Documentation
¶
Index ¶
- Constants
- Variables
- func DisableNamespaceOwnershipFromEnv() *bool
- func EnsureLabelSelectorExpressions(current *metav1.LabelSelector, want *metav1.LabelSelector) *metav1.LabelSelector
- func MakeErrorStatus(reason string, args ...any) *admissionv1.AdmissionResponse
- func NameFromEnv() string
- func PortFromEnv(defaultPort int) int
- func SecretNameFromEnv(defaultSecretName string) string
- func TLSMinVersionFromEnv(defaultTLSMinVersion uint16) uint16
- func WithOptions(ctx context.Context, opt Options) context.Context
- type AdmissionController
- type ConversionController
- type Operation
- type Options
- type StatelessAdmissionController
- type StatelessAdmissionImpl
- type Webhook
Constants ¶
const ( // AdmissionReviewUID is the key used to represent the admission review // request/response UID in logs AdmissionReviewUID = "admissionreview/uid" // AdmissionReviewAllowed is the key used to represent whether or not // the admission request was permitted in logs AdmissionReviewAllowed = "admissionreview/allowed" // AdmissionReviewResult is the key used to represent extra details into // why an admission request was denied in logs AdmissionReviewResult = "admissionreview/result" // AdmissionReviewPatchType is the key used to represent the type of Patch in logs AdmissionReviewPatchType = "admissionreview/patchtype" )
const ( WebhookTypeAdmission = "admission" WebhookTypeDefaulting = "defaulting" WebhookTypeValidation = "validation" WebhookTypeConversion = "conversion" )
Variables ¶
var ( // WebhookType is an attribute that specifies whether the type of webhook is an admission // eg. (defaulting/validation) or conversion WebhookTypeAttr = attributekey.String("kn.webhook.type") GroupAttr = attributekey.String("kn.webhook.resource.group") VersionAttr = attributekey.String("kn.webhook.resource.version") KindAttr = attributekey.String("kn.webhook.resource.kind") SubresourceAttr = attributekey.String("kn.webhook.subresource") OperationAttr = attributekey.String("kn.webhook.operation.type") StatusAttr = attributekey.String("kn.webhook.operation.status") )
Functions ¶
func DisableNamespaceOwnershipFromEnv ¶
func DisableNamespaceOwnershipFromEnv() *bool
func EnsureLabelSelectorExpressions ¶
func EnsureLabelSelectorExpressions( current *metav1.LabelSelector, want *metav1.LabelSelector, ) *metav1.LabelSelector
EnsureLabelSelectorExpressions merges the current label selector's MatchExpressions with the ones wanted. It keeps all non-knative keys intact, removes all knative-keys no longer wanted and adds all knative-keys not yet there.
func MakeErrorStatus ¶
func MakeErrorStatus(reason string, args ...any) *admissionv1.AdmissionResponse
MakeErrorStatus creates an 'BadRequest' error AdmissionResponse
func NameFromEnv ¶
func NameFromEnv() string
func PortFromEnv ¶
PortFromEnv returns the webhook port set by portEnvKey, or default port if env var is not set.
func SecretNameFromEnv ¶
func TLSMinVersionFromEnv ¶
Types ¶
type AdmissionController ¶
type AdmissionController interface { // Path returns the path that this particular admission controller serves on. Path() string // Admit is the callback which is invoked when an HTTPS request comes in on Path(). Admit(context.Context, *admissionv1.AdmissionRequest) *admissionv1.AdmissionResponse }
AdmissionController provides the interface for different admission controllers
type ConversionController ¶
type ConversionController interface { // Path returns the path that this particular conversion controller serves on. Path() string // Convert is the callback which is invoked when an HTTPS request comes in on Path(). Convert(context.Context, *apixv1.ConversionRequest) *apixv1.ConversionResponse }
ConversionController provides the interface for different conversion controllers
type Operation ¶
type Operation = admissionv1.Operation
Operation is the verb being operated on it is aliased in Validation from the k8s admission package
const ( Create Operation = admissionv1.Create Update Operation = admissionv1.Update Delete Operation = admissionv1.Delete Connect Operation = admissionv1.Connect )
Operation types
type Options ¶
type Options struct { // TLSMinVersion contains the minimum TLS version that is acceptable to communicate with the API server. // TLS 1.3 is the minimum version if not specified otherwise. TLSMinVersion uint16 // ServiceName is the service name of the webhook. ServiceName string // SecretName is the name of k8s secret that contains the webhook // server key/cert and corresponding CA cert that signed them. The // server key/cert are used to serve the webhook and the CA cert // is provided to k8s apiserver during admission controller // registration. // If no SecretName is provided, then the webhook serves without TLS. SecretName string // ServerPrivateKeyName is the name for the webhook secret's data key e.g. `tls.key`. // Default value is `server-key.pem` if no value is passed. ServerPrivateKeyName string // ServerCertificateName is the name for the webhook secret's ca data key e.g. `tls.crt`. // Default value is `server-cert.pem` if no value is passed. ServerCertificateName string // Port where the webhook is served. Per k8s admission // registration requirements this should be 443 unless there is // only a single port for the service. Port int // GracePeriod is how long to wait after failing readiness probes // before shutting down. GracePeriod time.Duration // DisableNamespaceOwnership configures if the SYSTEM_NAMESPACE is added as an owner reference to the // webhook configuration resources. Overridden by the WEBHOOK_DISABLE_NAMESPACE_OWNERSHIP environment variable. // Disabling can be useful to avoid breaking systems that expect ownership to indicate a true controller // relationship: https://github.com/knative/serving/issues/15483 DisableNamespaceOwnership bool // ControllerOptions encapsulates options for creating a new controller, // including throttling and stats behavior. ControllerOptions *controller.ControllerOptions // EnableHTTP2 enables HTTP2 for webhooks. // Mitigate CVE-2023-44487 by disabling HTTP2 by default until the Go // standard library and golang.org/x/net are fully fixed. // Right now, it is possible for authenticated and unauthenticated users to // hold open HTTP2 connections and consume huge amounts of memory. // See: // * https://github.com/kubernetes/kubernetes/pull/121120 // * https://github.com/kubernetes/kubernetes/issues/121197 // * https://github.com/golang/go/issues/63417#issuecomment-1758858612 EnableHTTP2 bool // MeterProvider is used to configure the MeterProvider used by the webhook // If nil it will use the global meter provider MeterProvider metric.MeterProvider // TracerProvider is used to config the TracerProvider used by the webhook // if nil it will use the global tracer provider TracerProvider trace.TracerProvider // TextMapPropagator is used to configure the TextMapPropagator used by the webhook // if nil it will use the global text map propagator TextMapPropagator propagation.TextMapPropagator }
Options contains the configuration for the webhook
func GetOptions ¶
GetOptions retrieves webhook.Options associated with the given context via WithOptions (above).
type StatelessAdmissionController ¶
type StatelessAdmissionController interface {
// A silly name that should avoid collisions.
ThisTypeDoesNotDependOnInformerState()
}
StatelessAdmissionController is implemented by AdmissionControllers where Admit may be safely called before informers have finished syncing. This is implemented by inlining StatelessAdmissionImpl in your Go type.
type StatelessAdmissionImpl ¶
type StatelessAdmissionImpl struct{}
StatelessAdmissionImpl marks a reconciler as stateless. Inline this type to implement StatelessAdmissionController.
func (StatelessAdmissionImpl) ThisTypeDoesNotDependOnInformerState ¶
func (sai StatelessAdmissionImpl) ThisTypeDoesNotDependOnInformerState()
type Webhook ¶
type Webhook struct { Options Options Logger *zap.SugaredLogger // contains filtered or unexported fields }
Webhook implements the external webhook for validation of resources and configuration.
func (*Webhook) InformersHaveSynced ¶
func (wh *Webhook) InformersHaveSynced()
InformersHaveSynced is called when the informers have all been synced, which allows any outstanding admission webhooks through.
Source Files
¶
Directories
¶
Path | Synopsis |
---|---|
Package psbinding provides facilities to make authoring Bindings that work with "Pod Spec"-able subjects easier.
|
Package psbinding provides facilities to make authoring Bindings that work with "Pod Spec"-able subjects easier. |