mirror of https://github.com/kubernetes/kops.git
Bring v1alpha3 API into sync with latest additions
This commit is contained in:
parent
a61075634c
commit
41869bd2e6
|
@ -25,6 +25,7 @@ go_library(
|
|||
visibility = ["//visibility:public"],
|
||||
deps = [
|
||||
"//pkg/apis/kops:go_default_library",
|
||||
"//vendor/k8s.io/api/core/v1:go_default_library",
|
||||
"//vendor/k8s.io/apimachinery/pkg/api/resource:go_default_library",
|
||||
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||
"//vendor/k8s.io/apimachinery/pkg/conversion:go_default_library",
|
||||
|
|
|
@ -25,4 +25,6 @@ type BastionSpec struct {
|
|||
|
||||
type BastionLoadBalancerSpec struct {
|
||||
AdditionalSecurityGroups []string `json:"additionalSecurityGroups,omitempty"`
|
||||
// Type of load balancer to create, it can be Public or Internal.
|
||||
Type LoadBalancerType `json:"type,omitempty"`
|
||||
}
|
||||
|
|
|
@ -17,6 +17,7 @@ limitations under the License.
|
|||
package v1alpha3
|
||||
|
||||
import (
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
"k8s.io/apimachinery/pkg/api/resource"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/util/intstr"
|
||||
|
@ -221,6 +222,8 @@ type ServiceAccountIssuerDiscoveryConfig struct {
|
|||
DiscoveryStore string `json:"discoveryStore,omitempty"`
|
||||
// EnableAWSOIDCProvider will provision an AWS OIDC provider that trusts the ServiceAccount Issuer
|
||||
EnableAWSOIDCProvider bool `json:"enableAWSOIDCProvider,omitempty"`
|
||||
// AdditionalAudiences adds user defined audiences to the provisioned AWS OIDC provider
|
||||
AdditionalAudiences []string `json:"additionalAudiences,omitempty"`
|
||||
}
|
||||
|
||||
// ServiceAccountExternalPermissions grants a ServiceAccount permissions to external resources.
|
||||
|
@ -472,6 +475,10 @@ type KubeDNSConfig struct {
|
|||
CacheMaxSize int `json:"cacheMaxSize,omitempty"`
|
||||
// CacheMaxConcurrent is the maximum number of concurrent queries for dnsmasq
|
||||
CacheMaxConcurrent int `json:"cacheMaxConcurrent,omitempty"`
|
||||
// Tolerations are tolerations to apply to the kube-dns deployment
|
||||
Tolerations []corev1.Toleration `json:"tolerations,omitempty"`
|
||||
// Affinity is the kube-dns affinity, uses the same syntax as kubectl's affinity
|
||||
Affinity *corev1.Affinity `json:"affinity,omitempty"`
|
||||
// CoreDNSImage is used to override the default image used for CoreDNS
|
||||
CoreDNSImage string `json:"coreDNSImage,omitempty"`
|
||||
// CPAImage is used to override the default image used for Cluster Proportional Autoscaler
|
||||
|
|
|
@ -299,6 +299,12 @@ type CiliumNetworkingSpec struct {
|
|||
// BPFRoot is not implemented and may be removed in the future.
|
||||
// Setting this has no effect.
|
||||
BPFRoot string `json:"bpfRoot,omitempty"`
|
||||
// ChainingMode allows to use Cilium in combination with other CNI plugins.
|
||||
// With Cilium CNI chaining, the base network connectivity and IP address management is managed
|
||||
// by the non-Cilium CNI plugin, but Cilium attaches eBPF programs to the network devices created
|
||||
// by the non-Cilium plugin to provide L3/L4 network visibility, policy enforcement and other advanced features.
|
||||
// Default: none
|
||||
ChainingMode string `json:"chainingMode,omitempty"`
|
||||
// ContainerRuntime is not implemented and may be removed in the future.
|
||||
// Setting this has no effect.
|
||||
ContainerRuntime []string `json:"containerRuntime,omitempty"`
|
||||
|
|
|
@ -1569,6 +1569,7 @@ func Convert_kops_AzureConfiguration_To_v1alpha3_AzureConfiguration(in *kops.Azu
|
|||
|
||||
func autoConvert_v1alpha3_BastionLoadBalancerSpec_To_kops_BastionLoadBalancerSpec(in *BastionLoadBalancerSpec, out *kops.BastionLoadBalancerSpec, s conversion.Scope) error {
|
||||
out.AdditionalSecurityGroups = in.AdditionalSecurityGroups
|
||||
out.Type = kops.LoadBalancerType(in.Type)
|
||||
return nil
|
||||
}
|
||||
|
||||
|
@ -1579,6 +1580,7 @@ func Convert_v1alpha3_BastionLoadBalancerSpec_To_kops_BastionLoadBalancerSpec(in
|
|||
|
||||
func autoConvert_kops_BastionLoadBalancerSpec_To_v1alpha3_BastionLoadBalancerSpec(in *kops.BastionLoadBalancerSpec, out *BastionLoadBalancerSpec, s conversion.Scope) error {
|
||||
out.AdditionalSecurityGroups = in.AdditionalSecurityGroups
|
||||
out.Type = LoadBalancerType(in.Type)
|
||||
return nil
|
||||
}
|
||||
|
||||
|
@ -1803,6 +1805,7 @@ func autoConvert_v1alpha3_CiliumNetworkingSpec_To_kops_CiliumNetworkingSpec(in *
|
|||
out.AllowLocalhost = in.AllowLocalhost
|
||||
out.AutoIpv6NodeRoutes = in.AutoIpv6NodeRoutes
|
||||
out.BPFRoot = in.BPFRoot
|
||||
out.ChainingMode = in.ChainingMode
|
||||
out.ContainerRuntime = in.ContainerRuntime
|
||||
out.ContainerRuntimeEndpoint = in.ContainerRuntimeEndpoint
|
||||
out.Debug = in.Debug
|
||||
|
@ -1911,6 +1914,7 @@ func autoConvert_kops_CiliumNetworkingSpec_To_v1alpha3_CiliumNetworkingSpec(in *
|
|||
out.AllowLocalhost = in.AllowLocalhost
|
||||
out.AutoIpv6NodeRoutes = in.AutoIpv6NodeRoutes
|
||||
out.BPFRoot = in.BPFRoot
|
||||
out.ChainingMode = in.ChainingMode
|
||||
out.ContainerRuntime = in.ContainerRuntime
|
||||
out.ContainerRuntimeEndpoint = in.ContainerRuntimeEndpoint
|
||||
out.Debug = in.Debug
|
||||
|
@ -5036,6 +5040,8 @@ func Convert_kops_KubeControllerManagerConfig_To_v1alpha3_KubeControllerManagerC
|
|||
func autoConvert_v1alpha3_KubeDNSConfig_To_kops_KubeDNSConfig(in *KubeDNSConfig, out *kops.KubeDNSConfig, s conversion.Scope) error {
|
||||
out.CacheMaxSize = in.CacheMaxSize
|
||||
out.CacheMaxConcurrent = in.CacheMaxConcurrent
|
||||
out.Tolerations = in.Tolerations
|
||||
out.Affinity = in.Affinity
|
||||
out.CoreDNSImage = in.CoreDNSImage
|
||||
out.CPAImage = in.CPAImage
|
||||
out.Domain = in.Domain
|
||||
|
@ -5069,6 +5075,8 @@ func Convert_v1alpha3_KubeDNSConfig_To_kops_KubeDNSConfig(in *KubeDNSConfig, out
|
|||
func autoConvert_kops_KubeDNSConfig_To_v1alpha3_KubeDNSConfig(in *kops.KubeDNSConfig, out *KubeDNSConfig, s conversion.Scope) error {
|
||||
out.CacheMaxSize = in.CacheMaxSize
|
||||
out.CacheMaxConcurrent = in.CacheMaxConcurrent
|
||||
out.Tolerations = in.Tolerations
|
||||
out.Affinity = in.Affinity
|
||||
out.CoreDNSImage = in.CoreDNSImage
|
||||
out.CPAImage = in.CPAImage
|
||||
out.Domain = in.Domain
|
||||
|
@ -6682,6 +6690,7 @@ func Convert_kops_ServiceAccountExternalPermission_To_v1alpha3_ServiceAccountExt
|
|||
func autoConvert_v1alpha3_ServiceAccountIssuerDiscoveryConfig_To_kops_ServiceAccountIssuerDiscoveryConfig(in *ServiceAccountIssuerDiscoveryConfig, out *kops.ServiceAccountIssuerDiscoveryConfig, s conversion.Scope) error {
|
||||
out.DiscoveryStore = in.DiscoveryStore
|
||||
out.EnableAWSOIDCProvider = in.EnableAWSOIDCProvider
|
||||
out.AdditionalAudiences = in.AdditionalAudiences
|
||||
return nil
|
||||
}
|
||||
|
||||
|
@ -6693,6 +6702,7 @@ func Convert_v1alpha3_ServiceAccountIssuerDiscoveryConfig_To_kops_ServiceAccount
|
|||
func autoConvert_kops_ServiceAccountIssuerDiscoveryConfig_To_v1alpha3_ServiceAccountIssuerDiscoveryConfig(in *kops.ServiceAccountIssuerDiscoveryConfig, out *ServiceAccountIssuerDiscoveryConfig, s conversion.Scope) error {
|
||||
out.DiscoveryStore = in.DiscoveryStore
|
||||
out.EnableAWSOIDCProvider = in.EnableAWSOIDCProvider
|
||||
out.AdditionalAudiences = in.AdditionalAudiences
|
||||
return nil
|
||||
}
|
||||
|
||||
|
|
|
@ -22,6 +22,7 @@ limitations under the License.
|
|||
package v1alpha3
|
||||
|
||||
import (
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||
intstr "k8s.io/apimachinery/pkg/util/intstr"
|
||||
|
@ -1184,7 +1185,7 @@ func (in *ClusterSpec) DeepCopyInto(out *ClusterSpec) {
|
|||
if in.ServiceAccountIssuerDiscovery != nil {
|
||||
in, out := &in.ServiceAccountIssuerDiscovery, &out.ServiceAccountIssuerDiscovery
|
||||
*out = new(ServiceAccountIssuerDiscoveryConfig)
|
||||
**out = **in
|
||||
(*in).DeepCopyInto(*out)
|
||||
}
|
||||
if in.SnapshotController != nil {
|
||||
in, out := &in.SnapshotController, &out.SnapshotController
|
||||
|
@ -3084,6 +3085,18 @@ func (in *KubeControllerManagerConfig) DeepCopy() *KubeControllerManagerConfig {
|
|||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||
func (in *KubeDNSConfig) DeepCopyInto(out *KubeDNSConfig) {
|
||||
*out = *in
|
||||
if in.Tolerations != nil {
|
||||
in, out := &in.Tolerations, &out.Tolerations
|
||||
*out = make([]corev1.Toleration, len(*in))
|
||||
for i := range *in {
|
||||
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||
}
|
||||
}
|
||||
if in.Affinity != nil {
|
||||
in, out := &in.Affinity, &out.Affinity
|
||||
*out = new(corev1.Affinity)
|
||||
(*in).DeepCopyInto(*out)
|
||||
}
|
||||
if in.StubDomains != nil {
|
||||
in, out := &in.StubDomains, &out.StubDomains
|
||||
*out = make(map[string][]string, len(*in))
|
||||
|
@ -4641,6 +4654,11 @@ func (in *ServiceAccountExternalPermission) DeepCopy() *ServiceAccountExternalPe
|
|||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||
func (in *ServiceAccountIssuerDiscoveryConfig) DeepCopyInto(out *ServiceAccountIssuerDiscoveryConfig) {
|
||||
*out = *in
|
||||
if in.AdditionalAudiences != nil {
|
||||
in, out := &in.AdditionalAudiences, &out.AdditionalAudiences
|
||||
*out = make([]string, len(*in))
|
||||
copy(*out, *in)
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue