const configMapNamespace …
const configMapName …
type Controller …
type ClusterAuthenticationInfo …
func NewClusterAuthenticationTrustController(requiredAuthenticationData ClusterAuthenticationInfo, kubeClient kubernetes.Interface) *Controller { … }
func (c *Controller) syncConfigMap() error { … }
func createNamespaceIfNeeded(nsClient corev1client.NamespacesGetter, ns string) error { … }
func writeConfigMap(configMapClient corev1client.ConfigMapsGetter, required *corev1.ConfigMap) error { … }
func combinedClusterAuthenticationInfo(lhs, rhs ClusterAuthenticationInfo) (ClusterAuthenticationInfo, error) { … }
func getConfigMapDataFor(authenticationInfo ClusterAuthenticationInfo) (map[string]string, error) { … }
func getClusterAuthenticationInfoFor(data map[string]string) (ClusterAuthenticationInfo, error) { … }
func jsonSerializeStringSlice(in []string) (string, error) { … }
func jsonDeserializeStringSlice(in string) (headerrequest.StringSliceProvider, error) { … }
func combineUniqueStringSlices(lhs, rhs headerrequest.StringSliceProvider) headerrequest.StringSliceProvider { … }
func combineCertLists(lhs, rhs dynamiccertificates.CAContentProvider) (dynamiccertificates.CAContentProvider, error) { … }
func filterExpiredCerts(certs ...*x509.Certificate) []*x509.Certificate { … }
func (c *Controller) Enqueue() { … }
func (c *Controller) Run(ctx context.Context, workers int) { … }
func (c *Controller) runWorker() { … }
func (c *Controller) processNextWorkItem() bool { … }
func keyFn() string { … }
func encodeCertificates(certs ...*x509.Certificate) ([]byte, error) { … }