mirror of https://github.com/kubernetes/kops.git
Merge pull request #4085 from xoen/ag-oidc-prefixes-config
Automatic merge from submit-queue. Support for OIDC 'username-prefix' and 'groups-prefix' flags ### What Added support for `--oidc-username-prefix` and `--oidc-groups-prefix`. By passing these it's possible to override the default prefixes used to map the OIDC user with the username in kubernetes. ### See See: https://kubernetes.io/docs/admin/authentication/#configuring-the-api-server ### IMPORTANT I'm far from a kubernetes/KOPS, this is not tested so someone needs to have a look and see if something is missing or if this can cause troubles! (don't want to accidentally cause the destruction of the universe 💥 ) It's basically the same done in this other PR: https://github.com/kubernetes/kops/pull/1438/files I did **not** change the `zz_generated.conversion.go` files as according to comment at the top of them they're autogenerated: ```go // This file was autogenerated by conversion-gen. Do not edit it manually! ``` (I wonder if they should be `.gitignore`d) ### Fixes This should fix [#4007: field oidcUsernamePrefix is not recognized in cluster configuration file](https://github.com/kubernetes/kops/issues/4007)
This commit is contained in:
commit
2eae62d460
|
@ -137,8 +137,11 @@ spec:
|
||||||
oidcIssuerURL: https://your-oidc-provider.svc.cluster.local
|
oidcIssuerURL: https://your-oidc-provider.svc.cluster.local
|
||||||
oidcClientID: kubernetes
|
oidcClientID: kubernetes
|
||||||
oidcUsernameClaim: sub
|
oidcUsernameClaim: sub
|
||||||
|
oidcUsernamePrefix: "oidc:"
|
||||||
oidcGroupsClaim: user_roles
|
oidcGroupsClaim: user_roles
|
||||||
|
oidcGroupsPrefix: "oidc:"
|
||||||
oidcCAFile: /etc/kubernetes/ssl/kc-ca.pem
|
oidcCAFile: /etc/kubernetes/ssl/kc-ca.pem
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### audit logging
|
#### audit logging
|
||||||
|
|
|
@ -228,18 +228,29 @@ type KubeAPIServerConfig struct {
|
||||||
KubeletPreferredAddressTypes []string `json:"kubeletPreferredAddressTypes,omitempty" flag:"kubelet-preferred-address-types"`
|
KubeletPreferredAddressTypes []string `json:"kubeletPreferredAddressTypes,omitempty" flag:"kubelet-preferred-address-types"`
|
||||||
// StorageBackend is the backend storage
|
// StorageBackend is the backend storage
|
||||||
StorageBackend *string `json:"storageBackend,omitempty" flag:"storage-backend"`
|
StorageBackend *string `json:"storageBackend,omitempty" flag:"storage-backend"`
|
||||||
// The OpenID claim to use as the user name.
|
// OIDCUsernameClaim is the OpenID claim to use as the user name.
|
||||||
// Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.
|
// Note that claims other than the default ('sub') is not guaranteed to be
|
||||||
|
// unique and immutable.
|
||||||
OIDCUsernameClaim *string `json:"oidcUsernameClaim,omitempty" flag:"oidc-username-claim"`
|
OIDCUsernameClaim *string `json:"oidcUsernameClaim,omitempty" flag:"oidc-username-claim"`
|
||||||
// If provided, the name of a custom OpenID Connect claim for specifying user groups.
|
// OIDCUsernamePrefix is the prefix prepended to username claims to prevent
|
||||||
|
// clashes with existing names (such as 'system:' users).
|
||||||
|
OIDCUsernamePrefix *string `json:"oidcUsernamePrefix,omitempty" flag:"oidc-username-prefix"`
|
||||||
|
// OIDCGroupsClaim if provided, the name of a custom OpenID Connect claim for
|
||||||
|
// specifying user groups.
|
||||||
// The claim value is expected to be a string or array of strings.
|
// The claim value is expected to be a string or array of strings.
|
||||||
OIDCGroupsClaim *string `json:"oidcGroupsClaim,omitempty" flag:"oidc-groups-claim"`
|
OIDCGroupsClaim *string `json:"oidcGroupsClaim,omitempty" flag:"oidc-groups-claim"`
|
||||||
// The URL of the OpenID issuer, only HTTPS scheme will be accepted.
|
// OIDCGroupsPrefix is the prefix prepended to group claims to prevent
|
||||||
|
// clashes with existing names (such as 'system:' groups)
|
||||||
|
OIDCGroupsPrefix *string `json:"oidcGroupsPrefix,omitempty" flag:"oidc-groups-prefix"`
|
||||||
|
// OIDCIssuerURL is the URL of the OpenID issuer, only HTTPS scheme will
|
||||||
|
// be accepted.
|
||||||
// If set, it will be used to verify the OIDC JSON Web Token (JWT).
|
// If set, it will be used to verify the OIDC JSON Web Token (JWT).
|
||||||
OIDCIssuerURL *string `json:"oidcIssuerURL,omitempty" flag:"oidc-issuer-url"`
|
OIDCIssuerURL *string `json:"oidcIssuerURL,omitempty" flag:"oidc-issuer-url"`
|
||||||
// The client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.
|
// OIDCClientID is the client ID for the OpenID Connect client, must be set
|
||||||
|
// if oidc-issuer-url is set.
|
||||||
OIDCClientID *string `json:"oidcClientID,omitempty" flag:"oidc-client-id"`
|
OIDCClientID *string `json:"oidcClientID,omitempty" flag:"oidc-client-id"`
|
||||||
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
// OIDCCAFile if set, the OpenID server's certificate will be verified by one
|
||||||
|
// of the authorities in the oidc-ca-file
|
||||||
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
||||||
// The apiserver's client certificate used for outbound requests.
|
// The apiserver's client certificate used for outbound requests.
|
||||||
ProxyClientCertFile *string `json:"proxyClientCertFile,omitempty" flag:"proxy-client-cert-file"`
|
ProxyClientCertFile *string `json:"proxyClientCertFile,omitempty" flag:"proxy-client-cert-file"`
|
||||||
|
|
|
@ -228,18 +228,29 @@ type KubeAPIServerConfig struct {
|
||||||
KubeletPreferredAddressTypes []string `json:"kubeletPreferredAddressTypes,omitempty" flag:"kubelet-preferred-address-types"`
|
KubeletPreferredAddressTypes []string `json:"kubeletPreferredAddressTypes,omitempty" flag:"kubelet-preferred-address-types"`
|
||||||
// StorageBackend is the backend storage
|
// StorageBackend is the backend storage
|
||||||
StorageBackend *string `json:"storageBackend,omitempty" flag:"storage-backend"`
|
StorageBackend *string `json:"storageBackend,omitempty" flag:"storage-backend"`
|
||||||
// The OpenID claim to use as the user name.
|
// OIDCUsernameClaim is the OpenID claim to use as the user name.
|
||||||
// Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.
|
// Note that claims other than the default ('sub') is not guaranteed to be
|
||||||
|
// unique and immutable.
|
||||||
OIDCUsernameClaim *string `json:"oidcUsernameClaim,omitempty" flag:"oidc-username-claim"`
|
OIDCUsernameClaim *string `json:"oidcUsernameClaim,omitempty" flag:"oidc-username-claim"`
|
||||||
// If provided, the name of a custom OpenID Connect claim for specifying user groups.
|
// OIDCUsernamePrefix is the prefix prepended to username claims to prevent
|
||||||
|
// clashes with existing names (such as 'system:' users).
|
||||||
|
OIDCUsernamePrefix *string `json:"oidcUsernamePrefix,omitempty" flag:"oidc-username-prefix"`
|
||||||
|
// OIDCGroupsClaim if provided, the name of a custom OpenID Connect claim for
|
||||||
|
// specifying user groups.
|
||||||
// The claim value is expected to be a string or array of strings.
|
// The claim value is expected to be a string or array of strings.
|
||||||
OIDCGroupsClaim *string `json:"oidcGroupsClaim,omitempty" flag:"oidc-groups-claim"`
|
OIDCGroupsClaim *string `json:"oidcGroupsClaim,omitempty" flag:"oidc-groups-claim"`
|
||||||
// The URL of the OpenID issuer, only HTTPS scheme will be accepted.
|
// OIDCGroupsPrefix is the prefix prepended to group claims to prevent
|
||||||
|
// clashes with existing names (such as 'system:' groups)
|
||||||
|
OIDCGroupsPrefix *string `json:"oidcGroupsPrefix,omitempty" flag:"oidc-groups-prefix"`
|
||||||
|
// OIDCIssuerURL is the URL of the OpenID issuer, only HTTPS scheme will
|
||||||
|
// be accepted.
|
||||||
// If set, it will be used to verify the OIDC JSON Web Token (JWT).
|
// If set, it will be used to verify the OIDC JSON Web Token (JWT).
|
||||||
OIDCIssuerURL *string `json:"oidcIssuerURL,omitempty" flag:"oidc-issuer-url"`
|
OIDCIssuerURL *string `json:"oidcIssuerURL,omitempty" flag:"oidc-issuer-url"`
|
||||||
// The client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.
|
// OIDCClientID is the client ID for the OpenID Connect client, must be set
|
||||||
|
// if oidc-issuer-url is set.
|
||||||
OIDCClientID *string `json:"oidcClientID,omitempty" flag:"oidc-client-id"`
|
OIDCClientID *string `json:"oidcClientID,omitempty" flag:"oidc-client-id"`
|
||||||
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
// OIDCCAFile if set, the OpenID server's certificate will be verified by one
|
||||||
|
// of the authorities in the oidc-ca-file
|
||||||
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
||||||
// The apiserver's client certificate used for outbound requests.
|
// The apiserver's client certificate used for outbound requests.
|
||||||
ProxyClientCertFile *string `json:"proxyClientCertFile,omitempty" flag:"proxy-client-cert-file"`
|
ProxyClientCertFile *string `json:"proxyClientCertFile,omitempty" flag:"proxy-client-cert-file"`
|
||||||
|
|
|
@ -1851,7 +1851,9 @@ func autoConvert_v1alpha1_KubeAPIServerConfig_To_kops_KubeAPIServerConfig(in *Ku
|
||||||
out.KubeletPreferredAddressTypes = in.KubeletPreferredAddressTypes
|
out.KubeletPreferredAddressTypes = in.KubeletPreferredAddressTypes
|
||||||
out.StorageBackend = in.StorageBackend
|
out.StorageBackend = in.StorageBackend
|
||||||
out.OIDCUsernameClaim = in.OIDCUsernameClaim
|
out.OIDCUsernameClaim = in.OIDCUsernameClaim
|
||||||
|
out.OIDCUsernamePrefix = in.OIDCUsernamePrefix
|
||||||
out.OIDCGroupsClaim = in.OIDCGroupsClaim
|
out.OIDCGroupsClaim = in.OIDCGroupsClaim
|
||||||
|
out.OIDCGroupsPrefix = in.OIDCGroupsPrefix
|
||||||
out.OIDCIssuerURL = in.OIDCIssuerURL
|
out.OIDCIssuerURL = in.OIDCIssuerURL
|
||||||
out.OIDCClientID = in.OIDCClientID
|
out.OIDCClientID = in.OIDCClientID
|
||||||
out.OIDCCAFile = in.OIDCCAFile
|
out.OIDCCAFile = in.OIDCCAFile
|
||||||
|
@ -1910,7 +1912,9 @@ func autoConvert_kops_KubeAPIServerConfig_To_v1alpha1_KubeAPIServerConfig(in *ko
|
||||||
out.KubeletPreferredAddressTypes = in.KubeletPreferredAddressTypes
|
out.KubeletPreferredAddressTypes = in.KubeletPreferredAddressTypes
|
||||||
out.StorageBackend = in.StorageBackend
|
out.StorageBackend = in.StorageBackend
|
||||||
out.OIDCUsernameClaim = in.OIDCUsernameClaim
|
out.OIDCUsernameClaim = in.OIDCUsernameClaim
|
||||||
|
out.OIDCUsernamePrefix = in.OIDCUsernamePrefix
|
||||||
out.OIDCGroupsClaim = in.OIDCGroupsClaim
|
out.OIDCGroupsClaim = in.OIDCGroupsClaim
|
||||||
|
out.OIDCGroupsPrefix = in.OIDCGroupsPrefix
|
||||||
out.OIDCIssuerURL = in.OIDCIssuerURL
|
out.OIDCIssuerURL = in.OIDCIssuerURL
|
||||||
out.OIDCClientID = in.OIDCClientID
|
out.OIDCClientID = in.OIDCClientID
|
||||||
out.OIDCCAFile = in.OIDCCAFile
|
out.OIDCCAFile = in.OIDCCAFile
|
||||||
|
|
|
@ -1940,6 +1940,15 @@ func (in *KubeAPIServerConfig) DeepCopyInto(out *KubeAPIServerConfig) {
|
||||||
**out = **in
|
**out = **in
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if in.OIDCUsernamePrefix != nil {
|
||||||
|
in, out := &in.OIDCUsernamePrefix, &out.OIDCUsernamePrefix
|
||||||
|
if *in == nil {
|
||||||
|
*out = nil
|
||||||
|
} else {
|
||||||
|
*out = new(string)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
}
|
||||||
if in.OIDCGroupsClaim != nil {
|
if in.OIDCGroupsClaim != nil {
|
||||||
in, out := &in.OIDCGroupsClaim, &out.OIDCGroupsClaim
|
in, out := &in.OIDCGroupsClaim, &out.OIDCGroupsClaim
|
||||||
if *in == nil {
|
if *in == nil {
|
||||||
|
@ -1949,6 +1958,15 @@ func (in *KubeAPIServerConfig) DeepCopyInto(out *KubeAPIServerConfig) {
|
||||||
**out = **in
|
**out = **in
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if in.OIDCGroupsPrefix != nil {
|
||||||
|
in, out := &in.OIDCGroupsPrefix, &out.OIDCGroupsPrefix
|
||||||
|
if *in == nil {
|
||||||
|
*out = nil
|
||||||
|
} else {
|
||||||
|
*out = new(string)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
}
|
||||||
if in.OIDCIssuerURL != nil {
|
if in.OIDCIssuerURL != nil {
|
||||||
in, out := &in.OIDCIssuerURL, &out.OIDCIssuerURL
|
in, out := &in.OIDCIssuerURL, &out.OIDCIssuerURL
|
||||||
if *in == nil {
|
if *in == nil {
|
||||||
|
|
|
@ -228,18 +228,29 @@ type KubeAPIServerConfig struct {
|
||||||
KubeletPreferredAddressTypes []string `json:"kubeletPreferredAddressTypes,omitempty" flag:"kubelet-preferred-address-types"`
|
KubeletPreferredAddressTypes []string `json:"kubeletPreferredAddressTypes,omitempty" flag:"kubelet-preferred-address-types"`
|
||||||
// StorageBackend is the backend storage
|
// StorageBackend is the backend storage
|
||||||
StorageBackend *string `json:"storageBackend,omitempty" flag:"storage-backend"`
|
StorageBackend *string `json:"storageBackend,omitempty" flag:"storage-backend"`
|
||||||
// The OpenID claim to use as the user name.
|
// OIDCUsernameClaim is the OpenID claim to use as the user name.
|
||||||
// Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.
|
// Note that claims other than the default ('sub') is not guaranteed to be
|
||||||
|
// unique and immutable.
|
||||||
OIDCUsernameClaim *string `json:"oidcUsernameClaim,omitempty" flag:"oidc-username-claim"`
|
OIDCUsernameClaim *string `json:"oidcUsernameClaim,omitempty" flag:"oidc-username-claim"`
|
||||||
// If provided, the name of a custom OpenID Connect claim for specifying user groups.
|
// OIDCUsernamePrefix is the prefix prepended to username claims to prevent
|
||||||
|
// clashes with existing names (such as 'system:' users).
|
||||||
|
OIDCUsernamePrefix *string `json:"oidcUsernamePrefix,omitempty" flag:"oidc-username-prefix"`
|
||||||
|
// OIDCGroupsClaim if provided, the name of a custom OpenID Connect claim for
|
||||||
|
// specifying user groups.
|
||||||
// The claim value is expected to be a string or array of strings.
|
// The claim value is expected to be a string or array of strings.
|
||||||
OIDCGroupsClaim *string `json:"oidcGroupsClaim,omitempty" flag:"oidc-groups-claim"`
|
OIDCGroupsClaim *string `json:"oidcGroupsClaim,omitempty" flag:"oidc-groups-claim"`
|
||||||
// The URL of the OpenID issuer, only HTTPS scheme will be accepted.
|
// OIDCGroupsPrefix is the prefix prepended to group claims to prevent
|
||||||
|
// clashes with existing names (such as 'system:' groups)
|
||||||
|
OIDCGroupsPrefix *string `json:"oidcGroupsPrefix,omitempty" flag:"oidc-groups-prefix"`
|
||||||
|
// OIDCIssuerURL is the URL of the OpenID issuer, only HTTPS scheme will
|
||||||
|
// be accepted.
|
||||||
// If set, it will be used to verify the OIDC JSON Web Token (JWT).
|
// If set, it will be used to verify the OIDC JSON Web Token (JWT).
|
||||||
OIDCIssuerURL *string `json:"oidcIssuerURL,omitempty" flag:"oidc-issuer-url"`
|
OIDCIssuerURL *string `json:"oidcIssuerURL,omitempty" flag:"oidc-issuer-url"`
|
||||||
// The client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.
|
// OIDCClientID is the client ID for the OpenID Connect client, must be set
|
||||||
|
// if oidc-issuer-url is set.
|
||||||
OIDCClientID *string `json:"oidcClientID,omitempty" flag:"oidc-client-id"`
|
OIDCClientID *string `json:"oidcClientID,omitempty" flag:"oidc-client-id"`
|
||||||
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
// OIDCCAFile if set, the OpenID server's certificate will be verified by one
|
||||||
|
// of the authorities in the oidc-ca-file
|
||||||
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
||||||
// The apiserver's client certificate used for outbound requests.
|
// The apiserver's client certificate used for outbound requests.
|
||||||
ProxyClientCertFile *string `json:"proxyClientCertFile,omitempty" flag:"proxy-client-cert-file"`
|
ProxyClientCertFile *string `json:"proxyClientCertFile,omitempty" flag:"proxy-client-cert-file"`
|
||||||
|
|
|
@ -2113,7 +2113,9 @@ func autoConvert_v1alpha2_KubeAPIServerConfig_To_kops_KubeAPIServerConfig(in *Ku
|
||||||
out.KubeletPreferredAddressTypes = in.KubeletPreferredAddressTypes
|
out.KubeletPreferredAddressTypes = in.KubeletPreferredAddressTypes
|
||||||
out.StorageBackend = in.StorageBackend
|
out.StorageBackend = in.StorageBackend
|
||||||
out.OIDCUsernameClaim = in.OIDCUsernameClaim
|
out.OIDCUsernameClaim = in.OIDCUsernameClaim
|
||||||
|
out.OIDCUsernamePrefix = in.OIDCUsernamePrefix
|
||||||
out.OIDCGroupsClaim = in.OIDCGroupsClaim
|
out.OIDCGroupsClaim = in.OIDCGroupsClaim
|
||||||
|
out.OIDCGroupsPrefix = in.OIDCGroupsPrefix
|
||||||
out.OIDCIssuerURL = in.OIDCIssuerURL
|
out.OIDCIssuerURL = in.OIDCIssuerURL
|
||||||
out.OIDCClientID = in.OIDCClientID
|
out.OIDCClientID = in.OIDCClientID
|
||||||
out.OIDCCAFile = in.OIDCCAFile
|
out.OIDCCAFile = in.OIDCCAFile
|
||||||
|
@ -2172,7 +2174,9 @@ func autoConvert_kops_KubeAPIServerConfig_To_v1alpha2_KubeAPIServerConfig(in *ko
|
||||||
out.KubeletPreferredAddressTypes = in.KubeletPreferredAddressTypes
|
out.KubeletPreferredAddressTypes = in.KubeletPreferredAddressTypes
|
||||||
out.StorageBackend = in.StorageBackend
|
out.StorageBackend = in.StorageBackend
|
||||||
out.OIDCUsernameClaim = in.OIDCUsernameClaim
|
out.OIDCUsernameClaim = in.OIDCUsernameClaim
|
||||||
|
out.OIDCUsernamePrefix = in.OIDCUsernamePrefix
|
||||||
out.OIDCGroupsClaim = in.OIDCGroupsClaim
|
out.OIDCGroupsClaim = in.OIDCGroupsClaim
|
||||||
|
out.OIDCGroupsPrefix = in.OIDCGroupsPrefix
|
||||||
out.OIDCIssuerURL = in.OIDCIssuerURL
|
out.OIDCIssuerURL = in.OIDCIssuerURL
|
||||||
out.OIDCClientID = in.OIDCClientID
|
out.OIDCClientID = in.OIDCClientID
|
||||||
out.OIDCCAFile = in.OIDCCAFile
|
out.OIDCCAFile = in.OIDCCAFile
|
||||||
|
|
|
@ -2066,6 +2066,15 @@ func (in *KubeAPIServerConfig) DeepCopyInto(out *KubeAPIServerConfig) {
|
||||||
**out = **in
|
**out = **in
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if in.OIDCUsernamePrefix != nil {
|
||||||
|
in, out := &in.OIDCUsernamePrefix, &out.OIDCUsernamePrefix
|
||||||
|
if *in == nil {
|
||||||
|
*out = nil
|
||||||
|
} else {
|
||||||
|
*out = new(string)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
}
|
||||||
if in.OIDCGroupsClaim != nil {
|
if in.OIDCGroupsClaim != nil {
|
||||||
in, out := &in.OIDCGroupsClaim, &out.OIDCGroupsClaim
|
in, out := &in.OIDCGroupsClaim, &out.OIDCGroupsClaim
|
||||||
if *in == nil {
|
if *in == nil {
|
||||||
|
@ -2075,6 +2084,15 @@ func (in *KubeAPIServerConfig) DeepCopyInto(out *KubeAPIServerConfig) {
|
||||||
**out = **in
|
**out = **in
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if in.OIDCGroupsPrefix != nil {
|
||||||
|
in, out := &in.OIDCGroupsPrefix, &out.OIDCGroupsPrefix
|
||||||
|
if *in == nil {
|
||||||
|
*out = nil
|
||||||
|
} else {
|
||||||
|
*out = new(string)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
}
|
||||||
if in.OIDCIssuerURL != nil {
|
if in.OIDCIssuerURL != nil {
|
||||||
in, out := &in.OIDCIssuerURL, &out.OIDCIssuerURL
|
in, out := &in.OIDCIssuerURL, &out.OIDCIssuerURL
|
||||||
if *in == nil {
|
if *in == nil {
|
||||||
|
|
|
@ -2285,6 +2285,15 @@ func (in *KubeAPIServerConfig) DeepCopyInto(out *KubeAPIServerConfig) {
|
||||||
**out = **in
|
**out = **in
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if in.OIDCUsernamePrefix != nil {
|
||||||
|
in, out := &in.OIDCUsernamePrefix, &out.OIDCUsernamePrefix
|
||||||
|
if *in == nil {
|
||||||
|
*out = nil
|
||||||
|
} else {
|
||||||
|
*out = new(string)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
}
|
||||||
if in.OIDCGroupsClaim != nil {
|
if in.OIDCGroupsClaim != nil {
|
||||||
in, out := &in.OIDCGroupsClaim, &out.OIDCGroupsClaim
|
in, out := &in.OIDCGroupsClaim, &out.OIDCGroupsClaim
|
||||||
if *in == nil {
|
if *in == nil {
|
||||||
|
@ -2294,6 +2303,15 @@ func (in *KubeAPIServerConfig) DeepCopyInto(out *KubeAPIServerConfig) {
|
||||||
**out = **in
|
**out = **in
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if in.OIDCGroupsPrefix != nil {
|
||||||
|
in, out := &in.OIDCGroupsPrefix, &out.OIDCGroupsPrefix
|
||||||
|
if *in == nil {
|
||||||
|
*out = nil
|
||||||
|
} else {
|
||||||
|
*out = new(string)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
}
|
||||||
if in.OIDCIssuerURL != nil {
|
if in.OIDCIssuerURL != nil {
|
||||||
in, out := &in.OIDCIssuerURL, &out.OIDCIssuerURL
|
in, out := &in.OIDCIssuerURL, &out.OIDCIssuerURL
|
||||||
if *in == nil {
|
if *in == nil {
|
||||||
|
|
Loading…
Reference in New Issue