Documentation ¶
Overview ¶
Package webhook is the internal version of the webhook config API. +groupName=webhook.config.cert-manager.io
Index ¶
Constants ¶
This section is empty.
Variables ¶
var ( SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes) AddToScheme = SchemeBuilder.AddToScheme )
var SchemeGroupVersion = schema.GroupVersion{Group: webhook.GroupName, Version: runtime.APIVersionInternal}
SchemeGroupVersion is group version used to register these objects
Functions ¶
func Resource ¶
func Resource(resource string) schema.GroupResource
Resource takes an unqualified resource and returns a Group qualified GroupResource
Types ¶
type DynamicServingConfig ¶
type DynamicServingConfig struct { // Namespace of the Kubernetes Secret resource containing the TLS certificate // used as a CA to sign dynamic serving certificates. SecretNamespace string // Namespace of the Kubernetes Secret resource containing the TLS certificate // used as a CA to sign dynamic serving certificates. SecretName string // DNSNames that must be present on serving certificates signed by the CA. DNSNames []string }
DynamicServingConfig makes the webhook generate a CA and persist it into Secret resources. This CA will be used by all instances of the webhook for signing serving certificates.
func (*DynamicServingConfig) DeepCopy ¶
func (in *DynamicServingConfig) DeepCopy() *DynamicServingConfig
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DynamicServingConfig.
func (*DynamicServingConfig) DeepCopyInto ¶
func (in *DynamicServingConfig) DeepCopyInto(out *DynamicServingConfig)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type FilesystemServingConfig ¶
type FilesystemServingConfig struct { // Path to a file containing TLS certificate & chain to serve with CertFile string // Path to a file containing a TLS private key to server with KeyFile string }
FilesystemServingConfig enables using a certificate and private key found on the local filesystem. These files will be periodically polled in case they have changed, and dynamically reloaded.
func (*FilesystemServingConfig) DeepCopy ¶
func (in *FilesystemServingConfig) DeepCopy() *FilesystemServingConfig
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new FilesystemServingConfig.
func (*FilesystemServingConfig) DeepCopyInto ¶
func (in *FilesystemServingConfig) DeepCopyInto(out *FilesystemServingConfig)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type TLSConfig ¶
type TLSConfig struct { // cipherSuites is the list of allowed cipher suites for the server. // Values are from tls package constants (https://golang.org/pkg/crypto/tls/#pkg-constants). // If not specified, the default for the Go version will be used and may change over time. CipherSuites []string // minTLSVersion is the minimum TLS version supported. // Values are from tls package constants (https://golang.org/pkg/crypto/tls/#pkg-constants). // If not specified, the default for the Go version will be used and may change over time. MinTLSVersion string // Filesystem enables using a certificate and private key found on the local filesystem. // These files will be periodically polled in case they have changed, and dynamically reloaded. Filesystem FilesystemServingConfig // When Dynamic serving is enabled, the webhook will generate a CA used to sign webhook // certificates and persist it into a Kubernetes Secret resource (for other replicas of the // webhook to consume). // It will then generate a certificate in-memory for itself using this CA to serve with. // The CAs certificate can then be copied into the appropriate Validating, Mutating and Conversion // webhook configuration objects (typically by cainjector). Dynamic DynamicServingConfig }
TLSConfig configures how TLS certificates are sourced for serving. Only one of 'filesystem' or 'dynamic' may be specified.
func (*TLSConfig) DeepCopy ¶
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TLSConfig.
func (*TLSConfig) DeepCopyInto ¶
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*TLSConfig) DynamicConfigProvided ¶
func (*TLSConfig) FilesystemConfigProvided ¶
type WebhookConfiguration ¶
type WebhookConfiguration struct { metav1.TypeMeta // securePort is the port number to listen on for secure TLS connections from the kube-apiserver. // Defaults to 6443. SecurePort *int // healthzPort is the port number to listen on (using plaintext HTTP) for healthz connections. // Defaults to 6080. HealthzPort *int // tlsConfig is used to configure the secure listener's TLS settings. TLSConfig TLSConfig // kubeConfig is the kubeconfig file used to connect to the Kubernetes apiserver. // If not specified, the webhook will attempt to load the in-cluster-config. KubeConfig string // apiServerHost is used to override the API server connection address. // Deprecated: use `kubeConfig` instead. APIServerHost string // enablePprof configures whether pprof is enabled. EnablePprof bool // pprofAddress configures the address on which /debug/pprof endpoint will be served if enabled. // Defaults to 'localhost:6060'. PprofAddress string // featureGates is a map of feature names to bools that enable or disable experimental // features. // Default: nil // +optional FeatureGates map[string]bool }
func (*WebhookConfiguration) DeepCopy ¶
func (in *WebhookConfiguration) DeepCopy() *WebhookConfiguration
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WebhookConfiguration.
func (*WebhookConfiguration) DeepCopyInto ¶
func (in *WebhookConfiguration) DeepCopyInto(out *WebhookConfiguration)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*WebhookConfiguration) DeepCopyObject ¶
func (in *WebhookConfiguration) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
Directories ¶
Path | Synopsis |
---|---|
Package install installs the API group, making it available as an option to all of the API encoding/decoding machinery.
|
Package install installs the API group, making it available as an option to all of the API encoding/decoding machinery. |
+groupName=webhook.config.cert-manager.io
|
+groupName=webhook.config.cert-manager.io |