/
0000_50_ingress-operator_00-ingresscontroller.crd.yaml
766 lines (766 loc) · 42.5 KB
/
0000_50_ingress-operator_00-ingresscontroller.crd.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
creationTimestamp: null
name: ingresscontrollers.operator.openshift.io
spec:
group: operator.openshift.io
names:
kind: IngressController
listKind: IngressControllerList
plural: ingresscontrollers
singular: ingresscontroller
preserveUnknownFields: false
scope: ""
subresources:
scale:
labelSelectorPath: .status.selector
specReplicasPath: .spec.replicas
statusReplicasPath: .status.availableReplicas
status: {}
validation:
openAPIV3Schema:
description: "IngressController describes a managed ingress controller for the
cluster. The controller can service OpenShift Route and Kubernetes Ingress
resources. \n When an IngressController is created, a new ingress controller
deployment is created to allow external traffic to reach the services that
expose Ingress or Route resources. Updating this resource may lead to disruption
for public facing network connections as a new ingress controller revision
may be rolled out. \n https://kubernetes.io/docs/concepts/services-networking/ingress-controllers
\n Whenever possible, sensible defaults for the platform are used. See each
field for more details."
properties:
apiVersion:
description: 'APIVersion defines the versioned schema of this representation
of an object. Servers should convert recognized schemas to the latest
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
type: string
kind:
description: 'Kind is a string value representing the REST resource this
object represents. Servers may infer this from the endpoint the client
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
type: string
metadata:
type: object
spec:
description: spec is the specification of the desired behavior of the IngressController.
properties:
defaultCertificate:
description: "defaultCertificate is a reference to a secret containing
the default certificate served by the ingress controller. When Routes
don't specify their own certificate, defaultCertificate is used. \n
The secret must contain the following keys and data: \n tls.crt:
certificate file contents tls.key: key file contents \n If unset,
a wildcard certificate is automatically generated and used. The certificate
is valid for the ingress controller domain (and subdomains) and the
generated certificate's CA will be automatically integrated with the
cluster's trust store. \n The in-use certificate (whether generated
or user-specified) will be automatically integrated with OpenShift's
built-in OAuth server."
properties:
name:
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?'
type: string
type: object
domain:
description: "domain is a DNS name serviced by the ingress controller
and is used to configure multiple features: \n * For the LoadBalancerService
endpoint publishing strategy, domain is used to configure DNS records.
See endpointPublishingStrategy. \n * When using a generated default
certificate, the certificate will be valid for domain and its subdomains.
See defaultCertificate. \n * The value is published to individual
Route statuses so that end-users know where to target external DNS
records. \n domain must be unique among all IngressControllers, and
cannot be updated. \n If empty, defaults to ingress.config.openshift.io/cluster
.spec.domain."
type: string
endpointPublishingStrategy:
description: "endpointPublishingStrategy is used to publish the ingress
controller endpoints to other networks, enable load balancer integrations,
etc. \n If unset, the default is based on infrastructure.config.openshift.io/cluster
.status.platform: \n AWS: LoadBalancerService (with External
scope) Azure: LoadBalancerService (with External scope) GCP:
\ LoadBalancerService (with External scope) IBMCloud: LoadBalancerService
(with External scope) Libvirt: HostNetwork \n Any other platform
types (including None) default to HostNetwork. \n endpointPublishingStrategy
cannot be updated."
properties:
hostNetwork:
description: hostNetwork holds parameters for the HostNetwork endpoint
publishing strategy. Present only if type is HostNetwork.
type: object
loadBalancer:
description: loadBalancer holds parameters for the load balancer.
Present only if type is LoadBalancerService.
properties:
scope:
description: scope indicates the scope at which the load balancer
is exposed. Possible values are "External" and "Internal".
enum:
- Internal
- External
type: string
type:
description: "aws provides configuration settings that are specific
to AWS load balancers. \n If this field is empty, the default
values are used."
properties:
type:
description: "type is the type of AWS load balancer to instantiate
for an ingress controller. \n If unspecified, \"Classic\"
is used."
enum:
- Classic
- NLB
type: string
type: object
required:
- scope
type: object
nodePort:
description: nodePort holds parameters for the NodePortService endpoint
publishing strategy. Present only if type is NodePortService.
type: object
private:
description: private holds parameters for the Private endpoint publishing
strategy. Present only if type is Private.
type: object
type:
description: "type is the publishing strategy to use. Valid values
are: \n * LoadBalancerService \n Publishes the ingress controller
using a Kubernetes LoadBalancer Service. \n In this configuration,
the ingress controller deployment uses container networking. A
LoadBalancer Service is created to publish the deployment. \n
See: https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer
\n If domain is set, a wildcard DNS record will be managed to
point at the LoadBalancer Service's external name. DNS records
are managed only in DNS zones defined by dns.config.openshift.io/cluster
.spec.publicZone and .spec.privateZone. \n Wildcard DNS management
is currently supported only on the AWS, Azure, and GCP platforms.
\n * HostNetwork \n Publishes the ingress controller on node ports
where the ingress controller is deployed. \n In this configuration,
the ingress controller deployment uses host networking, bound
to node ports 80 and 443. The user is responsible for configuring
an external load balancer to publish the ingress controller via
the node ports. \n * Private \n Does not publish the ingress controller.
\n In this configuration, the ingress controller deployment uses
container networking, and is not explicitly published. The user
must manually publish the ingress controller. \n * NodePortService
\n Publishes the ingress controller using a Kubernetes NodePort
Service. \n In this configuration, the ingress controller deployment
uses container networking. A NodePort Service is created to publish
the deployment. The specific node ports are dynamically allocated
by OpenShift; however, to support static port allocations, user
changes to the node port field of the managed NodePort Service
will preserved."
enum:
- LoadBalancerService
- HostNetwork
- Private
- NodePortService
type: string
required:
- type
type: object
logging:
description: logging defines parameters for what should be logged where. If
this field is empty, operational logs are enabled but access logs
are disabled.
properties:
access:
description: "access describes how the client requests should be
logged. \n If this field is empty, access logging is disabled."
properties:
destination:
description: destination is where access logs go.
properties:
container:
description: container holds parameters for the Container
logging destination. Present only if type is Container.
type: object
syslog:
description: syslog holds parameters for a syslog endpoint. Present
only if type is Syslog.
oneOf:
- properties:
address:
format: ipv4
- properties:
address:
format: ipv6
properties:
address:
description: address is the IP address of the syslog
endpoint that receives log messages.
type: string
facility:
description: "facility specifies the syslog facility
of log messages. \n If this field is empty, the facility
is \"local1\"."
enum:
- kern
- user
- mail
- daemon
- auth
- syslog
- lpr
- news
- uucp
- cron
- auth2
- ftp
- ntp
- audit
- alert
- cron2
- local0
- local1
- local2
- local3
- local4
- local5
- local6
- local7
type: string
port:
description: port is the UDP port number of the syslog
endpoint that receives log messages.
format: int32
maximum: 65535
minimum: 1
type: integer
required:
- address
- port
type: object
type:
description: "type is the type of destination for logs.
\ It must be one of the following: \n * Container \n The
ingress operator configures the sidecar container named
\"logs\" on the ingress controller pod and configures
the ingress controller to write logs to the sidecar. The
logs are then available as container logs. The expectation
is that the administrator configures a custom logging
solution that reads logs from this sidecar. Note that
using container logs means that logs may be dropped if
the rate of logs exceeds the container runtime's or the
custom logging solution's capacity. \n * Syslog \n Logs
are sent to a syslog endpoint. The administrator must
specify an endpoint that can receive syslog messages.
\ The expectation is that the administrator has configured
a custom syslog instance."
enum:
- Container
- Syslog
type: string
required:
- type
type: object
httpLogFormat:
description: "httpLogFormat specifies the format of the log
message for an HTTP request. \n If this field is empty, log
messages use the implementation's default HTTP log format.
\ For HAProxy's default HTTP log format, see the HAProxy documentation:
http://cbonte.github.io/haproxy-dconv/2.0/configuration.html#8.2.3"
type: string
required:
- destination
type: object
type: object
namespaceSelector:
description: "namespaceSelector is used to filter the set of namespaces
serviced by the ingress controller. This is useful for implementing
shards. \n If unset, the default is no filtering."
properties:
matchExpressions:
description: matchExpressions is a list of label selector requirements.
The requirements are ANDed.
items:
description: A label selector requirement is a selector that contains
values, a key, and an operator that relates the key and values.
properties:
key:
description: key is the label key that the selector applies
to.
type: string
operator:
description: operator represents a key's relationship to a
set of values. Valid operators are In, NotIn, Exists and
DoesNotExist.
type: string
values:
description: values is an array of string values. If the operator
is In or NotIn, the values array must be non-empty. If the
operator is Exists or DoesNotExist, the values array must
be empty. This array is replaced during a strategic merge
patch.
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
description: matchLabels is a map of {key,value} pairs. A single
{key,value} in the matchLabels map is equivalent to an element
of matchExpressions, whose key field is "key", the operator is
"In", and the values array contains only "value". The requirements
are ANDed.
type: object
type: object
nodePlacement:
description: "nodePlacement enables explicit control over the scheduling
of the ingress controller. \n If unset, defaults are used. See NodePlacement
for more details."
properties:
nodeSelector:
description: "nodeSelector is the node selector applied to ingress
controller deployments. \n If unset, the default is: \n beta.kubernetes.io/os:
linux node-role.kubernetes.io/worker: '' \n If set, the specified
selector is used and replaces the default."
properties:
matchExpressions:
description: matchExpressions is a list of label selector requirements.
The requirements are ANDed.
items:
description: A label selector requirement is a selector that
contains values, a key, and an operator that relates the
key and values.
properties:
key:
description: key is the label key that the selector applies
to.
type: string
operator:
description: operator represents a key's relationship
to a set of values. Valid operators are In, NotIn, Exists
and DoesNotExist.
type: string
values:
description: values is an array of string values. If the
operator is In or NotIn, the values array must be non-empty.
If the operator is Exists or DoesNotExist, the values
array must be empty. This array is replaced during a
strategic merge patch.
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
description: matchLabels is a map of {key,value} pairs. A single
{key,value} in the matchLabels map is equivalent to an element
of matchExpressions, whose key field is "key", the operator
is "In", and the values array contains only "value". The requirements
are ANDed.
type: object
type: object
tolerations:
description: "tolerations is a list of tolerations applied to ingress
controller deployments. \n The default is an empty list. \n See
https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/"
items:
description: The pod this Toleration is attached to tolerates
any taint that matches the triple <key,value,effect> using the
matching operator <operator>.
properties:
effect:
description: Effect indicates the taint effect to match. Empty
means match all taint effects. When specified, allowed values
are NoSchedule, PreferNoSchedule and NoExecute.
type: string
key:
description: Key is the taint key that the toleration applies
to. Empty means match all taint keys. If the key is empty,
operator must be Exists; this combination means to match
all values and all keys.
type: string
operator:
description: Operator represents a key's relationship to the
value. Valid operators are Exists and Equal. Defaults to
Equal. Exists is equivalent to wildcard for value, so that
a pod can tolerate all taints of a particular category.
type: string
tolerationSeconds:
description: TolerationSeconds represents the period of time
the toleration (which must be of effect NoExecute, otherwise
this field is ignored) tolerates the taint. By default,
it is not set, which means tolerate the taint forever (do
not evict). Zero and negative values will be treated as
0 (evict immediately) by the system.
format: int64
type: integer
value:
description: Value is the taint value the toleration matches
to. If the operator is Exists, the value should be empty,
otherwise just a regular string.
type: string
type: object
type: array
type: object
replicas:
description: replicas is the desired number of ingress controller replicas.
If unset, defaults to 2.
format: int32
type: integer
routeAdmission:
description: "routeAdmission defines a policy for handling new route
claims (for example, to allow or deny claims across namespaces). \n
If empty, defaults will be applied. See specific routeAdmission fields
for details about their defaults."
properties:
namespaceOwnership:
description: "namespaceOwnership describes how host name claims
across namespaces should be handled. \n Value must be one of:
\n - Strict: Do not allow routes in different namespaces to claim
the same host. \n - InterNamespaceAllowed: Allow routes to claim
different paths of the same host name across namespaces. \n
If empty, the default is Strict."
enum:
- InterNamespaceAllowed
- Strict
type: string
wildcardPolicy:
description: "wildcardPolicy describes how routes with wildcard
policies should be handled for the ingress controller. WildcardPolicy
controls use of routes [1] exposed by the ingress controller based
on the route's wildcard policy. \n [1] https://github.com/openshift/api/blob/master/route/v1/types.go
\n Note: Updating WildcardPolicy from WildcardsAllowed to WildcardsDisallowed
will cause admitted routes with a wildcard policy of Subdomain
to stop working. These routes must be updated to a wildcard policy
of None to be readmitted by the ingress controller. \n WildcardPolicy
supports WildcardsAllowed and WildcardsDisallowed values. \n If
empty, defaults to \"WildcardsDisallowed\"."
enum:
- WildcardsAllowed
- WildcardsDisallowed
type: string
type: object
routeSelector:
description: "routeSelector is used to filter the set of Routes serviced
by the ingress controller. This is useful for implementing shards.
\n If unset, the default is no filtering."
properties:
matchExpressions:
description: matchExpressions is a list of label selector requirements.
The requirements are ANDed.
items:
description: A label selector requirement is a selector that contains
values, a key, and an operator that relates the key and values.
properties:
key:
description: key is the label key that the selector applies
to.
type: string
operator:
description: operator represents a key's relationship to a
set of values. Valid operators are In, NotIn, Exists and
DoesNotExist.
type: string
values:
description: values is an array of string values. If the operator
is In or NotIn, the values array must be non-empty. If the
operator is Exists or DoesNotExist, the values array must
be empty. This array is replaced during a strategic merge
patch.
items:
type: string
type: array
required:
- key
- operator
type: object
type: array
matchLabels:
additionalProperties:
type: string
description: matchLabels is a map of {key,value} pairs. A single
{key,value} in the matchLabels map is equivalent to an element
of matchExpressions, whose key field is "key", the operator is
"In", and the values array contains only "value". The requirements
are ANDed.
type: object
type: object
tlsSecurityProfile:
description: "tlsSecurityProfile specifies settings for TLS connections
for ingresscontrollers. \n If unset, the default is based on the apiservers.config.openshift.io/cluster
resource. \n Note that when using the Old, Intermediate, and Modern
profile types, the effective profile configuration is subject to change
between releases. For example, given a specification to use the Intermediate
profile deployed on release X.Y.Z, an upgrade to release X.Y.Z+1 may
cause a new profile configuration to be applied to the ingress controller,
resulting in a rollout. \n Note that the minimum TLS version for ingress
controllers is 1.1, and the maximum TLS version is 1.2. An implication
of this restriction is that the Modern TLS profile type cannot be
used because it requires TLS 1.3."
properties:
custom:
description: "custom is a user-defined TLS security profile. Be
extremely careful using a custom profile as invalid configurations
can be catastrophic. An example custom profile looks like this:
\n ciphers: - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305
\ - ECDHE-RSA-AES128-GCM-SHA256 - ECDHE-ECDSA-AES128-GCM-SHA256
\ minTLSVersion: TLSv1.1"
nullable: true
properties:
ciphers:
description: "ciphers is used to specify the cipher algorithms
that are negotiated during the TLS handshake. Operators may
remove entries their operands do not support. For example,
to use DES-CBC3-SHA (yaml): \n ciphers: - DES-CBC3-SHA"
items:
type: string
type: array
minTLSVersion:
description: "minTLSVersion is used to specify the minimal version
of the TLS protocol that is negotiated during the TLS handshake.
For example, to use TLS versions 1.1, 1.2 and 1.3 (yaml):
\n minTLSVersion: TLSv1.1 \n NOTE: currently the highest
minTLSVersion allowed is VersionTLS12"
enum:
- VersionTLS10
- VersionTLS11
- VersionTLS12
- VersionTLS13
type: string
type: object
intermediate:
description: "intermediate is a TLS security profile based on: \n
https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29
\n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256
\ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256
\ - ECDHE-ECDSA-AES128-GCM-SHA256 - ECDHE-RSA-AES128-GCM-SHA256
\ - ECDHE-ECDSA-AES256-GCM-SHA384 - ECDHE-RSA-AES256-GCM-SHA384
\ - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305
\ - DHE-RSA-AES128-GCM-SHA256 - DHE-RSA-AES256-GCM-SHA384
\ minTLSVersion: TLSv1.2"
nullable: true
type: object
modern:
description: "modern is a TLS security profile based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility
\n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256
\ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256
\ minTLSVersion: TLSv1.3 \n NOTE: Currently unsupported."
nullable: true
type: object
old:
description: "old is a TLS security profile based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Old_backward_compatibility
\n and looks like this (yaml): \n ciphers: - TLS_AES_128_GCM_SHA256
\ - TLS_AES_256_GCM_SHA384 - TLS_CHACHA20_POLY1305_SHA256
\ - ECDHE-ECDSA-AES128-GCM-SHA256 - ECDHE-RSA-AES128-GCM-SHA256
\ - ECDHE-ECDSA-AES256-GCM-SHA384 - ECDHE-RSA-AES256-GCM-SHA384
\ - ECDHE-ECDSA-CHACHA20-POLY1305 - ECDHE-RSA-CHACHA20-POLY1305
\ - DHE-RSA-AES128-GCM-SHA256 - DHE-RSA-AES256-GCM-SHA384
\ - DHE-RSA-CHACHA20-POLY1305 - ECDHE-ECDSA-AES128-SHA256
\ - ECDHE-RSA-AES128-SHA256 - ECDHE-ECDSA-AES128-SHA -
ECDHE-RSA-AES128-SHA - ECDHE-ECDSA-AES256-SHA384 - ECDHE-RSA-AES256-SHA384
\ - ECDHE-ECDSA-AES256-SHA - ECDHE-RSA-AES256-SHA -
DHE-RSA-AES128-SHA256 - DHE-RSA-AES256-SHA256 - AES128-GCM-SHA256
\ - AES256-GCM-SHA384 - AES128-SHA256 - AES256-SHA256
\ - AES128-SHA - AES256-SHA - DES-CBC3-SHA minTLSVersion:
TLSv1.0"
nullable: true
type: object
type:
description: "type is one of Old, Intermediate, Modern or Custom.
Custom provides the ability to specify individual TLS security
profile parameters. Old, Intermediate and Modern are TLS security
profiles based on: \n https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations
\n The profiles are intent based, so they may change over time
as new ciphers are developed and existing ciphers are found to
be insecure. Depending on precisely which ciphers are available
to a process, the list may be reduced. \n Note that the Modern
profile is currently not supported because it is not yet well
adopted by common software libraries."
enum:
- Old
- Intermediate
- Modern
- Custom
type: string
type: object
type: object
status:
description: status is the most recently observed status of the IngressController.
properties:
availableReplicas:
description: availableReplicas is number of observed available replicas
according to the ingress controller deployment.
format: int32
type: integer
conditions:
description: "conditions is a list of conditions and their status. \n
Available means the ingress controller deployment is available and
servicing route and ingress resources (i.e, .status.availableReplicas
equals .spec.replicas) \n There are additional conditions which indicate
the status of other ingress controller features and capabilities.
\n * LoadBalancerManaged - True if the following conditions are
met: * The endpoint publishing strategy requires a service load
balancer. - False if any of those conditions are unsatisfied. \n
\ * LoadBalancerReady - True if the following conditions are met:
\ * A load balancer is managed. * The load balancer is ready.
\ - False if any of those conditions are unsatisfied. \n * DNSManaged
\ - True if the following conditions are met: * The endpoint
publishing strategy and platform support DNS. * The ingress controller
domain is set. * dns.config.openshift.io/cluster configures DNS
zones. - False if any of those conditions are unsatisfied. \n *
DNSReady - True if the following conditions are met: * DNS is
managed. * DNS records have been successfully created. - False
if any of those conditions are unsatisfied."
items:
description: OperatorCondition is just the standard condition fields.
properties:
lastTransitionTime:
format: date-time
type: string
message:
type: string
reason:
type: string
status:
type: string
type:
type: string
type: object
type: array
domain:
description: domain is the actual domain in use.
type: string
endpointPublishingStrategy:
description: endpointPublishingStrategy is the actual strategy in use.
properties:
hostNetwork:
description: hostNetwork holds parameters for the HostNetwork endpoint
publishing strategy. Present only if type is HostNetwork.
type: object
loadBalancer:
description: loadBalancer holds parameters for the load balancer.
Present only if type is LoadBalancerService.
properties:
scope:
description: scope indicates the scope at which the load balancer
is exposed. Possible values are "External" and "Internal".
enum:
- Internal
- External
type: string
type:
description: "aws provides configuration settings that are specific
to AWS load balancers. \n If this field is empty, the default
values are used."
properties:
type:
description: "type is the type of AWS load balancer to instantiate
for an ingress controller. \n If unspecified, \"Classic\"
is used."
enum:
- Classic
- NLB
type: string
type: object
required:
- scope
type: object
nodePort:
description: nodePort holds parameters for the NodePortService endpoint
publishing strategy. Present only if type is NodePortService.
type: object
private:
description: private holds parameters for the Private endpoint publishing
strategy. Present only if type is Private.
type: object
type:
description: "type is the publishing strategy to use. Valid values
are: \n * LoadBalancerService \n Publishes the ingress controller
using a Kubernetes LoadBalancer Service. \n In this configuration,
the ingress controller deployment uses container networking. A
LoadBalancer Service is created to publish the deployment. \n
See: https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer
\n If domain is set, a wildcard DNS record will be managed to
point at the LoadBalancer Service's external name. DNS records
are managed only in DNS zones defined by dns.config.openshift.io/cluster
.spec.publicZone and .spec.privateZone. \n Wildcard DNS management
is currently supported only on the AWS, Azure, and GCP platforms.
\n * HostNetwork \n Publishes the ingress controller on node ports
where the ingress controller is deployed. \n In this configuration,
the ingress controller deployment uses host networking, bound
to node ports 80 and 443. The user is responsible for configuring
an external load balancer to publish the ingress controller via
the node ports. \n * Private \n Does not publish the ingress controller.
\n In this configuration, the ingress controller deployment uses
container networking, and is not explicitly published. The user
must manually publish the ingress controller. \n * NodePortService
\n Publishes the ingress controller using a Kubernetes NodePort
Service. \n In this configuration, the ingress controller deployment
uses container networking. A NodePort Service is created to publish
the deployment. The specific node ports are dynamically allocated
by OpenShift; however, to support static port allocations, user
changes to the node port field of the managed NodePort Service
will preserved."
enum:
- LoadBalancerService
- HostNetwork
- Private
- NodePortService
type: string
required:
- type
type: object
observedGeneration:
description: observedGeneration is the most recent generation observed.
format: int64
type: integer
selector:
description: selector is a label selector, in string format, for ingress
controller pods corresponding to the IngressController. The number
of matching pods should equal the value of availableReplicas.
type: string
tlsProfile:
description: tlsProfile is the TLS connection configuration that is
in effect.
properties:
ciphers:
description: "ciphers is used to specify the cipher algorithms that
are negotiated during the TLS handshake. Operators may remove
entries their operands do not support. For example, to use DES-CBC3-SHA
\ (yaml): \n ciphers: - DES-CBC3-SHA"
items:
type: string
type: array
minTLSVersion:
description: "minTLSVersion is used to specify the minimal version
of the TLS protocol that is negotiated during the TLS handshake.
For example, to use TLS versions 1.1, 1.2 and 1.3 (yaml): \n minTLSVersion:
TLSv1.1 \n NOTE: currently the highest minTLSVersion allowed is
VersionTLS12"
enum:
- VersionTLS10
- VersionTLS11
- VersionTLS12
- VersionTLS13
type: string
type: object
type: object
type: object
version: v1
versions:
- name: v1
served: true
storage: true
status:
acceptedNames:
kind: ""
plural: ""
conditions: []
storedVersions: []