@@ -356,19 +356,21 @@ users:
356
356
For additional HTTP configuration, refer to the
357
357
[kubeconfig](/docs/tasks/access-application-cluster/configure-access-multiple-clusters/) documentation.
358
358
359
- # ### Request Payloads
359
+ # ### Request payloads
360
360
361
361
When faced with an admission decision, the API Server POSTs a JSON serialized
362
362
` imagepolicy.k8s.io/v1alpha1` ` ImageReview` object describing the action.
363
363
This object contains fields describing the containers being admitted, as well as
364
364
any pod annotations that match `*.image-policy.k8s.io/*`.
365
365
366
- Note that webhook API objects are subject to the same versioning compatibility rules
366
+ {{ note }}
367
+ The webhook API objects are subject to the same versioning compatibility rules
367
368
as other Kubernetes API objects. Implementers should be aware of looser compatibility
368
- promises for alpha objects and check the " apiVersion" field of the request to
369
+ promises for alpha objects and check the ` apiVersion` field of the request to
369
370
ensure correct deserialization.
370
371
Additionally, the API Server must enable the `imagepolicy.k8s.io/v1alpha1` API extensions
371
372
group (`--runtime-config=imagepolicy.k8s.io/v1alpha1=true`).
373
+ {{ /note }}
372
374
373
375
An example request body :
374
376
@@ -420,8 +422,8 @@ To disallow access, the service would return:
420
422
}
421
423
` ` `
422
424
423
- For further documentation refer to the `imagepolicy.v1alpha1` API objects and
424
- ` plugin/pkg/admission/imagepolicy/admission.go ` .
425
+ For further documentation refer to the
426
+ [`imagepolicy.v1alpha1` API](/docs/reference/config-api/imagepolicy.v1alpha1/) .
425
427
426
428
# ### Extending with Annotations
427
429
@@ -432,9 +434,9 @@ accept different information.
432
434
433
435
Examples of information you might put here are :
434
436
435
- * request to "break glass" to override a policy, in case of emergency.
436
- * a ticket number from a ticket system that documents the break-glass request
437
- * provide a hint to the policy server as to the imageID of the image being provided, to save it a lookup
437
+ * request to "break glass" to override a policy, in case of emergency.
438
+ * a ticket number from a ticket system that documents the break-glass request
439
+ * provide a hint to the policy server as to the imageID of the image being provided, to save it a lookup
438
440
439
441
In any case, the annotations are provided by the user and are not validated by Kubernetes in any way.
440
442
@@ -469,8 +471,7 @@ webhooks or validating admission controllers will permit the request to finish.
469
471
470
472
If you disable the MutatingAdmissionWebhook, you must also disable the
471
473
` MutatingWebhookConfiguration` object in the `admissionregistration.k8s.io/v1`
472
- group/version via the `--runtime-config` flag (both are on by default in
473
- versions >= 1.9).
474
+ group/version via the `--runtime-config` flag, both are on by default.
474
475
475
476
# ### Use caution when authoring and installing mutating webhooks
476
477
@@ -599,7 +600,7 @@ Starting from 1.11, this admission controller is disabled by default.
599
600
This admission controller defaults and limits what node selectors may be used within a namespace
600
601
by reading a namespace annotation and a global configuration.
601
602
602
- # ### Configuration File Format
603
+ # ### Configuration file format
603
604
604
605
` PodNodeSelector` uses a configuration file to set options for the behavior of the backend.
605
606
Note that the configuration file format will move to a versioned file in a future release.
@@ -649,9 +650,7 @@ This admission controller has the following behavior:
649
650
3. Evaluate the pod's node selector against the namespace node selector for conflicts. Conflicts
650
651
result in rejection.
651
652
4. Evaluate the pod's node selector against the namespace-specific allowed selector defined the
652
- plugin configuration file.
653
-
654
- Conflicts result in rejection.
653
+ plugin configuration file. Conflicts result in rejection.
655
654
656
655
{{< note >}}
657
656
PodNodeSelector allows forcing pods to run on specifically labeled nodes. Also see the PodTolerationRestriction
0 commit comments