You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/webhooks-short.json
+10-2Lines changed: 10 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,10 @@
7
7
"webhookName": "clusterrolebindings-validation",
8
8
"documentString": "Managed OpenShift Customers may not delete the cluster role bindings under the managed namespaces: (^openshift-.*|kube-system)"
9
9
},
10
+
{
11
+
"webhookName": "clusterroles-validation",
12
+
"documentString": "Managed OpenShift Customers may not delete protected ClusterRoles including cluster-admin, view, edit, admin, specific system roles (system:admin, system:node, system:node-proxier, system:kube-scheduler, system:kube-controller-manager), and backplane-* roles"
"documentString": "Managed OpenShift Customers may not change CustomResourceDefinitions managed by Red Hat."
@@ -25,7 +29,7 @@
25
29
},
26
30
{
27
31
"webhookName": "ingresscontroller-validation",
28
-
"documentString": "Managed OpenShift Customer may create IngressControllers without necessary taints. This can cause those workloads to be provisioned on infra or master nodes."
32
+
"documentString": "Managed OpenShift Customer may create IngressControllers without necessary taints. This can cause those workloads to be provisioned on master nodes."
29
33
},
30
34
{
31
35
"webhookName": "namespace-validation",
@@ -43,13 +47,17 @@
43
47
"webhookName": "pod-validation",
44
48
"documentString": "Managed OpenShift Customers may use tolerations on Pods that could cause those Pods to be scheduled on infra or master nodes."
45
49
},
50
+
{
51
+
"webhookName": "podimagespec-mutation",
52
+
"documentString": "OpenShift debugging tools on Managed OpenShift clusters must be available even if internal image registry is removed."
53
+
},
46
54
{
47
55
"webhookName": "prometheusrule-validation",
48
56
"documentString": "Managed OpenShift Customers may not create PrometheusRule in namespaces managed by Red Hat."
49
57
},
50
58
{
51
59
"webhookName": "regular-user-validation",
52
-
"documentString": "Managed OpenShift customers may not manage any objects in the following APIGroups [admissionregistration.k8s.io managed.openshift.io addons.managed.openshift.io ocmagent.managed.openshift.io upgrade.managed.openshift.io config.openshift.io operator.openshift.io network.openshift.io cloudcredential.openshift.io machine.openshift.io splunkforwarder.managed.openshift.io autoscaling.openshift.io cloudingress.managed.openshift.io machineconfiguration.openshift.io], nor may Managed OpenShift customers alter the APIServer, KubeAPIServer, OpenShiftAPIServer, ClusterVersion, Proxy or SubjectPermission objects."
60
+
"documentString": "Managed OpenShift customers may not manage any objects in the following APIGroups [upgrade.managed.openshift.io config.openshift.io operator.openshift.io network.openshift.io admissionregistration.k8s.io addons.managed.openshift.io cloudingress.managed.openshift.io managed.openshift.io splunkforwarder.managed.openshift.io autoscaling.openshift.io machineconfiguration.openshift.io cloudcredential.openshift.io machine.openshift.io ocmagent.managed.openshift.io], nor may Managed OpenShift customers alter the APIServer, KubeAPIServer, OpenShiftAPIServer, ClusterVersion, Proxy or SubjectPermission objects."
Copy file name to clipboardExpand all lines: docs/webhooks.json
+44-2Lines changed: 44 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,27 @@
42
42
],
43
43
"documentString": "Managed OpenShift Customers may not delete the cluster role bindings under the managed namespaces: (^openshift-.*|kube-system)"
44
44
},
45
+
{
46
+
"webhookName": "clusterroles-validation",
47
+
"rules": [
48
+
{
49
+
"operations": [
50
+
"DELETE"
51
+
],
52
+
"apiGroups": [
53
+
"rbac.authorization.k8s.io"
54
+
],
55
+
"apiVersions": [
56
+
"v1"
57
+
],
58
+
"resources": [
59
+
"clusterroles"
60
+
],
61
+
"scope": "Cluster"
62
+
}
63
+
],
64
+
"documentString": "Managed OpenShift Customers may not delete protected ClusterRoles including cluster-admin, view, edit, admin, specific system roles (system:admin, system:node, system:node-proxier, system:kube-scheduler, system:kube-controller-manager), and backplane-* roles"
"documentString": "Managed OpenShift Customer may create IngressControllers without necessary taints. This can cause those workloads to be provisioned on infra or master nodes."
199
+
"documentString": "Managed OpenShift Customer may create IngressControllers without necessary taints. This can cause those workloads to be provisioned on master nodes."
179
200
},
180
201
{
181
202
"webhookName": "namespace-validation",
@@ -268,6 +289,27 @@
268
289
],
269
290
"documentString": "Managed OpenShift Customers may use tolerations on Pods that could cause those Pods to be scheduled on infra or master nodes."
270
291
},
292
+
{
293
+
"webhookName": "podimagespec-mutation",
294
+
"rules": [
295
+
{
296
+
"operations": [
297
+
"CREATE"
298
+
],
299
+
"apiGroups": [
300
+
""
301
+
],
302
+
"apiVersions": [
303
+
"v1"
304
+
],
305
+
"resources": [
306
+
"pods"
307
+
],
308
+
"scope": "Namespaced"
309
+
}
310
+
],
311
+
"documentString": "OpenShift debugging tools on Managed OpenShift clusters must be available even if internal image registry is removed."
312
+
},
271
313
{
272
314
"webhookName": "prometheusrule-validation",
273
315
"rules": [
@@ -434,7 +476,7 @@
434
476
"scope": "*"
435
477
}
436
478
],
437
-
"documentString": "Managed OpenShift customers may not manage any objects in the following APIGroups [autoscaling.openshift.io network.openshift.io machine.openshift.io admissionregistration.k8s.io addons.managed.openshift.io cloudingress.managed.openshift.io splunkforwarder.managed.openshift.io upgrade.managed.openshift.io managed.openshift.io ocmagent.managed.openshift.io config.openshift.io machineconfiguration.openshift.io operator.openshift.io cloudcredential.openshift.io], nor may Managed OpenShift customers alter the APIServer, KubeAPIServer, OpenShiftAPIServer, ClusterVersion, Proxy or SubjectPermission objects."
479
+
"documentString": "Managed OpenShift customers may not manage any objects in the following APIGroups [splunkforwarder.managed.openshift.io autoscaling.openshift.io ocmagent.managed.openshift.io upgrade.managed.openshift.io config.openshift.io machineconfiguration.openshift.io operator.openshift.io network.openshift.io cloudcredential.openshift.io machine.openshift.io admissionregistration.k8s.io addons.managed.openshift.io cloudingress.managed.openshift.io managed.openshift.io], nor may Managed OpenShift customers alter the APIServer, KubeAPIServer, OpenShiftAPIServer, ClusterVersion, Proxy or SubjectPermission objects."
0 commit comments