Documentation ¶
Overview ¶
Package initializer initializes a new installation of Crossplane.
Index ¶
- Constants
- func DNSNamesForService(service, namespace string) []string
- func DefaultDeploymentRuntimeConfig(ctx context.Context, kube client.Client) error
- type CRDWaiter
- type CertGenerator
- type CertificateGenerator
- type CertificateSigner
- type CoreCRDs
- type CoreCRDsMigrator
- type CoreCRDsOption
- type Initializer
- type LockObject
- type PackageInstaller
- type Step
- type StepFunc
- type StoreConfigObject
- type TLSCertificateGenerator
- type TLSCertificateGeneratorOption
- func TLSCertificateGeneratorWithClientSecretName(s string, subjects []string) TLSCertificateGeneratorOption
- func TLSCertificateGeneratorWithLogger(log logging.Logger) TLSCertificateGeneratorOption
- func TLSCertificateGeneratorWithOwner(owner []metav1.OwnerReference) TLSCertificateGeneratorOption
- func TLSCertificateGeneratorWithServerSecretName(s string, dnsNames []string) TLSCertificateGeneratorOption
- type WebhookConfigurations
- type WebhookConfigurationsOption
Constants ¶
const ( // RootCACertSecretName is the name of the secret that will store CA certificates and rest of the // certificates created per entities will be signed by this CA RootCACertSecretName = "crossplane-root-ca" // SecretKeyCACert is the secret key of CA certificate SecretKeyCACert = "ca.crt" )
Variables ¶
This section is empty.
Functions ¶
func DNSNamesForService ¶ added in v1.14.0
DNSNamesForService returns a list of DNS names for a given service name and namespace.
Types ¶
type CRDWaiter ¶
type CRDWaiter struct { Names []string Timeout time.Duration Period time.Duration // contains filtered or unexported fields }
CRDWaiter blocks the execution until all the CRDs whose names are given are deployed to the cluster.
type CertGenerator ¶ added in v1.12.0
type CertGenerator struct{}
CertGenerator generates a root CA and key that can be used by client and servers.
func NewCertGenerator ¶ added in v1.12.0
func NewCertGenerator() *CertGenerator
NewCertGenerator returns a new CertGenerator.
func (*CertGenerator) Generate ¶ added in v1.12.0
func (*CertGenerator) Generate(cert *x509.Certificate, signer *CertificateSigner) (key []byte, crt []byte, err error)
Generate creates TLS Secret with 10 years expiration date that is valid for the given domains.
type CertificateGenerator ¶ added in v1.7.0
type CertificateGenerator interface {
Generate(*x509.Certificate, *CertificateSigner) (key []byte, crt []byte, err error)
}
CertificateGenerator can return you TLS certificate valid for given domains.
type CertificateSigner ¶ added in v1.12.0
type CertificateSigner struct {
// contains filtered or unexported fields
}
CertificateSigner is the parent's certificate and key that will be used to sign the certificate
type CoreCRDs ¶
type CoreCRDs struct { Path string Scheme *runtime.Scheme WebhookTLSSecretRef *types.NamespacedName // contains filtered or unexported fields }
CoreCRDs makes sure the CRDs are installed.
func NewCoreCRDs ¶
func NewCoreCRDs(path string, s *runtime.Scheme, opts ...CoreCRDsOption) *CoreCRDs
NewCoreCRDs returns a new *CoreCRDs.
type CoreCRDsMigrator ¶ added in v1.13.1
type CoreCRDsMigrator struct {
// contains filtered or unexported fields
}
CoreCRDsMigrator makes sure the CRDs are using the latest storage version.
func NewCoreCRDsMigrator ¶ added in v1.13.1
func NewCoreCRDsMigrator(crdName, sourceVersion string) *CoreCRDsMigrator
NewCoreCRDsMigrator returns a new *CoreCRDsMigrator.
type CoreCRDsOption ¶ added in v1.7.0
type CoreCRDsOption func(*CoreCRDs)
CoreCRDsOption configures CoreCRDs step.
func WithFs ¶ added in v1.7.0
func WithFs(fs afero.Fs) CoreCRDsOption
WithFs is used to configure the filesystem the CRDs will be read from. Its default is afero.OsFs.
func WithWebhookTLSSecretRef ¶ added in v1.7.0
func WithWebhookTLSSecretRef(nn types.NamespacedName) CoreCRDsOption
WithWebhookTLSSecretRef configures CoreCRDs with the TLS Secret name so that it can fetch it and inject the CA bundle to CRDs with webhook conversion strategy.
type Initializer ¶
type Initializer struct {
// contains filtered or unexported fields
}
Initializer makes sure the CRDs Crossplane reconciles are ready to go before starting main Crossplane routines.
type LockObject ¶
type LockObject struct{}
LockObject has the initializer for creating the Lock object.
func NewLockObject ¶
func NewLockObject() *LockObject
NewLockObject returns a new *LockObject initializer.
type PackageInstaller ¶
type PackageInstaller struct {
// contains filtered or unexported fields
}
PackageInstaller has the initializer for installing a list of packages.
func NewPackageInstaller ¶
func NewPackageInstaller(p []string, c []string) *PackageInstaller
NewPackageInstaller returns a new package installer.
type StoreConfigObject ¶ added in v1.7.0
type StoreConfigObject struct {
// contains filtered or unexported fields
}
StoreConfigObject has the initializer for creating the default secret StoreConfig.
func NewStoreConfigObject ¶ added in v1.7.0
func NewStoreConfigObject(ns string) *StoreConfigObject
NewStoreConfigObject returns a new *StoreConfigObject initializer.
type TLSCertificateGenerator ¶ added in v1.14.0
type TLSCertificateGenerator struct {
// contains filtered or unexported fields
}
TLSCertificateGenerator is an initializer step that will find the given secret and fill its tls.crt, tls.key and ca.crt fields to be used for External Secret Store plugins
func NewTLSCertificateGenerator ¶ added in v1.14.0
func NewTLSCertificateGenerator(ns, caSecret string, opts ...TLSCertificateGeneratorOption) *TLSCertificateGenerator
NewTLSCertificateGenerator returns a new TLSCertificateGenerator.
type TLSCertificateGeneratorOption ¶ added in v1.14.0
type TLSCertificateGeneratorOption func(*TLSCertificateGenerator)
TLSCertificateGeneratorOption is used to configure TLSCertificateGenerator behavior.
func TLSCertificateGeneratorWithClientSecretName ¶ added in v1.14.0
func TLSCertificateGeneratorWithClientSecretName(s string, subjects []string) TLSCertificateGeneratorOption
TLSCertificateGeneratorWithClientSecretName returns an TLSCertificateGeneratorOption that sets client secret name.
func TLSCertificateGeneratorWithLogger ¶ added in v1.14.0
func TLSCertificateGeneratorWithLogger(log logging.Logger) TLSCertificateGeneratorOption
TLSCertificateGeneratorWithLogger returns an TLSCertificateGeneratorOption that configures logger
func TLSCertificateGeneratorWithOwner ¶ added in v1.14.0
func TLSCertificateGeneratorWithOwner(owner []metav1.OwnerReference) TLSCertificateGeneratorOption
TLSCertificateGeneratorWithOwner returns an TLSCertificateGeneratorOption that sets owner reference
func TLSCertificateGeneratorWithServerSecretName ¶ added in v1.14.0
func TLSCertificateGeneratorWithServerSecretName(s string, dnsNames []string) TLSCertificateGeneratorOption
TLSCertificateGeneratorWithServerSecretName returns an TLSCertificateGeneratorOption that sets server secret name.
type WebhookConfigurations ¶ added in v1.7.0
type WebhookConfigurations struct { Path string Scheme *runtime.Scheme TLSSecretRef types.NamespacedName ServiceReference admv1.ServiceReference // contains filtered or unexported fields }
WebhookConfigurations makes sure the ValidatingWebhookConfigurations and MutatingWebhookConfiguration are installed.
func NewWebhookConfigurations ¶ added in v1.7.0
func NewWebhookConfigurations(path string, s *runtime.Scheme, tlsSecretRef types.NamespacedName, svc admv1.ServiceReference, opts ...WebhookConfigurationsOption) *WebhookConfigurations
NewWebhookConfigurations returns a new *WebhookConfigurations.
type WebhookConfigurationsOption ¶ added in v1.7.0
type WebhookConfigurationsOption func(*WebhookConfigurations)
WebhookConfigurationsOption configures WebhookConfigurations step.
func WithWebhookConfigurationsFs ¶ added in v1.7.0
func WithWebhookConfigurationsFs(fs afero.Fs) WebhookConfigurationsOption
WithWebhookConfigurationsFs is used to configure the filesystem the CRDs will be read from. Its default is afero.OsFs.