origin

package module
v4.1.0+incompatible Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 1, 2019 License: Apache-2.0 Imports: 0 Imported by: 0

README

OKD: The Origin Community Distribution of Kubernetes

Go Report Card GoDoc Travis Jenkins Licensed under Apache License version 2.0

OKD is the Origin community distribution of Kubernetes optimized for continuous application development and multi-tenant deployment. OKD adds developer and operations-centric tools on top of Kubernetes to enable rapid application development, easy deployment and scaling, and long-term lifecycle maintenance for small and large teams. OKD is also referred to as Origin in github and in the documentation.

Watch the full asciicast

Features:

  • Easily build applications with integrated service discovery and persistent storage.
  • Quickly and easily scale applications to handle periods of increased demand.
    • Support for automatic high availability, load balancing, health checking, and failover.
  • Push source code to your Git repository and automatically deploy containerized applications.
  • Web console and command-line client for building and monitoring applications.
  • Centralized administration and management of an entire stack, team, or organization.
    • Create reusable templates for components of your system, and iteratively deploy them over time.
    • Roll out modifications to software stacks to your entire organization in a controlled fashion.
    • Integration with your existing authentication mechanisms, including LDAP, Active Directory, and public OAuth providers such as GitHub.
  • Multi-tenancy support, including team and user isolation of containers, builds, and network communication.
    • Allow developers to run containers securely with fine-grained controls in production.
    • Limit, track, and manage the developers and teams on the platform.
  • Integrated Docker registry, automatic edge load balancing, cluster logging, and integrated metrics.

Learn More:

For questions or feedback, reach us on IRC on #openshift-dev on Freenode or post to our mailing list.

Getting Started

Installation

If you have downloaded the client tools from the releases page, place the included binaries in your PATH.

The latest OKD Origin images are published to the Docker Hub under the openshift account at https://hub.docker.com/u/openshift/. We use a rolling tag system as of v3.9, where the :latest tag always points to the most recent alpha release on master, the v3.X tag points to the most recent build for that release (pre-release and post-release), and v3.X.Y is a stable tag for patches to a release.

Concepts

OKD builds a developer-centric workflow around Docker containers and Kubernetes runtime concepts. An Image Stream lets you easily tag, import, and publish Docker images from the integrated registry. A Build Config allows you to launch Docker builds, build directly from source code, or trigger Jenkins Pipeline jobs whenever an image stream tag is updated. A Deployment Config allows you to use custom deployment logic to rollout your application, and Kubernetes workflow objects like DaemonSets, Deployments, or StatefulSets are upgraded to automatically trigger when new images are available. Routes make it trivial to expose your Kubernetes services via a public DNS name. As an administrator, you can enable your developers to request new Projects which come with predefined roles, quotas, and security controls to fairly divide access.

For more on the underlying concepts of OKD, please see the documentation site.

OKD API

The OKD API is located on each server at https://<host>:8443/apis. OKD adds its own API groups alongside the Kubernetes APIs. For more, see the API documentation.

Kubernetes

OKD extends Kubernetes with security and other developer centric concepts. Each OKD release ships slightly after the Kubernetes release has stabilized. Version numbers are aligned - OKD v3.9 is Kubernetes v1.9.

If you're looking for more information about using Kubernetes or the lower level concepts that OKD depends on, see the following:

What can I run on OKD?

OKD is designed to run any existing Docker images. Additionally, you can define builds that will produce new Docker images using a Dockerfile.

For an easier experience running your source code, Source-to-Image (S2I) allows developers to simply provide an application source repository containing code to build and run. It works by combining an existing S2I-enabled Docker image with application source to produce a new runnable image for your application.

You can see the full list of Source-to-Image builder images and it's straightforward to create your own. Some of our available images include:

Your application image can be easily extended with a database service with our database images:

What sorts of security controls does OpenShift provide for containers?

OKD runs with the following security policy by default:

  • Containers run as a non-root unique user that is separate from other system users
    • They cannot access host resources, run privileged, or become root
    • They are given CPU and memory limits defined by the system administrator
    • Any persistent storage they access will be under a unique SELinux label, which prevents others from seeing their content
    • These settings are per project, so containers in different projects cannot see each other by default
  • Regular users can run Docker, source, and custom builds
    • By default, Docker builds can (and often do) run as root. You can control who can create Docker builds through the builds/docker and builds/custom policy resource.
  • Regular users and project admins cannot change their security quotas.

Many Docker containers expect to run as root (and therefore edit all the contents of the filesystem). The Image Author's guide gives recommendations on making your image more secure by default:

* Don't run as root
* Make directories you want to write to group-writable and owned by group id 0
* Set the net-bind capability on your executables if they need to bind to ports < 1024

If you are running your own cluster and want to run a container as root, you can grant that permission to the containers in your current project with the following command:

# Gives the default service account in the current project access to run as UID 0 (root)
oc adm add-scc-to-user anyuid -z default

See the security documentation more on confining applications.

Support for Kubernetes Alpha Features

Some features from upstream Kubernetes are not yet enabled in OKD, for reasons including supportability, security, or limitations in the upstream feature.

Kubernetes Definitions:

  • Alpha
    • The feature is available, but no guarantees are made about backwards compatibility or whether data is preserved when feature moves to Beta.
    • The feature may have significant bugs and is suitable for testing and prototyping.
    • The feature may be replaced or significantly redesigned in the future.
    • No migration to Beta is generally provided other than documentation of the change.
  • Beta
    • The feature is available and generally agreed to solve the desired solution, but may need stabilization or additional feedback.
    • The feature is potentially suitable for limited production use under constrained circumstances.
    • The feature is unlikely to be replaced or removed, although it is still possible for feature changes that require migration.

OKD uses these terms in the same fashion as Kubernetes, and adds four more:

  • Not Yet Secure
    • Features which are not yet enabled because they have significant security or stability risks to the cluster
    • Generally this applies to features which may allow escalation or denial-of-service behavior on the platform
    • In some cases this is applied to new features which have not had time for full security review
  • Potentially Insecure
    • Features that require additional work to be properly secured in a multi-user environment
    • These features are only enabled for cluster admins by default and we do not recommend enabling them for untrusted users
    • We generally try to identify and fix these within 1 release of their availability
  • Tech Preview
    • Features that are considered unsupported for various reasons are known as 'tech preview' in our documentation
    • Kubernetes Alpha and Beta features are considered tech preview, although occasionally some features will be graduated early
    • Any tech preview feature is not supported in OKD except through exemption
  • Disabled Pending Migration
    • These are features that are new in Kubernetes but which originated in OKD, and thus need migrations for existing users
    • We generally try to minimize the impact of features introduced upstream to Kubernetes on OKD users by providing seamless migration for existing clusters.
    • Generally these are addressed within 1 Kubernetes release

The list of features that qualify under these labels is described below, along with additional context for why.

Feature Kubernetes OKD Justification
Custom Resource Definitions GA (1.9) GA (3.9)
Stateful Sets GA (1.9) GA (3.9)
Deployment GA (1.9) GA (1.9)
Replica Sets GA (1.9) GA (3.9) Replica Sets perform the same function as Replication Controllers, but have a more powerful label syntax. Both ReplicationControllers and ReplicaSets can be used.
Ingress Beta (1.9) Tech Preview (3.9) OKD launched with Routes, a more full featured Ingress object. Ingress rules can be read by the router (disabled by default), but because Ingress objects reference secrets you must grant the routers access to your secrets manually. Ingress is still beta in upstream Kubernetes.
PodSecurityPolicy Beta (1.9) Tech Preview (3.9) OKD launched with SecurityContextConstraints, and then upstreamed them as PodSecurityPolicy. We plan to enable upstream PodSecurityPolicy so as to automatically migrate existing SecurityContextConstraints. PodSecurityPolicy has not yet completed a full security review, which will be part of the criteria for tech preview.
SecurityContextConstraints are a superset of PodSecurityPolicy features.
NetworkPolicy GA (1.6) GA (3.7)

Please contact us if this list omits a feature supported in Kubernetes which does not run in Origin.

Contributing

You can develop locally on your host or with a virtual machine, or if you want to just try out Origin download the latest Linux server, or Windows and Mac OS X client pre-built binaries.

First, get up and running with the Contributing Guide.

All contributions are welcome - OKD uses the Apache 2 license and does not require any contributor agreement to submit patches. Please open issues for any bugs or problems you encounter, ask questions on the OpenShift IRC channel (#openshift-dev on freenode), or get involved in the Kubernetes project at the container runtime layer.

See HACKING.md for more details on developing on Origin including how different tests are setup.

If you want to run the test suite, make sure you have your environment set up, and from the origin directory run:

# run the verifiers, unit tests, and command tests
$ make check

# run a command-line integration test suite
$ hack/test-cmd.sh

# run the integration server test suite
$ hack/test-integration.sh

# run the end-to-end test suite
$ hack/test-end-to-end.sh

# run all of the tests above
$ make test

You'll need etcd installed and on your path for the integration and end-to-end tests to run, and Docker must be installed to run the end-to-end tests. To install etcd you should be able to run:

$ hack/install-etcd.sh

Some of the components of Origin run as Docker images, including the builders and deployment tools in images/builder/docker/* and images/deploy/*. To build them locally run

$ hack/build-images.sh

To hack on the web console, check out the assets/README.md file for instructions on testing the console and building your changes.

Security Response

If you've found a security issue that you'd like to disclose confidentially please contact Red Hat's Product Security team. Details at https://access.redhat.com/security/team/contact

License

OKD is licensed under the Apache License, Version 2.0.

Documentation

Overview

This is the source repository for OpenShift Origin - the best way to build, manage, and deploy applications in the cloud. The OpenShift 3.0 codebase is based around Docker images and containers and the Kubernetes container management system.

Directories

Path Synopsis
cmd
Package cmd contains the executables for OpenShift 3.
Package cmd contains the executables for OpenShift 3.
oc
openshift
Package main contains the main executable for OpenShift 3 `openshift` which is an integrated client and server binary.
Package main contains the main executable for OpenShift 3 `openshift` which is an integrated client and server binary.
Package examples contains sample applications for trying out the concepts in OpenShift 3.
Package examples contains sample applications for trying out the concepts in OpenShift 3.
hack
pkg
Package pkg contains all of the libraries for OpenShift 3.
Package pkg contains all of the libraries for OpenShift 3.
api
Package api should not be used.
Package api should not be used.
api/legacy
legacy is a deprecated package that exists to install types into an ungroupified scheme for use reading old files by the CLI and the old oapi API server.
legacy is a deprecated package that exists to install types into an ungroupified scheme for use reading old files by the CLI and the old oapi API server.
apps
Package deploy contains logic for watching and synchronizing deployments from configuration.
Package deploy contains logic for watching and synchronizing deployments from configuration.
apps/apis/apps
+groupName=apps.openshift.io Package api is the internal version of the API.
+groupName=apps.openshift.io Package api is the internal version of the API.
apps/apis/apps/v1
+groupName=apps.openshift.io Package v1 is the v1 version of the API.
+groupName=apps.openshift.io Package v1 is the v1 version of the API.
apps/apiserver/registry/deployconfig
Package deployconfig provides Registry interface and its RESTStorage implementation for storing DeploymentConfig api objects.
Package deployconfig provides Registry interface and its RESTStorage implementation for storing DeploymentConfig api objects.
apps/apiserver/registry/deploylog
Package deploylog provides a Registry interface for retrieving deployment logs
Package deploylog provides a Registry interface for retrieving deployment logs
apps/apiserver/registry/rollback
Package rollback contains the code for generating DeploymentConfigs representing rollbacks as well as REST support for API clients.
Package rollback contains the code for generating DeploymentConfigs representing rollbacks as well as REST support for API clients.
apps/controller
Package controller contains all the controllers which taken together implement the deployment system's behavior.
Package controller contains all the controllers which taken together implement the deployment system's behavior.
apps/metrics/prometheus
Package prometheus contains code for injecting apps related metrics into the prometheus registry running in the openshift master
Package prometheus contains code for injecting apps related metrics into the prometheus registry running in the openshift master
apps/strategy
Package strategy contains implementations of core deployment strategies.
Package strategy contains implementations of core deployment strategies.
apps/strategy/support
Package support is a library of code useful to any strategy.
Package support is a library of code useful to any strategy.
authorization/apis/authorization
+groupName=authorization.openshift.io Package api is the internal version of the API.
+groupName=authorization.openshift.io Package api is the internal version of the API.
authorization/apis/authorization/internal/serviceaccount
serviceaccount is copied from k8s.io/kubernetes/pkg/serviceaccount to avoid an API dependency on k8s.io/kubernetes outside of the api types we rely upon.
serviceaccount is copied from k8s.io/kubernetes/pkg/serviceaccount to avoid an API dependency on k8s.io/kubernetes outside of the api types we rely upon.
authorization/apis/authorization/v1
+groupName=authorization.openshift.io Package v1 is the v1 version of the API.
+groupName=authorization.openshift.io Package v1 is the v1 version of the API.
authorization/generated/internalclientset
This package has the automatically generated clientset.
This package has the automatically generated clientset.
authorization/generated/internalclientset/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
authorization/generated/internalclientset/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
authorization/generated/internalclientset/typed/authorization/internalversion
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
authorization/generated/internalclientset/typed/authorization/internalversion/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
autoscaling/admission/apis/clusterresourceoverride
Package api is the internal version of the API.
Package api is the internal version of the API.
autoscaling/admission/apis/clusterresourceoverride/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
autoscaling/admission/apis/runonceduration
Package api is the internal version of the API.
Package api is the internal version of the API.
autoscaling/admission/apis/runonceduration/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
autoscaling/admission/runonceduration
Package runonceduration contains the RunOnceDuration admission control plugin.
Package runonceduration contains the RunOnceDuration admission control plugin.
build
Package build contains the OpenShift build system.
Package build contains the OpenShift build system.
build/apis/build
+groupName=build.openshift.io Package api is the internal version of the API.
+groupName=build.openshift.io Package api is the internal version of the API.
build/apis/build/v1
+groupName=build.openshift.io Package v1 is the v1 version of the API.
+groupName=build.openshift.io Package v1 is the v1 version of the API.
build/controller/build/defaults
Package defaults contains the BuildDefaults admission control plugin.
Package defaults contains the BuildDefaults admission control plugin.
build/controller/build/overrides
Package overrides contains the BuildOverrides admission control plugin.
Package overrides contains the BuildOverrides admission control plugin.
build/generator
Package generator contains the code to generate Build from BuildConfig as well as REST support to help expose the generator from an API.
Package generator contains the code to generate Build from BuildConfig as well as REST support to help expose the generator from an API.
build/metrics/prometheus
Package prometheus contains code for injecting build related metrics into the prometheus registry running in the openshift master
Package prometheus contains code for injecting build related metrics into the prometheus registry running in the openshift master
build/util
Package util contains common functions that are used by the rest of the OpenShift build system.
Package util contains common functions that are used by the rest of the OpenShift build system.
build/webhook
Package webhook contains code for managing and serving webhook services, providing post push events to trigger builds.
Package webhook contains code for managing and serving webhook services, providing post push events to trigger builds.
build/webhook/bitbucket
Package bitbucket contains webhook.Plugin implementation of bitbucket webhooks according to https://confluence.atlassian.com/bitbucket/manage-webhooks-735643732.html
Package bitbucket contains webhook.Plugin implementation of bitbucket webhooks according to https://confluence.atlassian.com/bitbucket/manage-webhooks-735643732.html
build/webhook/generic
Package generic contains webhook.Plugin implementation of a generic webhooks for use in testing and/or other ad/hoc usage
Package generic contains webhook.Plugin implementation of a generic webhooks for use in testing and/or other ad/hoc usage
build/webhook/github
Package github contains webhook.Plugin implementation of github webhooks according to https://developer.github.com/webhooks/
Package github contains webhook.Plugin implementation of github webhooks according to https://developer.github.com/webhooks/
build/webhook/gitlab
Package gitlab contains webhook.Plugin implementation of gitlab webhooks according to https://docs.gitlab.com/ce/user/project/integrations/webhooks.html
Package gitlab contains webhook.Plugin implementation of gitlab webhooks according to https://docs.gitlab.com/ce/user/project/integrations/webhooks.html
cmd/flagtypes
Package flagtypes provides types that implement the pflags.Value interface for converting command line flags to objects.
Package flagtypes provides types that implement the pflags.Value interface for converting command line flags to objects.
cmd/server/apis/config
Package api is the internal version of the API.
Package api is the internal version of the API.
cmd/server/apis/config/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
cmd/server/apis/config/v1/testing
Package testing contains types for tests.
Package testing contains types for tests.
cmd/server/etcd
Package etcd provides objects for creating an embedded etcd server process.
Package etcd provides objects for creating an embedded etcd server process.
cmd/util
Package util provides utility functions for the cmd packages.
Package util provides utility functions for the cmd packages.
image
Package image provides support for images, image repositories, and image repository mappings, including RESTStorage implementations and registries.
Package image provides support for images, image repositories, and image repository mappings, including RESTStorage implementations and registries.
image/apis/image
+groupName=image.openshift.io Package api is the internal version of the API.
+groupName=image.openshift.io Package api is the internal version of the API.
image/apis/image/docker10
Package docker10 provides types used by docker/distribution and moby/moby.
Package docker10 provides types used by docker/distribution and moby/moby.
image/apis/image/dockerpre012
Package dockerpre012 is the dockerpre012 version of the API.
Package dockerpre012 is the dockerpre012 version of the API.
image/apis/image/v1
+groupName=image.openshift.io Package v1 is the v1 version of the API.
+groupName=image.openshift.io Package v1 is the v1 version of the API.
image/apiserver/admission/apis/imagepolicy/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
image/generated/internalclientset
This package has the automatically generated clientset.
This package has the automatically generated clientset.
image/generated/internalclientset/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
image/generated/internalclientset/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
image/generated/internalclientset/typed/image/internalversion
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
image/generated/internalclientset/typed/image/internalversion/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
image/internal/digest
digest is a copy from "github.com/docker/distribution/digest" that is kept because we want to avoid the godep, this package has no non-standard dependencies, and if it changes lots of other docker registry stuff breaks.
digest is a copy from "github.com/docker/distribution/digest" that is kept because we want to avoid the godep, this package has no non-standard dependencies, and if it changes lots of other docker registry stuff breaks.
image/internal/reference
reference is a copy from "github.com/docker/distribution/reference" that is kept because we want to avoid the godep, this package has no non-standard dependencies, and if it changes lots of other docker registry stuff breaks.
reference is a copy from "github.com/docker/distribution/reference" that is kept because we want to avoid the godep, this package has no non-standard dependencies, and if it changes lots of other docker registry stuff breaks.
network
Package network provides OpenShift-internal SDN-related APIs
Package network provides OpenShift-internal SDN-related APIs
network/admission/apis/externalipranger
Package externalipranger is the internal version of the API.
Package externalipranger is the internal version of the API.
network/admission/apis/externalipranger/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
network/admission/apis/restrictedendpoints
Package restrictedendpoints is the internal version of the API.
Package restrictedendpoints is the internal version of the API.
network/admission/apis/restrictedendpoints/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
network/apis/network
+groupName=network.openshift.io Package api is the internal version of the API.
+groupName=network.openshift.io Package api is the internal version of the API.
network/apis/network/v1
+groupName=network.openshift.io Package v1 is the v1 version of the API.
+groupName=network.openshift.io Package v1 is the v1 version of the API.
network/common
Package common contains the OpenShift SDN code that is shared between master, node, and proxy
Package common contains the OpenShift SDN code that is shared between master, node, and proxy
network/master
Package master contains the OpenShift SDN code that runs on the master
Package master contains the OpenShift SDN code that runs on the master
network/node
Package node contains the OpenShift SDN networking code that runs on the nodes
Package node contains the OpenShift SDN networking code that runs on the nodes
network/proxy
Package proxy contains the OpenShift SDN code that runs as part of the service proxy
Package proxy contains the OpenShift SDN code that runs as part of the service proxy
oauth/apis/oauth
+groupName=oauth.openshift.io Package api is the internal version of the API.
+groupName=oauth.openshift.io Package api is the internal version of the API.
oauth/apis/oauth/v1
+groupName=oauth.openshift.io Package v1 is the v1 version of the API.
+groupName=oauth.openshift.io Package v1 is the v1 version of the API.
oauth/apis/oauth/validation
Package validation has functions for validating the correctness of api objects and explaining what is wrong with them when they aren't valid.
Package validation has functions for validating the correctness of api objects and explaining what is wrong with them when they aren't valid.
oauth/generated/internalclientset
This package has the automatically generated clientset.
This package has the automatically generated clientset.
oauth/generated/internalclientset/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
oauth/generated/internalclientset/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
oauth/generated/internalclientset/typed/oauth/internalversion
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
oauth/generated/internalclientset/typed/oauth/internalversion/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
oauth/osintypes
osintypes holds types that are used to interpret responses from the RangelReale osin server.
osintypes holds types that are used to interpret responses from the RangelReale osin server.
oauthserver/authenticator/password/basicauthpassword
Package basicauthpassword implements authenticator.Password by making a BasicAuth call to a remote endpoint and extracting user information from a JSON response.
Package basicauthpassword implements authenticator.Password by making a BasicAuth call to a remote endpoint and extracting user information from a JSON response.
oauthserver/authenticator/password/keystonepassword
Package keystone provide authentication via keystone.
Package keystone provide authentication via keystone.
oauthserver/oauth/external
Package external implements an OAuth flow with an external identity provider
Package external implements an OAuth flow with an external identity provider
oc/cli/admin/prune/imageprune
Package prune contains logic for pruning images and interoperating with the integrated Docker registry.
Package prune contains logic for pruning images and interoperating with the integrated Docker registry.
oc/lib
lib contains the logic of commands used by oc.
lib contains the logic of commands used by oc.
oc/lib/graph/appsgraph/analysis
Package analysis provides functions that analyse deployment configurations and setup markers that will be reported by oc status
Package analysis provides functions that analyse deployment configurations and setup markers that will be reported by oc status
oc/lib/graph/routegraph
Package graph contains graph utilities for routes
Package graph contains graph utilities for routes
oc/lib/graph/routegraph/analysis
Package analysis provides functions that analyse routes and setup markers that will be reported by oc status
Package analysis provides functions that analyse routes and setup markers that will be reported by oc status
oc/lib/graph/routegraph/nodes
Package nodes contains graph functions and types for routes
Package nodes contains graph functions and types for routes
oc/lib/newapp/app
Package app defines reference objects used to generate OpenShift API objects
Package app defines reference objects used to generate OpenShift API objects
oc/lib/newapp/dockerfile
Package dockerfile provides utilities for finding and parsing Dockerfiles
Package dockerfile provides utilities for finding and parsing Dockerfiles
oc/lib/newapp/jenkinsfile
Package jenkinsfile provides utilities for finding and parsing Jenkinsfiles
Package jenkinsfile provides utilities for finding and parsing Jenkinsfiles
oc/lib/newapp/source
Package source includes detectors for STI source repositories
Package source includes detectors for STI source repositories
openapi
package openapi contains generated openapi definitions.
package openapi contains generated openapi definitions.
project
Package project provides support for projects including RESTStorage implementations and registries.
Package project provides support for projects including RESTStorage implementations and registries.
project/apis/project
+groupName=project.openshift.io Package api is the internal version of the API.
+groupName=project.openshift.io Package api is the internal version of the API.
project/apis/project/v1
+groupName=project.openshift.io Package v1 is the v1 version of the API.
+groupName=project.openshift.io Package v1 is the v1 version of the API.
project/apiserver/admission/apis/requestlimit
Package api is the internal version of the API.
Package api is the internal version of the API.
project/apiserver/admission/apis/requestlimit/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
project/auth
Package auth provides mechanisms for enforcing authorization to Project resources in OpenShift
Package auth provides mechanisms for enforcing authorization to Project resources in OpenShift
project/generated/internalclientset
This package has the automatically generated clientset.
This package has the automatically generated clientset.
project/generated/internalclientset/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
project/generated/internalclientset/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
project/generated/internalclientset/typed/project/internalversion
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
project/generated/internalclientset/typed/project/internalversion/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
quota/apis/quota
+groupName=quota.openshift.io Package api is the internal version of the API.
+groupName=quota.openshift.io Package api is the internal version of the API.
quota/apis/quota/v1
+groupName=quota.openshift.io Package v1 is the v1 version of the API.
+groupName=quota.openshift.io Package v1 is the v1 version of the API.
quota/image
Package image implements evaluators of usage for imagestreams and images.
Package image implements evaluators of usage for imagestreams and images.
route
Package route provides support for managing and watching routes.
Package route provides support for managing and watching routes.
route/allocation
Package allocation contains all the route allocation plugins.
Package allocation contains all the route allocation plugins.
route/allocation/simple
Package simple contains the SimpleAllocation route plugin.
Package simple contains the SimpleAllocation route plugin.
route/apis/route
+groupName=route.openshift.io Package api is the internal version of the API.
+groupName=route.openshift.io Package api is the internal version of the API.
route/apis/route/v1
+groupName=route.openshift.io Package v1 is the v1 version of the API.
+groupName=route.openshift.io Package v1 is the v1 version of the API.
route/apiserver/admission
This plugin supplements upstream Ingress admission validation It takes care of current Openshift specific constraints on Ingress resources
This plugin supplements upstream Ingress admission validation It takes care of current Openshift specific constraints on Ingress resources
route/apiserver/admission/apis/ingressadmission
Package api is the internal version of the API.
Package api is the internal version of the API.
route/apiserver/admission/apis/ingressadmission/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
route/controller
Package controller contains all the route handling controllers.
Package controller contains all the route handling controllers.
route/controller/allocation
Package allocation contains all the route allocation controllers.
Package allocation contains all the route allocation controllers.
route/generated/internalclientset
This package has the automatically generated clientset.
This package has the automatically generated clientset.
route/generated/internalclientset/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
route/generated/internalclientset/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
route/generated/internalclientset/typed/route/internalversion
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
route/generated/internalclientset/typed/route/internalversion/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
route/generator
Package generator implements the Generator interface for routes
Package generator implements the Generator interface for routes
scheduler/admission/apis/podnodeconstraints
Package api is the internal version of the API.
Package api is the internal version of the API.
scheduler/admission/apis/podnodeconstraints/v1
Package v1 is the v1 version of the API.
Package v1 is the v1 version of the API.
security/apis/security
+groupName=security.openshift.io Package api is the internal version of the API.
+groupName=security.openshift.io Package api is the internal version of the API.
security/apis/security/v1
+groupName=security.openshift.io Package v1 is the v1 version of the API.
+groupName=security.openshift.io Package v1 is the v1 version of the API.
security/apiserver/registry/securitycontextconstraints
Package securitycontextconstraints provides Registry interface and its REST implementation for storing SecurityContextConstraints api objects.
Package securitycontextconstraints provides Registry interface and its REST implementation for storing SecurityContextConstraints api objects.
security/generated/internalclientset
This package has the automatically generated clientset.
This package has the automatically generated clientset.
security/generated/internalclientset/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
security/generated/internalclientset/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
security/generated/internalclientset/typed/security/internalversion
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
security/generated/internalclientset/typed/security/internalversion/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
security/securitycontextconstraints/selinux
Package selinux contains security context constraints SELinux strategy implementations.
Package selinux contains security context constraints SELinux strategy implementations.
security/securitycontextconstraints/user
Package user contains security context constraints user strategy implementations.
Package user contains security context constraints user strategy implementations.
template/apis/template
+groupName=template.openshift.io Package api is the internal version of the API.
+groupName=template.openshift.io Package api is the internal version of the API.
template/apis/template/v1
+groupName=template.openshift.io Package v1 is the v1 version of the API.
+groupName=template.openshift.io Package v1 is the v1 version of the API.
template/apis/template/validation
Package validation has functions for validating the correctness of Template objects and explaining what is wrong with them when they aren't valid.
Package validation has functions for validating the correctness of Template objects and explaining what is wrong with them when they aren't valid.
template/generated/internalclientset
This package has the automatically generated clientset.
This package has the automatically generated clientset.
template/generated/internalclientset/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
template/generated/internalclientset/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
template/generated/internalclientset/typed/template/internalversion
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
template/generated/internalclientset/typed/template/internalversion/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
template/generator
Package generator defines GeneratorInterface interface and implements some random value generators.
Package generator defines GeneratorInterface interface and implements some random value generators.
template/generator/examples
Package examples demonstrates possible implementation of some random value generators.
Package examples demonstrates possible implementation of some random value generators.
template/servicebroker/apis/config
+groupName=config.templateservicebroker.openshift.io
+groupName=config.templateservicebroker.openshift.io
template/servicebroker/apis/config/v1
+groupName=config.templateservicebroker.openshift.io Package v1 is the v1 version of the API.
+groupName=config.templateservicebroker.openshift.io Package v1 is the v1 version of the API.
unidling
Package unidling supports unidling scalable resources upon network traffic to associated services
Package unidling supports unidling scalable resources upon network traffic to associated services
user/apis/user
+groupName=user.openshift.io Package api is the internal version of the API.
+groupName=user.openshift.io Package api is the internal version of the API.
user/apis/user/v1
+groupName=user.openshift.io Package v1 is the v1 version of the API.
+groupName=user.openshift.io Package v1 is the v1 version of the API.
user/generated/internalclientset
This package has the automatically generated clientset.
This package has the automatically generated clientset.
user/generated/internalclientset/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
user/generated/internalclientset/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
user/generated/internalclientset/typed/user/internalversion
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
user/generated/internalclientset/typed/user/internalversion/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
util
Package util implements various utility functions used in both testing and implementation of OpenShift.
Package util implements various utility functions used in both testing and implementation of OpenShift.
util/docker
Package docker has utilities to work with Docker.
Package docker has utilities to work with Docker.
util/docker/dockerfile
Package dockerfile has utilities that complement Docker's official Dockerfile parser.
Package dockerfile has utilities that complement Docker's official Dockerfile parser.
util/errors
Package errors provides utility functions for various errors
Package errors provides utility functions for various errors
util/file
Package file implements utility functions used to work with arbitrary files.
Package file implements utility functions used to work with arbitrary files.
util/fsnotification
Package fsnotification provides helper functions that wrap the fsnotify filesystem notification package.
Package fsnotification provides helper functions that wrap the fsnotify filesystem notification package.
util/httpproxy
Package httpproxy contains an upgrade-aware HTTP single-host reverse proxy.
Package httpproxy contains an upgrade-aware HTTP single-host reverse proxy.
util/labelselector
labelselector is trim down version of k8s/pkg/labels/selector.go It only accepts exact label matches Example: "k1=v1, k2 = v2"
labelselector is trim down version of k8s/pkg/labels/selector.go It only accepts exact label matches Example: "k1=v1, k2 = v2"
util/ovs
Package ovs provides a wrapper around ovs-vsctl and ovs-ofctl
Package ovs provides a wrapper around ovs-vsctl and ovs-ofctl
util/testing
Package testing contains testing types.
Package testing contains testing types.
version
Package version supplies version information collected at build time to OpenShift and Kubernetes components.
Package version supplies version information collected at build time to OpenShift and Kubernetes components.
Package test contains cross-functional test suites for OpenShift 3.
Package test contains cross-functional test suites for OpenShift 3.
extended
Package extended contains extended tests for OpenShift Origin
Package extended contains extended tests for OpenShift Origin
integration
Package integration contains integration tests for OpenShift Origin.
Package integration contains integration tests for OpenShift Origin.
tools

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL