Documentation ¶
Index ¶
- func AdaptFunc(monitor mntr.Monitor, componentLabels *labels.Component, namespace string, ...) (func(necessaryUsers map[string]string) operator.QueryFunc, ...)
- func GetReadyFunc(monitor mntr.Monitor, namespace string, secretName string, ...) func(k8sClient kubernetes.ClientInt) error
- type AssetStorage
- type Cache
- type Configuration
- type ConsoleEnv
- type DNS
- type Email
- type Notifications
- type OIDCLifetimes
- type Passwords
- type Proxy
- type Secrets
- type Subdomains
- type Tracing
- type Twilio
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func AdaptFunc ¶
func AdaptFunc( monitor mntr.Monitor, componentLabels *labels.Component, namespace string, desired *Configuration, cmName string, certPath string, secretName string, secretPath string, consoleCMName string, secretVarsName string, secretPasswordName string, getClientID func() string, dbConn db.Connection, ) ( func( necessaryUsers map[string]string, ) operator.QueryFunc, operator.DestroyFunc, func( k8sClient kubernetes.ClientInt, queried map[string]interface{}, necessaryUsers map[string]string, ) (map[string]string, error), error, )
Types ¶
type AssetStorage ¶
type AssetStorage struct { Type string `yaml:"type,omitempty"` Endpoint string `yaml:"endpoint,omitempty"` AccessKeyID *secret.Secret `yaml:"accessKeyID,omitempty"` ExistingAccessKeyID *secret.Existing `yaml:"existingAccessKeyID,omitempty"` SecretAccessKey *secret.Secret `yaml:"secretAccessKey,omitempty"` ExistingSecretAccessKey *secret.Existing `yaml:"ExistingSecretAccessKey,omitempty"` SSL bool `yaml:"ssl,omitempty"` Location string `yaml:"location,omitempty"` BucketPrefix string `yaml:"bucketPrefix,omitempty"` MultiDelete bool `yaml:"multiDelete,omitempty"` }
type Configuration ¶
type Configuration struct { Tracing *Tracing `yaml:"tracing,omitempty"` Cache *Cache `yaml:"cache,omitempty"` Secrets *Secrets `yaml:"secrets,omitempty"` Notifications *Notifications `yaml:"notifications,omitempty"` Passwords *Passwords `yaml:"passwords,omitempty"` DebugMode bool `yaml:"debugMode"` LogLevel string `yaml:"logLevel"` MigrateEventStoreV1 bool `yaml:"migrateEventstoreV1"` DNS *DNS `yaml:"dns"` ClusterDNS string `yaml:"clusterdns"` AssetStorage *AssetStorage `yaml:"assetStorage,omitempty"` Proxy *Proxy `yaml:"proxy,omitempty"` OIDCLifetimes *OIDCLifetimes `yaml:"oidcLifetimes,omitempty"` }
func (*Configuration) Validate ¶
func (c *Configuration) Validate() (err error)
type ConsoleEnv ¶
type DNS ¶
type DNS struct { Domain string `yaml:"domain"` TlsSecret string `yaml:"tlsSecret"` ACMEAuthority string `yaml:"acmeAuthority"` Subdomains *Subdomains `yaml:"subdomains"` }
type Email ¶
type Email struct { SMTPHost string `yaml:"smtpHost,omitempty"` SMTPUser string `yaml:"smtpUser,omitempty"` SenderAddress string `yaml:"senderAddress,omitempty"` SenderName string `yaml:"senderName,omitempty"` TLS bool `yaml:"tls,omitempty"` AppKey *secret.Secret `yaml:"appKey,omitempty"` ExistingAppKey *secret.Existing `yaml:"existingAppKey,omitempty"` }
type Notifications ¶
type OIDCLifetimes ¶ added in v1.87.0
type OIDCLifetimes struct { AccessTokenLifetime string `yaml:"accessTokenLifetime,omitempty"` IdTokenLifeTime string `yaml:"idTokenLifeTime,omitempty"` RefreshTokenIdleExpiration string `yaml:"refreshTokenIdleExpiration,omitempty"` RefreshTokenExpiration string `yaml:"refreshTokenExpiration,omitempty"` }
type Passwords ¶
type Passwords struct { Migration *secret.Secret `yaml:"migration"` Management *secret.Secret `yaml:"management"` Auth *secret.Secret `yaml:"auth"` Authz *secret.Secret `yaml:"authz"` Adminapi *secret.Secret `yaml:"adminapi"` Notification *secret.Secret `yaml:"notification"` Eventstore *secret.Secret `yaml:"eventstore"` Queries *secret.Secret `yaml:"queries"` ExistingMigration *secret.Existing `yaml:"existingMigration"` ExistingManagement *secret.Existing `yaml:"existingManagement"` ExistingAuth *secret.Existing `yaml:"existingAuth"` ExistingAuthz *secret.Existing `yaml:"existingAuthz"` ExistingAdminapi *secret.Existing `yaml:"existingAdminapi"` ExistingNotification *secret.Existing `yaml:"existingNotification"` ExistingEventstore *secret.Existing `yaml:"existingEventstore"` ExistingQueries *secret.Existing `yaml:"existingQueries"` }
type Secrets ¶
type Secrets struct { Keys *secret.Secret `yaml:"keys,omitempty"` ExistingKeys *secret.Existing `yaml:"existingKeys,omitempty"` UserVerificationID string `yaml:"userVerificationID,omitempty"` OTPVerificationID string `yaml:"otpVerificationID,omitempty"` OIDCKeysID string `yaml:"oidcKeysID,omitempty"` CookieID string `yaml:"cookieID,omitempty"` CSRFID string `yaml:"csrfID,omitempty"` DomainVerificationID string `yaml:"domainVerificationID,omitempty"` IDPConfigVerificationID string `yaml:"idpConfigVerificationID,omitempty"` }
type Subdomains ¶
type Tracing ¶
type Tracing struct { ServiceAccountJSON *secret.Secret `yaml:"serviceAccountJSON,omitempty"` ExistingServiceAccountJSON *secret.Existing `yaml:"existingServiceAccountJSON,omitempty"` ProjectID string `yaml:"projectID,omitempty"` Fraction string `yaml:"fraction,omitempty"` Type string `yaml:"type,omitempty"` }
Click to show internal directories.
Click to hide internal directories.