Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add validation webhook possibility #3

Closed
buehler opened this issue May 8, 2020 · 2 comments · Fixed by #136
Closed

feat: Add validation webhook possibility #3

buehler opened this issue May 8, 2020 · 2 comments · Fixed by #136

Comments

@buehler
Copy link
Owner

buehler commented May 8, 2020

Like "kubebuilder", the operator should be able to support webhooks to validate the crds when uploaded to kubernetes

@buehler buehler added the enhancement New feature or request label May 8, 2020
@buehler buehler changed the title Support Webhooks feat: Add migration and validation webhook possibility Jan 19, 2021
@buehler buehler changed the title feat: Add migration and validation webhook possibility feat: Add validation webhook possibility Jan 21, 2021
buehler added a commit that referenced this issue Jan 22, 2021
This closes #3.

This adds support for validation webhooks.
Validation webhooks may be implemented anywhere
with the according `IValidationWebhook{TEntity}` interface.
When registered to the operator builder, they perform
validation on entities.

During build time, a CA certificate is created
and during container startup, the corresponding server
certificate for the instance.

Signed-off-by: Christoph Bühler <cbuehler@rootd.ch>
buehler added a commit that referenced this issue Jan 22, 2021
This closes #3.

This adds support for validation webhooks.
Validation webhooks may be implemented anywhere
with the according `IValidationWebhook{TEntity}` interface.
When registered to the operator builder, they perform
validation on entities.

During build time, a CA certificate is created
and during container startup, the corresponding server
certificate for the instance.

Signed-off-by: Christoph Bühler <cbuehler@rootd.ch>
@github-actions
Copy link

🎉 This issue has been resolved in version 3.0.0-prerelease.1 🎉

The release is available on:

Your semantic-release bot 📦🚀

@github-actions
Copy link

github-actions bot commented Feb 8, 2021

🎉 This issue has been resolved in version 3.0.0 🎉

The release is available on:

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant