mirror of https://github.com/k3s-io/k3s
f6da3fdbe1
Proxies on a TCP port are accessible outside the current security context (eg: uid). Add support for having the proxy listen on a unix socket, which has permissions applied to it. We make sure the socket starts its life only accessible by the current user using Umask. This is useful for applications like Cockpit and other tools which want the help of kubectl to handle authentication, configuration and transport security, but also want to not make that accessible to all users on a multi-user system. |
||
---|---|---|
.. | ||
cmd | ||
resource | ||
bash_comp_utils.go | ||
describe.go | ||
describe_test.go | ||
doc.go | ||
generate.go | ||
generate_test.go | ||
interfaces.go | ||
kubectl.go | ||
proxy_server.go | ||
proxy_server_test.go | ||
resource_printer.go | ||
resource_printer_test.go | ||
rolling_updater.go | ||
rolling_updater_test.go | ||
run.go | ||
run_test.go | ||
scale.go | ||
scale_test.go | ||
service.go | ||
service_test.go | ||
sorted_event_list.go | ||
sorted_event_list_test.go | ||
sorted_resource_name_list.go | ||
stop.go | ||
stop_test.go | ||
version.go | ||
watchloop.go |