Documentation ¶
Index ¶
- type CRDWaiter
- type CertificateGenerator
- type CoreCRDs
- type CoreCRDsOption
- type Initializer
- type LockObject
- type PackageInstaller
- type RootCAGenerator
- type Step
- type StoreConfigObject
- type WebhookCertificateGenerator
- type WebhookCertificateGeneratorOption
- type WebhookConfigurations
- type WebhookConfigurationsOption
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type CRDWaiter ¶
type CRDWaiter struct { Names []string Timeout time.Duration Period time.Duration // contains filtered or unexported fields }
CRDWaiter blocks the execution until all the CRDs whose names are given are deployed to the cluster.
type CertificateGenerator ¶ added in v1.7.0
type CertificateGenerator interface {
Generate(domain ...string) (key []byte, crt []byte, err error)
}
CertificateGenerator can return you TLS certificate valid for given domains.
type CoreCRDs ¶
type CoreCRDs struct { Path string Scheme *runtime.Scheme WebhookTLSSecretRef *types.NamespacedName // contains filtered or unexported fields }
CoreCRDs makes sure the CRDs are installed.
func NewCoreCRDs ¶
func NewCoreCRDs(path string, s *runtime.Scheme, opts ...CoreCRDsOption) *CoreCRDs
NewCoreCRDs returns a new *CoreCRDs.
type CoreCRDsOption ¶ added in v1.7.0
type CoreCRDsOption func(*CoreCRDs)
CoreCRDsOption configures CoreCRDs step.
func WithFs ¶ added in v1.7.0
func WithFs(fs afero.Fs) CoreCRDsOption
WithFs is used to configure the filesystem the CRDs will be read from. Its default is afero.OsFs.
func WithWebhookTLSSecretRef ¶ added in v1.7.0
func WithWebhookTLSSecretRef(nn types.NamespacedName) CoreCRDsOption
WithWebhookTLSSecretRef configures CoreCRDs with the TLS Secret name so that it can fetch it and inject the CA bundle to CRDs with webhook conversion strategy.
type Initializer ¶
type Initializer struct {
// contains filtered or unexported fields
}
Initializer makes sure the CRDs Crossplane reconciles are ready to go before starting main Crossplane routines.
type LockObject ¶
type LockObject struct{}
LockObject has the initializer for creating the Lock object.
func NewLockObject ¶
func NewLockObject() *LockObject
NewLockObject returns a new *LockObject initializer.
type PackageInstaller ¶
type PackageInstaller struct {
// contains filtered or unexported fields
}
PackageInstaller has the initializer for installing a list of packages.
func NewPackageInstaller ¶
func NewPackageInstaller(p []string, c []string) *PackageInstaller
NewPackageInstaller returns a new package installer.
type RootCAGenerator ¶ added in v1.7.0
type RootCAGenerator struct{}
RootCAGenerator generates a root CA and key that can be used by client and servers.
func NewRootCAGenerator ¶ added in v1.7.0
func NewRootCAGenerator() *RootCAGenerator
NewRootCAGenerator returns a new RootCAGenerator.
type StoreConfigObject ¶ added in v1.7.0
type StoreConfigObject struct {
// contains filtered or unexported fields
}
StoreConfigObject has the initializer for creating the default secret StoreConfig.
func NewStoreConfigObject ¶ added in v1.7.0
func NewStoreConfigObject(ns string) *StoreConfigObject
NewStoreConfigObject returns a new *StoreConfigObject initializer.
type WebhookCertificateGenerator ¶ added in v1.7.0
type WebhookCertificateGenerator struct { SecretRef types.NamespacedName ServiceNamespace string // contains filtered or unexported fields }
WebhookCertificateGenerator is an initializer step that will find the given secret and fill its tls.crt and tls.key fields with a TLS certificate that is signed for *.<namespace>.svc domains so that all webhooks in that namespace can use it.
func NewWebhookCertificateGenerator ¶ added in v1.7.0
func NewWebhookCertificateGenerator(nn types.NamespacedName, svcNamespace string, log logging.Logger, opts ...WebhookCertificateGeneratorOption) *WebhookCertificateGenerator
NewWebhookCertificateGenerator returns a new WebhookCertificateGenerator.
type WebhookCertificateGeneratorOption ¶ added in v1.7.0
type WebhookCertificateGeneratorOption func(*WebhookCertificateGenerator)
WebhookCertificateGeneratorOption is used to configure WebhookCertificateGenerator behavior.
func WithCertificateGenerator ¶ added in v1.7.0
func WithCertificateGenerator(cg CertificateGenerator) WebhookCertificateGeneratorOption
WithCertificateGenerator sets the CertificateGenerator that WebhookCertificateGenerator uses.
type WebhookConfigurations ¶ added in v1.7.0
type WebhookConfigurations struct { Path string Scheme *runtime.Scheme TLSSecretRef types.NamespacedName ServiceReference admv1.ServiceReference // contains filtered or unexported fields }
WebhookConfigurations makes sure the ValidatingWebhookConfigurations and MutatingWebhookConfiguration are installed.
func NewWebhookConfigurations ¶ added in v1.7.0
func NewWebhookConfigurations(path string, s *runtime.Scheme, tlsSecretRef types.NamespacedName, svc admv1.ServiceReference, opts ...WebhookConfigurationsOption) *WebhookConfigurations
NewWebhookConfigurations returns a new *WebhookConfigurations.
type WebhookConfigurationsOption ¶ added in v1.7.0
type WebhookConfigurationsOption func(*WebhookConfigurations)
WebhookConfigurationsOption configures WebhookConfigurations step.
func WithWebhookConfigurationsFs ¶ added in v1.7.0
func WithWebhookConfigurationsFs(fs afero.Fs) WebhookConfigurationsOption
WithWebhookConfigurationsFs is used to configure the filesystem the CRDs will be read from. Its default is afero.OsFs.