Documentation
¶
Overview ¶
Package webhook is the internal version of the webhook config API. +groupName=webhook.config.cert-manager.io
Index ¶
Constants ¶
This section is empty.
Variables ¶
var ( SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes) AddToScheme = SchemeBuilder.AddToScheme )
var SchemeGroupVersion = schema.GroupVersion{Group: webhook.GroupName, Version: runtime.APIVersionInternal}
SchemeGroupVersion is group version used to register these objects
Functions ¶
func Resource ¶
func Resource(resource string) schema.GroupResource
Resource takes an unqualified resource and returns a Group qualified GroupResource
Types ¶
type DynamicServingConfig ¶
type DynamicServingConfig struct {
// Namespace of the Kubernetes Secret resource containing the TLS certificate
// used as a CA to sign dynamic serving certificates.
SecretNamespace string
// Namespace of the Kubernetes Secret resource containing the TLS certificate
// used as a CA to sign dynamic serving certificates.
SecretName string
// DNSNames that must be present on serving certificates signed by the CA.
DNSNames []string
}
DynamicServingConfig makes the webhook generate a CA and persist it into Secret resources. This CA will be used by all instances of the webhook for signing serving certificates.
func (*DynamicServingConfig) DeepCopy ¶
func (in *DynamicServingConfig) DeepCopy() *DynamicServingConfig
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DynamicServingConfig.
func (*DynamicServingConfig) DeepCopyInto ¶
func (in *DynamicServingConfig) DeepCopyInto(out *DynamicServingConfig)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type FilesystemServingConfig ¶
type FilesystemServingConfig struct {
// Path to a file containing TLS certificate & chain to serve with
CertFile string
// Path to a file containing a TLS private key to server with
KeyFile string
}
FilesystemServingConfig enables using a certificate and private key found on the local filesystem. These files will be periodically polled in case they have changed, and dynamically reloaded.
func (*FilesystemServingConfig) DeepCopy ¶
func (in *FilesystemServingConfig) DeepCopy() *FilesystemServingConfig
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new FilesystemServingConfig.
func (*FilesystemServingConfig) DeepCopyInto ¶
func (in *FilesystemServingConfig) DeepCopyInto(out *FilesystemServingConfig)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type TLSConfig ¶
type TLSConfig struct {
// cipherSuites is the list of allowed cipher suites for the server.
// Values are from tls package constants (https://golang.org/pkg/crypto/tls/#pkg-constants).
// If not specified, the default for the Go version will be used and may change over time.
CipherSuites []string
// minTLSVersion is the minimum TLS version supported.
// Values are from tls package constants (https://golang.org/pkg/crypto/tls/#pkg-constants).
// If not specified, the default for the Go version will be used and may change over time.
MinTLSVersion string
// Filesystem enables using a certificate and private key found on the local filesystem.
// These files will be periodically polled in case they have changed, and dynamically reloaded.
Filesystem FilesystemServingConfig
// When Dynamic serving is enabled, the webhook will generate a CA used to sign webhook
// certificates and persist it into a Kubernetes Secret resource (for other replicas of the
// webhook to consume).
// It will then generate a certificate in-memory for itself using this CA to serve with.
// The CAs certificate can then be copied into the appropriate Validating, Mutating and Conversion
// webhook configuration objects (typically by cainjector).
Dynamic DynamicServingConfig
}
TLSConfig configures how TLS certificates are sourced for serving. Only one of 'filesystem' or 'dynamic' may be specified.
func (*TLSConfig) DeepCopy ¶
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TLSConfig.
func (*TLSConfig) DeepCopyInto ¶
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*TLSConfig) DynamicConfigProvided ¶
func (*TLSConfig) FilesystemConfigProvided ¶
type WebhookConfiguration ¶
type WebhookConfiguration struct {
metav1.TypeMeta
// securePort is the port number to listen on for secure TLS connections from the kube-apiserver.
// Defaults to 6443.
SecurePort *int
// healthzPort is the port number to listen on (using plaintext HTTP) for healthz connections.
// Defaults to 6080.
HealthzPort *int
// tlsConfig is used to configure the secure listener's TLS settings.
TLSConfig TLSConfig
// kubeConfig is the kubeconfig file used to connect to the Kubernetes apiserver.
// If not specified, the webhook will attempt to load the in-cluster-config.
KubeConfig string
// apiServerHost is used to override the API server connection address.
// Deprecated: use `kubeConfig` instead.
APIServerHost string
// enablePprof configures whether pprof is enabled.
EnablePprof bool
// pprofAddress configures the address on which /debug/pprof endpoint will be served if enabled.
// Defaults to 'localhost:6060'.
PprofAddress string
// featureGates is a map of feature names to bools that enable or disable experimental
// features.
// Default: nil
// +optional
FeatureGates map[string]bool
}
func (*WebhookConfiguration) DeepCopy ¶
func (in *WebhookConfiguration) DeepCopy() *WebhookConfiguration
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WebhookConfiguration.
func (*WebhookConfiguration) DeepCopyInto ¶
func (in *WebhookConfiguration) DeepCopyInto(out *WebhookConfiguration)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*WebhookConfiguration) DeepCopyObject ¶
func (in *WebhookConfiguration) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
Directories
¶
| Path | Synopsis |
|---|---|
|
Package install installs the API group, making it available as an option to all of the API encoding/decoding machinery.
|
Package install installs the API group, making it available as an option to all of the API encoding/decoding machinery. |
|
+groupName=webhook.config.cert-manager.io
|
+groupName=webhook.config.cert-manager.io |