStatus(ctx context.Context, upstream *v1alpha1.LDAPIdentityProvider, conditions []*v1alpha1.Condition) {
|
||||||
|
@ -25,6 +25,7 @@ import (
|
|||||||
pinnipedfake "go.pinniped.dev/generated/latest/client/supervisor/clientset/versioned/fake"
|
pinnipedfake "go.pinniped.dev/generated/latest/client/supervisor/clientset/versioned/fake"
|
||||||
pinnipedinformers "go.pinniped.dev/generated/latest/client/supervisor/informers/externalversions"
|
pinnipedinformers "go.pinniped.dev/generated/latest/client/supervisor/informers/externalversions"
|
||||||
"go.pinniped.dev/internal/certauthority"
|
"go.pinniped.dev/internal/certauthority"
|
||||||
|
"go.pinniped.dev/internal/controller/supervisorconfig/upstreamwatchers"
|
||||||
"go.pinniped.dev/internal/controllerlib"
|
"go.pinniped.dev/internal/controllerlib"
|
||||||
"go.pinniped.dev/internal/endpointaddr"
|
"go.pinniped.dev/internal/endpointaddr"
|
||||||
"go.pinniped.dev/internal/mocks/mockldapconn"
|
"go.pinniped.dev/internal/mocks/mockldapconn"
|
||||||
@ -273,7 +274,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
|
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
initialValidatedSettings map[string]validatedSettings
|
initialValidatedSettings map[string]upstreamwatchers.ValidatedSettings
|
||||||
inputUpstreams []runtime.Object
|
inputUpstreams []runtime.Object
|
||||||
inputSecrets []runtime.Object
|
inputSecrets []runtime.Object
|
||||||
setupMocks func(conn *mockldapconn.MockConn)
|
setupMocks func(conn *mockldapconn.MockConn)
|
||||||
@ -281,7 +282,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
wantErr string
|
wantErr string
|
||||||
wantResultingCache []*upstreamldap.ProviderConfig
|
wantResultingCache []*upstreamldap.ProviderConfig
|
||||||
wantResultingUpstreams []v1alpha1.LDAPIdentityProvider
|
wantResultingUpstreams []v1alpha1.LDAPIdentityProvider
|
||||||
wantValidatedSettings map[string]validatedSettings
|
wantValidatedSettings map[string]upstreamwatchers.ValidatedSettings
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "no LDAPIdentityProvider upstreams clears the cache",
|
name: "no LDAPIdentityProvider upstreams clears the cache",
|
||||||
@ -304,7 +305,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
Conditions: allConditionsTrue(1234, "4242"),
|
Conditions: allConditionsTrue(1234, "4242"),
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.TLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "missing secret",
|
name: "missing secret",
|
||||||
@ -487,8 +493,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
},
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.TLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}}},
|
||||||
{
|
{
|
||||||
name: "when TLS connection fails it tries to use StartTLS instead: without a specified port it automatically switches ports",
|
name: "when TLS connection fails it tries to use StartTLS instead: without a specified port it automatically switches ports",
|
||||||
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
||||||
@ -545,8 +555,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.StartTLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
},
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.StartTLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}}},
|
||||||
{
|
{
|
||||||
name: "when TLS connection fails it tries to use StartTLS instead: with a specified port it does not automatically switch ports",
|
name: "when TLS connection fails it tries to use StartTLS instead: with a specified port it does not automatically switch ports",
|
||||||
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
||||||
@ -602,6 +616,10 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "non-nil TLS configuration with empty CertificateAuthorityData is valid",
|
name: "non-nil TLS configuration with empty CertificateAuthorityData is valid",
|
||||||
@ -642,7 +660,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
Conditions: allConditionsTrue(1234, "4242"),
|
Conditions: allConditionsTrue(1234, "4242"),
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.TLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "one valid upstream and one invalid upstream updates the cache to include only the valid upstream",
|
name: "one valid upstream and one invalid upstream updates the cache to include only the valid upstream",
|
||||||
@ -685,8 +708,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
},
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.TLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}}},
|
||||||
{
|
{
|
||||||
name: "when testing the connection to the LDAP server fails then the upstream is still added to the cache anyway (treated like a warning)",
|
name: "when testing the connection to the LDAP server fails then the upstream is still added to the cache anyway (treated like a warning)",
|
||||||
inputUpstreams: []runtime.Object{validUpstream},
|
inputUpstreams: []runtime.Object{validUpstream},
|
||||||
@ -719,6 +746,10 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "when the LDAP server connection was already validated using TLS for the current resource generation and secret version, then do not validate it again and keep using TLS",
|
name: "when the LDAP server connection was already validated using TLS for the current resource generation and secret version, then do not validate it again and keep using TLS",
|
||||||
@ -729,7 +760,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
}
|
}
|
||||||
})},
|
})},
|
||||||
inputSecrets: []runtime.Object{validBindUserSecret("4242")},
|
inputSecrets: []runtime.Object{validBindUserSecret("4242")},
|
||||||
initialValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
initialValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
||||||
setupMocks: func(conn *mockldapconn.MockConn) {
|
setupMocks: func(conn *mockldapconn.MockConn) {
|
||||||
// Should not perform a test dial and bind. No mocking here means the test will fail if Bind() or Close() are called.
|
// Should not perform a test dial and bind. No mocking here means the test will fail if Bind() or Close() are called.
|
||||||
},
|
},
|
||||||
@ -741,8 +772,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
Conditions: allConditionsTrue(1234, "4242"),
|
Conditions: allConditionsTrue(1234, "4242"),
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
},
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.TLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}}},
|
||||||
{
|
{
|
||||||
name: "when the LDAP server connection was already validated using StartTLS for the current resource generation and secret version, then do not validate it again and keep using StartTLS",
|
name: "when the LDAP server connection was already validated using StartTLS for the current resource generation and secret version, then do not validate it again and keep using StartTLS",
|
||||||
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
||||||
@ -752,7 +787,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
}
|
}
|
||||||
})},
|
})},
|
||||||
inputSecrets: []runtime.Object{validBindUserSecret("4242")},
|
inputSecrets: []runtime.Object{validBindUserSecret("4242")},
|
||||||
initialValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.StartTLS}},
|
initialValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.StartTLS}},
|
||||||
setupMocks: func(conn *mockldapconn.MockConn) {
|
setupMocks: func(conn *mockldapconn.MockConn) {
|
||||||
// Should not perform a test dial and bind. No mocking here means the test will fail if Bind() or Close() are called.
|
// Should not perform a test dial and bind. No mocking here means the test will fail if Bind() or Close() are called.
|
||||||
},
|
},
|
||||||
@ -764,8 +799,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
Conditions: allConditionsTrue(1234, "4242"),
|
Conditions: allConditionsTrue(1234, "4242"),
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.StartTLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
},
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.StartTLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}}},
|
||||||
{
|
{
|
||||||
name: "when the LDAP server connection was validated for an older resource generation, then try to validate it again",
|
name: "when the LDAP server connection was validated for an older resource generation, then try to validate it again",
|
||||||
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
||||||
@ -775,7 +814,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
}
|
}
|
||||||
})},
|
})},
|
||||||
inputSecrets: []runtime.Object{validBindUserSecret("4242")},
|
inputSecrets: []runtime.Object{validBindUserSecret("4242")},
|
||||||
initialValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
initialValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
||||||
setupMocks: func(conn *mockldapconn.MockConn) {
|
setupMocks: func(conn *mockldapconn.MockConn) {
|
||||||
// Should perform a test dial and bind.
|
// Should perform a test dial and bind.
|
||||||
conn.EXPECT().Bind(testBindUsername, testBindPassword).Times(1)
|
conn.EXPECT().Bind(testBindUsername, testBindPassword).Times(1)
|
||||||
@ -789,8 +828,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
Conditions: allConditionsTrue(1234, "4242"),
|
Conditions: allConditionsTrue(1234, "4242"),
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
},
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.TLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}}},
|
||||||
{
|
{
|
||||||
name: "when the LDAP server connection validation previously failed for this resource generation, then try to validate it again",
|
name: "when the LDAP server connection validation previously failed for this resource generation, then try to validate it again",
|
||||||
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
||||||
@ -807,7 +850,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
}
|
}
|
||||||
})},
|
})},
|
||||||
inputSecrets: []runtime.Object{validBindUserSecret("4242")},
|
inputSecrets: []runtime.Object{validBindUserSecret("4242")},
|
||||||
initialValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "1", LDAPConnectionProtocol: upstreamldap.TLS}},
|
initialValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {BindSecretResourceVersion: "1", LDAPConnectionProtocol: upstreamldap.TLS}},
|
||||||
setupMocks: func(conn *mockldapconn.MockConn) {
|
setupMocks: func(conn *mockldapconn.MockConn) {
|
||||||
// Should perform a test dial and bind.
|
// Should perform a test dial and bind.
|
||||||
conn.EXPECT().Bind(testBindUsername, testBindPassword).Times(1)
|
conn.EXPECT().Bind(testBindUsername, testBindPassword).Times(1)
|
||||||
@ -821,8 +864,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
Conditions: allConditionsTrue(1234, "4242"),
|
Conditions: allConditionsTrue(1234, "4242"),
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
},
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.TLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}}},
|
||||||
{
|
{
|
||||||
name: "when the LDAP server connection was already validated for this resource generation but the bind secret has changed, then try to validate it again",
|
name: "when the LDAP server connection was already validated for this resource generation but the bind secret has changed, then try to validate it again",
|
||||||
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
inputUpstreams: []runtime.Object{editedValidUpstream(func(upstream *v1alpha1.LDAPIdentityProvider) {
|
||||||
@ -832,7 +879,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
}
|
}
|
||||||
})},
|
})},
|
||||||
inputSecrets: []runtime.Object{validBindUserSecret("4242")}, // newer secret version!
|
inputSecrets: []runtime.Object{validBindUserSecret("4242")}, // newer secret version!
|
||||||
initialValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4241", LDAPConnectionProtocol: upstreamldap.TLS}}, // old version was validated
|
initialValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {BindSecretResourceVersion: "4241", LDAPConnectionProtocol: upstreamldap.TLS}}, // old version was validated
|
||||||
setupMocks: func(conn *mockldapconn.MockConn) {
|
setupMocks: func(conn *mockldapconn.MockConn) {
|
||||||
// Should perform a test dial and bind.
|
// Should perform a test dial and bind.
|
||||||
conn.EXPECT().Bind(testBindUsername, testBindPassword).Times(1)
|
conn.EXPECT().Bind(testBindUsername, testBindPassword).Times(1)
|
||||||
@ -846,8 +893,12 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
Conditions: allConditionsTrue(1234, "4242"),
|
Conditions: allConditionsTrue(1234, "4242"),
|
||||||
},
|
},
|
||||||
}},
|
}},
|
||||||
wantValidatedSettings: map[string]validatedSettings{testName: {BindSecretResourceVersion: "4242", LDAPConnectionProtocol: upstreamldap.TLS}},
|
wantValidatedSettings: map[string]upstreamwatchers.ValidatedSettings{testName: {
|
||||||
},
|
BindSecretResourceVersion: "4242",
|
||||||
|
LDAPConnectionProtocol: upstreamldap.TLS,
|
||||||
|
UserSearchBase: testUserSearchBase,
|
||||||
|
GroupSearchBase: testGroupSearchBase,
|
||||||
|
}}},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
@ -882,7 +933,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
return conn, nil
|
return conn, nil
|
||||||
})}
|
})}
|
||||||
|
|
||||||
validatedSecretVersionCache := newSecretVersionCache()
|
validatedSecretVersionCache := upstreamwatchers.NewSecretVersionCache()
|
||||||
if tt.initialValidatedSettings != nil {
|
if tt.initialValidatedSettings != nil {
|
||||||
validatedSecretVersionCache.ValidatedSettingsByName = tt.initialValidatedSettings
|
validatedSecretVersionCache.ValidatedSettingsByName = tt.initialValidatedSettings
|
||||||
}
|
}
|
||||||
@ -936,7 +987,7 @@ func TestLDAPUpstreamWatcherControllerSync(t *testing.T) {
|
|||||||
|
|
||||||
// Check that the controller remembered which version of the secret it most recently validated successfully with.
|
// Check that the controller remembered which version of the secret it most recently validated successfully with.
|
||||||
if tt.wantValidatedSettings == nil {
|
if tt.wantValidatedSettings == nil {
|
||||||
tt.wantValidatedSettings = map[string]validatedSettings{}
|
tt.wantValidatedSettings = map[string]upstreamwatchers.ValidatedSettings{}
|
||||||
}
|
}
|
||||||
require.Equal(t, tt.wantValidatedSettings, validatedSecretVersionCache.ValidatedSettingsByName)
|
require.Equal(t, tt.wantValidatedSettings, validatedSecretVersionCache.ValidatedSettingsByName)
|
||||||
})
|
})
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user