Documentation ¶
Overview ¶
Package initializer initializes a new installation of Crossplane.
Index ¶
- Constants
- type CRDWaiter
- type CertGenerator
- type CertificateGenerator
- type CertificateSigner
- type CoreCRDs
- type CoreCRDsOption
- type ESSCertificateGenerator
- type ESSCertificateGeneratorOption
- type Initializer
- type LockObject
- type PackageInstaller
- type Step
- type StoreConfigObject
- type WebhookCertificateGenerator
- type WebhookCertificateGeneratorOption
- type WebhookConfigurations
- type WebhookConfigurationsOption
Constants ¶
const ( // SecretKeyCACert is the secret key of CA certificate SecretKeyCACert = "ca.crt" // SecretKeyTLSCert is the secret key of TLS certificate SecretKeyTLSCert = "tls.crt" // SecretKeyTLSKey is the secret key of TLS key SecretKeyTLSKey = "tls.key" )
const (
// ESSCACertSecretName is the name of the secret that will store CA certificates
ESSCACertSecretName = "ess-ca-certs"
)
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type CRDWaiter ¶
type CRDWaiter struct { Names []string Timeout time.Duration Period time.Duration // contains filtered or unexported fields }
CRDWaiter blocks the execution until all the CRDs whose names are given are deployed to the cluster.
type CertGenerator ¶ added in v1.12.0
type CertGenerator struct{}
CertGenerator generates a root CA and key that can be used by client and servers.
func NewCertGenerator ¶ added in v1.12.0
func NewCertGenerator() *CertGenerator
NewCertGenerator returns a new CertGenerator.
func (*CertGenerator) Generate ¶ added in v1.12.0
func (*CertGenerator) Generate(cert *x509.Certificate, signer *CertificateSigner) (key []byte, crt []byte, err error)
Generate creates TLS Secret with 10 years expiration date that is valid for the given domains.
type CertificateGenerator ¶ added in v1.7.0
type CertificateGenerator interface {
Generate(*x509.Certificate, *CertificateSigner) (key []byte, crt []byte, err error)
}
CertificateGenerator can return you TLS certificate valid for given domains.
type CertificateSigner ¶ added in v1.12.0
type CertificateSigner struct {
// contains filtered or unexported fields
}
CertificateSigner is the parent's certificate and key that will be used to sign the certificate
type CoreCRDs ¶
type CoreCRDs struct { Path string Scheme *runtime.Scheme WebhookTLSSecretRef *types.NamespacedName // contains filtered or unexported fields }
CoreCRDs makes sure the CRDs are installed.
func NewCoreCRDs ¶
func NewCoreCRDs(path string, s *runtime.Scheme, opts ...CoreCRDsOption) *CoreCRDs
NewCoreCRDs returns a new *CoreCRDs.
type CoreCRDsOption ¶ added in v1.7.0
type CoreCRDsOption func(*CoreCRDs)
CoreCRDsOption configures CoreCRDs step.
func WithFs ¶ added in v1.7.0
func WithFs(fs afero.Fs) CoreCRDsOption
WithFs is used to configure the filesystem the CRDs will be read from. Its default is afero.OsFs.
func WithWebhookTLSSecretRef ¶ added in v1.7.0
func WithWebhookTLSSecretRef(nn types.NamespacedName) CoreCRDsOption
WithWebhookTLSSecretRef configures CoreCRDs with the TLS Secret name so that it can fetch it and inject the CA bundle to CRDs with webhook conversion strategy.
type ESSCertificateGenerator ¶ added in v1.12.0
type ESSCertificateGenerator struct {
// contains filtered or unexported fields
}
ESSCertificateGenerator is an initializer step that will find the given secret and fill its tls.crt, tls.key and ca.crt fields to be used for External Secret Store plugins
func NewESSCertificateGenerator ¶ added in v1.12.0
func NewESSCertificateGenerator(ns, clientSecret, serverSecret string, opts ...ESSCertificateGeneratorOption) *ESSCertificateGenerator
NewESSCertificateGenerator returns a new ESSCertificateGenerator.
type ESSCertificateGeneratorOption ¶ added in v1.12.0
type ESSCertificateGeneratorOption func(*ESSCertificateGenerator)
ESSCertificateGeneratorOption is used to configure ESSCertificateGenerator behavior.
func ESSCertificateGeneratorWithLogger ¶ added in v1.12.0
func ESSCertificateGeneratorWithLogger(log logging.Logger) ESSCertificateGeneratorOption
ESSCertificateGeneratorWithLogger returns an ESSCertificateGeneratorOption that configures logger
type Initializer ¶
type Initializer struct {
// contains filtered or unexported fields
}
Initializer makes sure the CRDs Crossplane reconciles are ready to go before starting main Crossplane routines.
type LockObject ¶
type LockObject struct{}
LockObject has the initializer for creating the Lock object.
func NewLockObject ¶
func NewLockObject() *LockObject
NewLockObject returns a new *LockObject initializer.
type PackageInstaller ¶
type PackageInstaller struct {
// contains filtered or unexported fields
}
PackageInstaller has the initializer for installing a list of packages.
func NewPackageInstaller ¶
func NewPackageInstaller(p []string, c []string) *PackageInstaller
NewPackageInstaller returns a new package installer.
type StoreConfigObject ¶ added in v1.7.0
type StoreConfigObject struct {
// contains filtered or unexported fields
}
StoreConfigObject has the initializer for creating the default secret StoreConfig.
func NewStoreConfigObject ¶ added in v1.7.0
func NewStoreConfigObject(ns string) *StoreConfigObject
NewStoreConfigObject returns a new *StoreConfigObject initializer.
type WebhookCertificateGenerator ¶ added in v1.7.0
type WebhookCertificateGenerator struct { SecretRef types.NamespacedName ServiceNamespace string // contains filtered or unexported fields }
WebhookCertificateGenerator is an initializer step that will find the given secret and fill its tls.crt and tls.key fields with a TLS certificate that is signed for *.<namespace>.svc domains so that all webhooks in that namespace can use it.
func NewWebhookCertificateGenerator ¶ added in v1.7.0
func NewWebhookCertificateGenerator(nn types.NamespacedName, svcNamespace string, log logging.Logger, opts ...WebhookCertificateGeneratorOption) *WebhookCertificateGenerator
NewWebhookCertificateGenerator returns a new WebhookCertificateGenerator.
type WebhookCertificateGeneratorOption ¶ added in v1.7.0
type WebhookCertificateGeneratorOption func(*WebhookCertificateGenerator)
WebhookCertificateGeneratorOption is used to configure WebhookCertificateGenerator behavior.
func WithWebhookCertificateGenerator ¶ added in v1.12.0
func WithWebhookCertificateGenerator(cg CertificateGenerator) WebhookCertificateGeneratorOption
WithWebhookCertificateGenerator sets the CertificateGenerator that WebhookCertificateGenerator uses.
type WebhookConfigurations ¶ added in v1.7.0
type WebhookConfigurations struct { Path string Scheme *runtime.Scheme TLSSecretRef types.NamespacedName ServiceReference admv1.ServiceReference // contains filtered or unexported fields }
WebhookConfigurations makes sure the ValidatingWebhookConfigurations and MutatingWebhookConfiguration are installed.
func NewWebhookConfigurations ¶ added in v1.7.0
func NewWebhookConfigurations(path string, s *runtime.Scheme, tlsSecretRef types.NamespacedName, svc admv1.ServiceReference, opts ...WebhookConfigurationsOption) *WebhookConfigurations
NewWebhookConfigurations returns a new *WebhookConfigurations.
type WebhookConfigurationsOption ¶ added in v1.7.0
type WebhookConfigurationsOption func(*WebhookConfigurations)
WebhookConfigurationsOption configures WebhookConfigurations step.
func WithWebhookConfigurationsFs ¶ added in v1.7.0
func WithWebhookConfigurationsFs(fs afero.Fs) WebhookConfigurationsOption
WithWebhookConfigurationsFs is used to configure the filesystem the CRDs will be read from. Its default is afero.OsFs.