5 Commits

Author SHA1 Message Date
Sebastian Hasler
1defd007af fix certificate generation in webhook example
After bb957259da the script was broken. This commit fixes this by
respecting the format of TLS-type secrets in the script, too.
2022-12-06 18:14:03 +01:00
andyzhangx
b4c7c83df0 doc: fix spelling issues 2022-02-12 02:09:00 +00:00
kartik494
f8992bb04d Update CertificateSigningRequest apiversion 2021-11-12 10:07:34 +05:30
Ben Swartzlander
a2666d1ea9 Fix image name for example webhook, and other nitpicks
Also bump example container versions to v3.0.0, and use
k8s.gcr.io/sig-storage instead of quay.io/k8scsi.
2020-09-22 16:40:32 -04:00
Andi Li
42b6b374cf Add phase 1 of validation tightening.
https://github.com/kubernetes/enhancements/blob/master/keps/sig-storage/177-volume-snapshot/tighten-validation-webhook-crd.md

1. Ratcheting validation webhook server image
2. Controller labels invalid objects
3. Unit tests for webhook
4. Deployment README and example deployment method with certs
5. Update top-level README

Racheting validation:
1. webhook is strict on create
2. webhook is strict on updates where the existing object passes strict validation
3. webhook is relaxed on updates where the existing object fails strict validation (allows finalizer removal, status update, deletion, etc)

Additionally the validating wehook server will perform immutability
checks on scenario 2 above.
2020-08-27 20:34:21 -04:00