-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtypes.go
393 lines (323 loc) · 19.4 KB
/
types.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
package v1
import (
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
buildv1 "github.com/openshift/api/build/v1"
configv1 "github.com/openshift/api/config/v1"
)
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
// Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
// +openshift:compatibility-gen:level=4
// +openshift:compatibility-gen:internal
type OpenShiftAPIServerConfig struct {
metav1.TypeMeta `json:",inline"`
// provides the standard apiserver configuration
configv1.GenericAPIServerConfig `json:",inline"`
// aggregatorConfig contains information about how to verify the aggregator front proxy
AggregatorConfig FrontProxyConfig `json:"aggregatorConfig"`
// imagePolicyConfig feeds the image policy admission plugin
ImagePolicyConfig ImagePolicyConfig `json:"imagePolicyConfig"`
// projectConfig feeds an admission plugin
ProjectConfig ProjectConfig `json:"projectConfig"`
// routingConfig holds information about routing and route generation
RoutingConfig RoutingConfig `json:"routingConfig"`
// serviceAccountOAuthGrantMethod is used for determining client authorization for service account oauth client.
// It must be either: deny, prompt, or ""
ServiceAccountOAuthGrantMethod GrantHandlerType `json:"serviceAccountOAuthGrantMethod"`
// jenkinsPipelineConfig holds information about the default Jenkins template
// used for JenkinsPipeline build strategy.
// TODO this needs to become a normal plugin config
JenkinsPipelineConfig JenkinsPipelineConfig `json:"jenkinsPipelineConfig"`
// cloudProviderFile points to the cloud config file
// TODO this needs to become a normal plugin config
CloudProviderFile string `json:"cloudProviderFile"`
// TODO this needs to be removed.
APIServerArguments map[string][]string `json:"apiServerArguments"`
}
type FrontProxyConfig struct {
// clientCA is a path to the CA bundle to use to verify the common name of the front proxy's client cert
ClientCA string `json:"clientCA"`
// allowedNames is an optional list of common names to require a match from.
AllowedNames []string `json:"allowedNames"`
// usernameHeaders is the set of headers to check for the username
UsernameHeaders []string `json:"usernameHeaders"`
// groupHeaders is the set of headers to check for groups
GroupHeaders []string `json:"groupHeaders"`
// extraHeaderPrefixes is the set of header prefixes to check for user extra
ExtraHeaderPrefixes []string `json:"extraHeaderPrefixes"`
}
type GrantHandlerType string
const (
// GrantHandlerAuto auto-approves client authorization grant requests
GrantHandlerAuto GrantHandlerType = "auto"
// GrantHandlerPrompt prompts the user to approve new client authorization grant requests
GrantHandlerPrompt GrantHandlerType = "prompt"
// GrantHandlerDeny auto-denies client authorization grant requests
GrantHandlerDeny GrantHandlerType = "deny"
)
// RoutingConfig holds the necessary configuration options for routing to subdomains
type RoutingConfig struct {
// subdomain is the suffix appended to $service.$namespace. to form the default route hostname
// DEPRECATED: This field is being replaced by routers setting their own defaults. This is the
// "default" route.
Subdomain string `json:"subdomain"`
}
type ImagePolicyConfig struct {
// maxImagesBulkImportedPerRepository controls the number of images that are imported when a user
// does a bulk import of a container repository. This number is set low to prevent users from
// importing large numbers of images accidentally. Set -1 for no limit.
MaxImagesBulkImportedPerRepository int `json:"maxImagesBulkImportedPerRepository"`
// allowedRegistriesForImport limits the container image registries that normal users may import
// images from. Set this list to the registries that you trust to contain valid Docker
// images and that you want applications to be able to import from. Users with
// permission to create Images or ImageStreamMappings via the API are not affected by
// this policy - typically only administrators or system integrations will have those
// permissions.
AllowedRegistriesForImport AllowedRegistries `json:"allowedRegistriesForImport"`
// internalRegistryHostname sets the hostname for the default internal image
// registry. The value must be in "hostname[:port]" format.
// For backward compatibility, users can still use OPENSHIFT_DEFAULT_REGISTRY
// environment variable but this setting overrides the environment variable.
InternalRegistryHostname string `json:"internalRegistryHostname"`
// externalRegistryHostnames provides the hostnames for the default external image
// registry. The external hostname should be set only when the image registry
// is exposed externally. The first value is used in 'publicDockerImageRepository'
// field in ImageStreams. The value must be in "hostname[:port]" format.
ExternalRegistryHostnames []string `json:"externalRegistryHostnames"`
// additionalTrustedCA is a path to a pem bundle file containing additional CAs that
// should be trusted during imagestream import.
AdditionalTrustedCA string `json:"additionalTrustedCA"`
}
// AllowedRegistries represents a list of registries allowed for the image import.
type AllowedRegistries []RegistryLocation
// RegistryLocation contains a location of the registry specified by the registry domain
// name. The domain name might include wildcards, like '*' or '??'.
type RegistryLocation struct {
// DomainName specifies a domain name for the registry
// In case the registry use non-standard (80 or 443) port, the port should be included
// in the domain name as well.
DomainName string `json:"domainName"`
// Insecure indicates whether the registry is secure (https) or insecure (http)
// By default (if not specified) the registry is assumed as secure.
Insecure bool `json:"insecure,omitempty"`
}
type ProjectConfig struct {
// defaultNodeSelector holds default project node label selector
DefaultNodeSelector string `json:"defaultNodeSelector"`
// projectRequestMessage is the string presented to a user if they are unable to request a project via the projectrequest api endpoint
ProjectRequestMessage string `json:"projectRequestMessage"`
// projectRequestTemplate is the template to use for creating projects in response to projectrequest.
// It is in the format namespace/template and it is optional.
// If it is not specified, a default template is used.
ProjectRequestTemplate string `json:"projectRequestTemplate"`
}
// JenkinsPipelineConfig holds configuration for the Jenkins pipeline strategy
type JenkinsPipelineConfig struct {
// autoProvisionEnabled determines whether a Jenkins server will be spawned from the provided
// template when the first build config in the project with type JenkinsPipeline
// is created. When not specified this option defaults to true.
AutoProvisionEnabled *bool `json:"autoProvisionEnabled"`
// templateNamespace contains the namespace name where the Jenkins template is stored
TemplateNamespace string `json:"templateNamespace"`
// templateName is the name of the default Jenkins template
TemplateName string `json:"templateName"`
// serviceName is the name of the Jenkins service OpenShift uses to detect
// whether a Jenkins pipeline handler has already been installed in a project.
// This value *must* match a service name in the provided template.
ServiceName string `json:"serviceName"`
// parameters specifies a set of optional parameters to the Jenkins template.
Parameters map[string]string `json:"parameters"`
}
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
// Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
// +openshift:compatibility-gen:level=4
// +openshift:compatibility-gen:internal
type OpenShiftControllerManagerConfig struct {
metav1.TypeMeta `json:",inline"`
KubeClientConfig configv1.KubeClientConfig `json:"kubeClientConfig"`
// servingInfo describes how to start serving
ServingInfo *configv1.HTTPServingInfo `json:"servingInfo"`
// leaderElection defines the configuration for electing a controller instance to make changes to
// the cluster. If unspecified, the ControllerTTL value is checked to determine whether the
// legacy direct etcd election code will be used.
LeaderElection configv1.LeaderElection `json:"leaderElection"`
// controllers is a list of controllers to enable. '*' enables all on-by-default controllers, 'foo' enables the controller "+
// named 'foo', '-foo' disables the controller named 'foo'.
// Defaults to "*".
Controllers []string `json:"controllers"`
ResourceQuota ResourceQuotaControllerConfig `json:"resourceQuota"`
ServiceServingCert ServiceServingCert `json:"serviceServingCert"`
Deployer DeployerControllerConfig `json:"deployer"`
Build BuildControllerConfig `json:"build"`
ServiceAccount ServiceAccountControllerConfig `json:"serviceAccount"`
DockerPullSecret DockerPullSecretControllerConfig `json:"dockerPullSecret"`
Network NetworkControllerConfig `json:"network"`
Ingress IngressControllerConfig `json:"ingress"`
ImageImport ImageImportControllerConfig `json:"imageImport"`
SecurityAllocator SecurityAllocator `json:"securityAllocator"`
// featureGates are the set of extra OpenShift feature gates for openshift-controller-manager.
// These feature gates can be used to enable features that are tech preview or otherwise not available on
// OpenShift by default.
FeatureGates []string `json:"featureGates"`
}
type DeployerControllerConfig struct {
ImageTemplateFormat ImageConfig `json:"imageTemplateFormat"`
}
type BuildControllerConfig struct {
ImageTemplateFormat ImageConfig `json:"imageTemplateFormat"`
BuildDefaults *BuildDefaultsConfig `json:"buildDefaults"`
BuildOverrides *BuildOverridesConfig `json:"buildOverrides"`
// additionalTrustedCA is a path to a pem bundle file containing additional CAs that
// should be trusted for image pushes and pulls during builds.
AdditionalTrustedCA string `json:"additionalTrustedCA"`
}
type ResourceQuotaControllerConfig struct {
ConcurrentSyncs int32 `json:"concurrentSyncs"`
SyncPeriod metav1.Duration `json:"syncPeriod"`
MinResyncPeriod metav1.Duration `json:"minResyncPeriod"`
}
type IngressControllerConfig struct {
// ingressIPNetworkCIDR controls the range to assign ingress ips from for services of type LoadBalancer on bare
// metal. If empty, ingress ips will not be assigned. It may contain a single CIDR that will be allocated from.
// For security reasons, you should ensure that this range does not overlap with the CIDRs reserved for external ips,
// nodes, pods, or services.
IngressIPNetworkCIDR string `json:"ingressIPNetworkCIDR"`
}
// MasterNetworkConfig to be passed to the compiled in network plugin
type NetworkControllerConfig struct {
NetworkPluginName string `json:"networkPluginName"`
// clusterNetworks contains a list of cluster networks that defines the global overlay networks L3 space.
ClusterNetworks []ClusterNetworkEntry `json:"clusterNetworks"`
ServiceNetworkCIDR string `json:"serviceNetworkCIDR"`
VXLANPort uint32 `json:"vxlanPort"`
}
type ServiceAccountControllerConfig struct {
// managedNames is a list of service account names that will be auto-created in every namespace.
// If no names are specified, the ServiceAccountsController will not be started.
ManagedNames []string `json:"managedNames"`
}
type DockerPullSecretControllerConfig struct {
// registryURLs is a list of urls that the docker pull secrets should be valid for.
RegistryURLs []string `json:"registryURLs"`
// internalRegistryHostname is the hostname for the default internal image
// registry. The value must be in "hostname[:port]" format. Docker pull secrets
// will be generated for this registry.
InternalRegistryHostname string `json:"internalRegistryHostname"`
}
type ImageImportControllerConfig struct {
// maxScheduledImageImportsPerMinute is the maximum number of image streams that will be imported in the background per minute.
// The default value is 60. Set to -1 for unlimited.
MaxScheduledImageImportsPerMinute int `json:"maxScheduledImageImportsPerMinute"`
// disableScheduledImport allows scheduled background import of images to be disabled.
DisableScheduledImport bool `json:"disableScheduledImport"`
// scheduledImageImportMinimumIntervalSeconds is the minimum number of seconds that can elapse between when image streams
// scheduled for background import are checked against the upstream repository. The default value is 15 minutes.
ScheduledImageImportMinimumIntervalSeconds int `json:"scheduledImageImportMinimumIntervalSeconds"`
}
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
// BuildDefaultsConfig controls the default information for Builds
//
// Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
// +openshift:compatibility-gen:level=4
// +openshift:compatibility-gen:internal
type BuildDefaultsConfig struct {
metav1.TypeMeta `json:",inline"`
// gitHTTPProxy is the location of the HTTPProxy for Git source
GitHTTPProxy string `json:"gitHTTPProxy,omitempty"`
// gitHTTPSProxy is the location of the HTTPSProxy for Git source
GitHTTPSProxy string `json:"gitHTTPSProxy,omitempty"`
// gitNoProxy is the list of domains for which the proxy should not be used
GitNoProxy string `json:"gitNoProxy,omitempty"`
// env is a set of default environment variables that will be applied to the
// build if the specified variables do not exist on the build
Env []corev1.EnvVar `json:"env,omitempty"`
// sourceStrategyDefaults are default values that apply to builds using the
// source strategy.
SourceStrategyDefaults *SourceStrategyDefaultsConfig `json:"sourceStrategyDefaults,omitempty"`
// imageLabels is a list of labels that are applied to the resulting image.
// User can override a default label by providing a label with the same name in their
// Build/BuildConfig.
ImageLabels []buildv1.ImageLabel `json:"imageLabels,omitempty"`
// nodeSelector is a selector which must be true for the build pod to fit on a node
NodeSelector map[string]string `json:"nodeSelector,omitempty"`
// annotations are annotations that will be added to the build pod
Annotations map[string]string `json:"annotations,omitempty"`
// resources defines resource requirements to execute the build.
Resources corev1.ResourceRequirements `json:"resources,omitempty"`
}
// SourceStrategyDefaultsConfig contains values that apply to builds using the
// source strategy.
type SourceStrategyDefaultsConfig struct {
// incremental indicates if s2i build strategies should perform an incremental
// build or not
Incremental *bool `json:"incremental,omitempty"`
}
// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
// BuildOverridesConfig controls override settings for builds
//
// Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
// +openshift:compatibility-gen:level=4
// +openshift:compatibility-gen:internal
type BuildOverridesConfig struct {
metav1.TypeMeta `json:",inline"`
// forcePull overrides, if set, the equivalent value in the builds,
// i.e. false disables force pull for all builds,
// true enables force pull for all builds,
// independently of what each build specifies itself
// +optional
ForcePull *bool `json:"forcePull,omitempty"`
// imageLabels is a list of labels that are applied to the resulting image.
// If user provided a label in their Build/BuildConfig with the same name as one in this
// list, the user's label will be overwritten.
ImageLabels []buildv1.ImageLabel `json:"imageLabels,omitempty"`
// nodeSelector is a selector which must be true for the build pod to fit on a node
NodeSelector map[string]string `json:"nodeSelector,omitempty"`
// annotations are annotations that will be added to the build pod
Annotations map[string]string `json:"annotations,omitempty"`
// tolerations is a list of Tolerations that will override any existing
// tolerations set on a build pod.
Tolerations []corev1.Toleration `json:"tolerations,omitempty"`
}
// ImageConfig holds the necessary configuration options for building image names for system components
type ImageConfig struct {
// Format is the format of the name to be built for the system component
Format string `json:"format"`
// Latest determines if the latest tag will be pulled from the registry
Latest bool `json:"latest"`
}
// ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for
// pods fulfilling a service to serve with.
type ServiceServingCert struct {
// Signer holds the signing information used to automatically sign serving certificates.
// If this value is nil, then certs are not signed automatically.
Signer *configv1.CertInfo `json:"signer"`
}
// ClusterNetworkEntry defines an individual cluster network. The CIDRs cannot overlap with other cluster network CIDRs, CIDRs reserved for external ips, CIDRs reserved for service networks, and CIDRs reserved for ingress ips.
type ClusterNetworkEntry struct {
// CIDR defines the total range of a cluster networks address space.
CIDR string `json:"cidr"`
// HostSubnetLength is the number of bits of the accompanying CIDR address to allocate to each node. eg, 8 would mean that each node would have a /24 slice of the overlay network for its pod.
HostSubnetLength uint32 `json:"hostSubnetLength"`
}
// SecurityAllocator controls the automatic allocation of UIDs and MCS labels to a project. If nil, allocation is disabled.
type SecurityAllocator struct {
// UIDAllocatorRange defines the total set of Unix user IDs (UIDs) that will be allocated to projects automatically, and the size of the
// block each namespace gets. For example, 1000-1999/10 will allocate ten UIDs per namespace, and will be able to allocate up to 100 blocks
// before running out of space. The default is to allocate from 1 billion to 2 billion in 10k blocks (which is the expected size of the
// ranges container images will use once user namespaces are started).
UIDAllocatorRange string `json:"uidAllocatorRange"`
// MCSAllocatorRange defines the range of MCS categories that will be assigned to namespaces. The format is
// "<prefix>/<numberOfLabels>[,<maxCategory>]". The default is "s0/2" and will allocate from c0 -> c1023, which means a total of 535k labels
// are available (1024 choose 2 ~ 535k). If this value is changed after startup, new projects may receive labels that are already allocated
// to other projects. Prefix may be any valid SELinux set of terms (including user, role, and type), although leaving them as the default
// will allow the server to set them automatically.
//
// Examples:
// * s0:/2 - Allocate labels from s0:c0,c0 to s0:c511,c511
// * s0:/2,512 - Allocate labels from s0:c0,c0,c0 to s0:c511,c511,511
//
MCSAllocatorRange string `json:"mcsAllocatorRange"`
// MCSLabelsPerProject defines the number of labels that should be reserved per project. The default is 5 to match the default UID and MCS
// ranges (100k namespaces, 535k/5 labels).
MCSLabelsPerProject int `json:"mcsLabelsPerProject"`
}