You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/man/man1/oadm-router.1
+4
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,10 @@ If a router does not exist with the given name, this command will create a deplo
35
35
\fB\-\-default\-cert\fP=""
36
36
Optional path to a certificate file that be used as the default certificate. The file should contain the cert, key, and any CA certs necessary for the router to serve the certificate.
Disables the namespace ownership check and allows different namespaces to claim either different paths to a route host or overlapping host names in case of a wildcard route. The default behavior (false) to restrict claims to the oldest namespace that has claimed either the host or the subdomain. Please be aware that if namespace ownership checks are disabled, routes in a different namespace can use this mechanism to 'steal' sub\-paths for existing domains. This is only safe if route creation privileges are restricted, or if all the users can be trusted.
41
+
38
42
.PP
39
43
\fB\-\-dry\-run\fP=false
40
44
If true, show the result of the operation without performing it.
Copy file name to clipboardExpand all lines: docs/man/man1/oc-adm-router.1
+4
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,10 @@ If a router does not exist with the given name, this command will create a deplo
35
35
\fB\-\-default\-cert\fP=""
36
36
Optional path to a certificate file that be used as the default certificate. The file should contain the cert, key, and any CA certs necessary for the router to serve the certificate.
Disables the namespace ownership check and allows different namespaces to claim either different paths to a route host or overlapping host names in case of a wildcard route. The default behavior (false) to restrict claims to the oldest namespace that has claimed either the host or the subdomain. Please be aware that if namespace ownership checks are disabled, routes in a different namespace can use this mechanism to 'steal' sub\-paths for existing domains. This is only safe if route creation privileges are restricted, or if all the users can be trusted.
41
+
38
42
.PP
39
43
\fB\-\-dry\-run\fP=false
40
44
If true, show the result of the operation without performing it.
Copy file name to clipboardExpand all lines: docs/man/man1/openshift-admin-router.1
+4
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,10 @@ If a router does not exist with the given name, this command will create a deplo
35
35
\fB\-\-default\-cert\fP=""
36
36
Optional path to a certificate file that be used as the default certificate. The file should contain the cert, key, and any CA certs necessary for the router to serve the certificate.
Disables the namespace ownership check and allows different namespaces to claim either different paths to a route host or overlapping host names in case of a wildcard route. The default behavior (false) to restrict claims to the oldest namespace that has claimed either the host or the subdomain. Please be aware that if namespace ownership checks are disabled, routes in a different namespace can use this mechanism to 'steal' sub\-paths for existing domains. This is only safe if route creation privileges are restricted, or if all the users can be trusted.
41
+
38
42
.PP
39
43
\fB\-\-dry\-run\fP=false
40
44
If true, show the result of the operation without performing it.
Copy file name to clipboardExpand all lines: docs/man/man1/openshift-cli-adm-router.1
+4
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,10 @@ If a router does not exist with the given name, this command will create a deplo
35
35
\fB\-\-default\-cert\fP=""
36
36
Optional path to a certificate file that be used as the default certificate. The file should contain the cert, key, and any CA certs necessary for the router to serve the certificate.
Disables the namespace ownership check and allows different namespaces to claim either different paths to a route host or overlapping host names in case of a wildcard route. The default behavior (false) to restrict claims to the oldest namespace that has claimed either the host or the subdomain. Please be aware that if namespace ownership checks are disabled, routes in a different namespace can use this mechanism to 'steal' sub\-paths for existing domains. This is only safe if route creation privileges are restricted, or if all the users can be trusted.
41
+
38
42
.PP
39
43
\fB\-\-dry\-run\fP=false
40
44
If true, show the result of the operation without performing it.
Disables the namespace ownership checks for a route host with different paths or for overlapping host names in the case of wildcard routes. Please be aware that if namespace ownership checks are disabled, routes in a different namespace can use this mechanism to 'steal' sub\-paths for existing domains. This is only safe if route creation privileges are restricted, or if all the users can be trusted.
Disables the namespace ownership checks for a route host with different paths or for overlapping host names in the case of wildcard routes. Please be aware that if namespace ownership checks are disabled, routes in a different namespace can use this mechanism to 'steal' sub\-paths for existing domains. This is only safe if route creation privileges are restricted, or if all the users can be trusted.
95
+
92
96
.PP
93
97
\fB\-\-extended\-validation\fP=true
94
98
If set, then an additional extended validation step is performed on all routes admitted in by this router. Defaults to true and enables the extended validation checks.
cmd.Flags().StringVar(&cfg.ExternalHostVxLANGateway, "external-host-vxlan-gw", cfg.ExternalHostVxLANGateway, "If the underlying router implementation requires VxLAN access to the pod network, this is the gateway address that should be used in cidr format.")
285
301
cmd.Flags().BoolVar(&cfg.ExternalHostInsecure, "external-host-insecure", cfg.ExternalHostInsecure, "If the underlying router implementation connects with an external host over a secure connection, this causes the router to skip strict certificate verification with the external host.")
286
302
cmd.Flags().StringVar(&cfg.ExternalHostPartitionPath, "external-host-partition-path", cfg.ExternalHostPartitionPath, "If the underlying router implementation uses partitions for control boundaries, this is the path to use for that partition.")
303
+
cmd.Flags().BoolVar(&cfg.DisableNamespaceOwnershipCheck, "disable-namespace-ownership-check", cfg.DisableNamespaceOwnershipCheck, "Disables the namespace ownership check and allows different namespaces to claim either different paths to a route host or overlapping host names in case of a wildcard route. The default behavior (false) to restrict claims to the oldest namespace that has claimed either the host or the subdomain. Please be aware that if namespace ownership checks are disabled, routes in a different namespace can use this mechanism to 'steal' sub-paths for existing domains. This is only safe if route creation privileges are restricted, or if all the users can be trusted.")
287
304
288
305
cmd.MarkFlagFilename("credentials", "kubeconfig")
289
306
cmd.Flags().MarkDeprecated("credentials", "use --service-account to specify the service account the router will use to make API calls")
Copy file name to clipboardExpand all lines: pkg/cmd/infra/router/router.go
+4-5
Original file line number
Diff line number
Diff line change
@@ -51,8 +51,9 @@ type RouterSelection struct {
51
51
AllowedDomains []string
52
52
WhitelistedDomains sets.String
53
53
54
-
AllowWildcardRoutesbool
55
-
RestrictSubdomainOwnershipbool
54
+
AllowWildcardRoutesbool
55
+
56
+
DisableNamespaceOwnershipCheckbool
56
57
}
57
58
58
59
// Bind sets the appropriate labels
@@ -68,6 +69,7 @@ func (o *RouterSelection) Bind(flag *pflag.FlagSet) {
68
69
flag.StringSliceVar(&o.DeniedDomains, "denied-domains", envVarAsStrings("ROUTER_DENIED_DOMAINS", "", ","), "List of comma separated domains to deny in routes")
69
70
flag.StringSliceVar(&o.AllowedDomains, "allowed-domains", envVarAsStrings("ROUTER_ALLOWED_DOMAINS", "", ","), "List of comma separated domains to allow in routes. If specified, only the domains in this list will be allowed routes. Note that domains in the denied list take precedence over the ones in the allowed list")
flag.BoolVar(&o.DisableNamespaceOwnershipCheck, "disable-namespace-ownership-check", cmdutil.Env("ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK", "") =="true", "Disables the namespace ownership checks for a route host with different paths or for overlapping host names in the case of wildcard routes. Please be aware that if namespace ownership checks are disabled, routes in a different namespace can use this mechanism to 'steal' sub-paths for existing domains. This is only safe if route creation privileges are restricted, or if all the users can be trusted.")
71
73
}
72
74
73
75
// RouteSelectionFunc returns a func that identifies the host for a route.
@@ -204,9 +206,6 @@ func (o *RouterSelection) Complete() error {
0 commit comments