Pinniped is the easy, secure way to log in to your Kubernetes clusters.
Go to file
Ryan Richard 80a520390b Rename many of resources that are created in Kubernetes by Pinniped
New resource naming conventions:
- Do not repeat the Kind in the name,
  e.g. do not call it foo-cluster-role-binding, just call it foo
- Names will generally start with a prefix to identify our component,
  so when a user lists all objects of that kind, they can tell to which
  component it is related,
  e.g. `kubectl get configmaps` would list one named "pinniped-config"
- It should be possible for an operator to make the word "pinniped"
  mostly disappear if they choose, by specifying the app_name in
  values.yaml, to the extent that is practical (but not from APIService
  names because those are hardcoded in golang)
- Each role/clusterrole and its corresponding binding have the same name
- Pinniped resource names that must be known by the server golang code
  are passed to the code at run time via ConfigMap, rather than
  hardcoded in the golang code. This also allows them to be prepended
  with the app_name from values.yaml while creating the ConfigMap.
- Since the CLI `get-kubeconfig` command cannot guess the name of the
  CredentialIssuerConfig resource in advance anymore, it lists all
  CredentialIssuerConfig in the app's namespace and returns an error
  if there is not exactly one found, and then uses that one regardless
  of its name
2020-09-18 15:56:50 -07:00
.github PR template is not working, so trying moving it up one directory 2020-09-17 16:36:33 -07:00
apis Update module/package names to match GitHub org switch. 2020-09-17 12:56:54 -05:00
cmd Rename many of resources that are created in Kubernetes by Pinniped 2020-09-18 15:56:50 -07:00
deploy Rename many of resources that are created in Kubernetes by Pinniped 2020-09-18 15:56:50 -07:00
deploy-local-user-authenticator Rename many of resources that are created in Kubernetes by Pinniped 2020-09-18 15:56:50 -07:00
doc Rename many of resources that are created in Kubernetes by Pinniped 2020-09-18 15:56:50 -07:00
generated Update module/package names to match GitHub org switch. 2020-09-17 12:56:54 -05:00
hack Rename many of resources that are created in Kubernetes by Pinniped 2020-09-18 15:56:50 -07:00
internal Rename many of resources that are created in Kubernetes by Pinniped 2020-09-18 15:56:50 -07:00
pkg/config Rename many of resources that are created in Kubernetes by Pinniped 2020-09-18 15:56:50 -07:00
test Rename many of resources that are created in Kubernetes by Pinniped 2020-09-18 15:56:50 -07:00
tools Save 2 lines by using inline-style comments for Copyright 2020-09-16 10:35:19 -04:00
.gitattributes Add .gitattributes as a hint to the GitHub diff viewer. 2020-09-15 11:44:23 -05:00
.gitignore Hello, world! 2020-07-02 17:05:59 -07:00
.golangci.yaml Update module/package names to match GitHub org switch. 2020-09-17 12:56:54 -05:00
.pre-commit-config.yaml Update precommit hook config to ignore generated files and fix whitespace. 2020-08-31 16:41:22 -05:00
ADOPTERS.md Update module/package names to match GitHub org switch. 2020-09-17 12:56:54 -05:00
Dockerfile Bump golang from 1.15.1 to 1.15.2 2020-09-16 14:59:35 +00:00
go.mod Update module/package names to match GitHub org switch. 2020-09-17 12:56:54 -05:00
go.sum Merge pull request #98 from suzerain-io/get_kubeconfig_cli 2020-09-15 13:34:14 -07:00
LICENSE Add Apache 2.0 license. 2020-07-06 13:50:31 -05:00
MAINTAINERS.md MAINTAINERS.md: add initial draft 2020-09-15 13:14:50 -04:00
README.md Update copyright to reference Pinniped contributors 2020-09-16 10:05:51 -04:00
SECURITY.md Update precommit hook config to ignore generated files and fix whitespace. 2020-08-31 16:41:22 -05:00

Pinniped

Overview

Pinniped provides identity services to Kubernetes.

Pinniped allows cluster administrators to easily plug in external identity providers (IDPs) into Kubernetes clusters. This is achieved via a uniform install procedure across all types and origins of Kubernetes clusters, declarative configuration via Kubernetes APIs, enterprise-grade integrations with IDPs, and distribution-specific integration strategies.

Example Use Cases

  • Your team uses a large enterprise IDP, and has many clusters that they manage. Pinniped provides:
    • Seamless and robust integration with the IDP
    • Easy installation across clusters of any type and origin
    • A simplified login flow across all clusters
  • Your team shares a single cluster. Pinniped provides:
    • Simple configuration to integrate an IDP
    • Individual, revocable identities

Architecture

Pinniped offers credential exchange to enable a user to exchange an external IDP credential for a short-lived, cluster-specific credential. Pinniped supports various IDP types and implements different integration strategies for various Kubernetes distributions to make authentication possible.

To learn more, see architecture.md.

Pinniped Architecture Sketch

Trying Pinniped

Care to kick the tires? It's easy to install and try Pinniped.

Installation

Currently, Pinniped supports self-hosted clusters where the Kube Controller Manager pod is accessible from Pinniped's pods. Support for other types of Kubernetes distributions is coming soon.

To try Pinniped, see deploy/README.md.

Contributions

Contributions are welcome. Before contributing, please see the Code of Conduct and the contributing guide.

Reporting Security Vulnerabilities

Please follow the procedure described in SECURITY.md.

License

Pinniped is open source and licensed under Apache License Version 2.0. See LICENSE file.

Copyright 2020 the Pinniped contributors. All Rights Reserved.