Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add ValidatingAdmissionWebhook for Voyager CRDs (#828)
- Loading branch information
Showing
751 changed files
with
189,539 additions
and
24 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,80 @@ | ||
--- | ||
title: Voyager Admission-Webhook | ||
menu: | ||
product_voyager_5.0.0-rc.11: | ||
identifier: voyager-admission-webhook | ||
name: Voyager Admission-Webhook | ||
parent: reference | ||
product_name: voyager | ||
menu_name: product_voyager_5.0.0-rc.11 | ||
section_menu_id: reference | ||
--- | ||
## voyager admission-webhook | ||
|
||
Launch Voyager admission webhook server | ||
|
||
### Synopsis | ||
|
||
Launch Voyager admission webhook server | ||
|
||
``` | ||
voyager admission-webhook [flags] | ||
``` | ||
|
||
### Options | ||
|
||
``` | ||
--audit-log-format string Format of saved audits. "legacy" indicates 1-line text format for each event. "json" indicates structured json format. Requires the 'AdvancedAuditing' feature gate. Known formats are legacy,json. (default "json") | ||
--audit-log-maxage int The maximum number of days to retain old audit log files based on the timestamp encoded in their filename. | ||
--audit-log-maxbackup int The maximum number of old audit log files to retain. | ||
--audit-log-maxsize int The maximum size in megabytes of the audit log file before it gets rotated. | ||
--audit-log-path string If set, all requests coming to the apiserver will be logged to this file. '-' means standard out. | ||
--audit-policy-file string Path to the file that defines the audit policy configuration. Requires the 'AdvancedAuditing' feature gate. With AdvancedAuditing, a profile is required to enable auditing. | ||
--audit-webhook-config-file string Path to a kubeconfig formatted file that defines the audit webhook configuration. Requires the 'AdvancedAuditing' feature gate. | ||
--audit-webhook-mode string Strategy for sending audit events. Blocking indicates sending events should block server responses. Batch causes the webhook to buffer and send events asynchronously. Known modes are batch,blocking. (default "batch") | ||
--authentication-kubeconfig string kubeconfig file pointing at the 'core' kubernetes server with enough rights to create tokenaccessreviews.authentication.k8s.io. | ||
--authentication-skip-lookup If false, the authentication-kubeconfig will be used to lookup missing authentication configuration from the cluster. | ||
--authentication-token-webhook-cache-ttl duration The duration to cache responses from the webhook token authenticator. (default 10s) | ||
--authorization-kubeconfig string kubeconfig file pointing at the 'core' kubernetes server with enough rights to create subjectaccessreviews.authorization.k8s.io. | ||
--authorization-webhook-cache-authorized-ttl duration The duration to cache 'authorized' responses from the webhook authorizer. (default 10s) | ||
--authorization-webhook-cache-unauthorized-ttl duration The duration to cache 'unauthorized' responses from the webhook authorizer. (default 10s) | ||
--bind-address ip The IP address on which to listen for the --secure-port port. The associated interface(s) must be reachable by the rest of the cluster, and by CLI/web clients. If blank, all interfaces will be used (0.0.0.0). (default 0.0.0.0) | ||
--cert-dir string The directory where the TLS certs are located. If --tls-cert-file and --tls-private-key-file are provided, this flag will be ignored. (default "apiserver.local.config/certificates") | ||
--client-ca-file string If set, any request presenting a client certificate signed by one of the authorities in the client-ca-file is authenticated with an identity corresponding to the CommonName of the client certificate. | ||
-c, --cloud-provider string Name of cloud provider | ||
--contention-profiling Enable lock contention profiling, if profiling is enabled | ||
--enable-swagger-ui Enables swagger ui on the apiserver at /swagger-ui | ||
-h, --help help for admission-webhook | ||
--kubeconfig string kubeconfig file pointing at the 'core' kubernetes server. | ||
--profiling Enable profiling via web interface host:port/debug/pprof/ (default true) | ||
--requestheader-allowed-names stringSlice List of client certificate common names to allow to provide usernames in headers specified by --requestheader-username-headers. If empty, any client certificate validated by the authorities in --requestheader-client-ca-file is allowed. | ||
--requestheader-client-ca-file string Root certificate bundle to use to verify client certificates on incoming requests before trusting usernames in headers specified by --requestheader-username-headers | ||
--requestheader-extra-headers-prefix stringSlice List of request header prefixes to inspect. X-Remote-Extra- is suggested. (default [x-remote-extra-]) | ||
--requestheader-group-headers stringSlice List of request headers to inspect for groups. X-Remote-Group is suggested. (default [x-remote-group]) | ||
--requestheader-username-headers stringSlice List of request headers to inspect for usernames. X-Remote-User is common. (default [x-remote-user]) | ||
--secure-port int The port on which to serve HTTPS with authentication and authorization. If 0, don't serve HTTPS at all. (default 443) | ||
--tls-ca-file string If set, this certificate authority will used for secure access from Admission Controllers. This must be a valid PEM-encoded CA bundle. Altneratively, the certificate authority can be appended to the certificate provided by --tls-cert-file. | ||
--tls-cert-file string File containing the default x509 Certificate for HTTPS. (CA cert, if any, concatenated after server cert). If HTTPS serving is enabled, and --tls-cert-file and --tls-private-key-file are not provided, a self-signed certificate and key are generated for the public address and saved to the directory specified by --cert-dir. | ||
--tls-private-key-file string File containing the default x509 private key matching --tls-cert-file. | ||
--tls-sni-cert-key namedCertKey A pair of x509 certificate and private key file paths, optionally suffixed with a list of domain patterns which are fully qualified domain names, possibly with prefixed wildcard segments. If no domain patterns are provided, the names of the certificate are extracted. Non-wildcard matches trump over wildcard matches, explicit domain patterns trump over extracted names. For multiple key/certificate pairs, use the --tls-sni-cert-key multiple times. Examples: "example.crt,example.key" or "foo.crt,foo.key:*.foo.com,foo.com". (default []) | ||
``` | ||
|
||
### Options inherited from parent commands | ||
|
||
``` | ||
--alsologtostderr log to standard error as well as files | ||
--analytics Send analytical events to Google Analytics (default true) | ||
--log.format logFormatFlag Set the log target and format. Example: "logger:syslog?appname=bob&local=7" or "logger:stdout?json=true" (default "logger:stderr") | ||
--log.level levelFlag Only log messages with the given severity or above. Valid levels: [debug, info, warn, error, fatal] (default "info") | ||
--log_backtrace_at traceLocation when logging hits line file:N, emit a stack trace (default :0) | ||
--log_dir string If non-empty, write log files in this directory | ||
--logtostderr log to standard error instead of files | ||
--stderrthreshold severity logs at or above this threshold go to stderr | ||
-v, --v Level log level for V logs | ||
--vmodule moduleSpec comma-separated list of pattern=N settings for file-filtered logging | ||
``` | ||
|
||
### SEE ALSO | ||
|
||
* [voyager](/docs/reference/voyager.md) - Voyager by Appscode - Secure Ingress Controller for Kubernetes | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.