Bring v1alpha3 API into sync with latest additions

This commit is contained in:
John Gardiner Myers 2021-10-02 11:16:48 -07:00
parent a61075634c
commit 41869bd2e6
6 changed files with 45 additions and 1 deletions

View File

@ -25,6 +25,7 @@ go_library(
visibility = ["//visibility:public"],
deps = [
"//pkg/apis/kops:go_default_library",
"//vendor/k8s.io/api/core/v1:go_default_library",
"//vendor/k8s.io/apimachinery/pkg/api/resource:go_default_library",
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
"//vendor/k8s.io/apimachinery/pkg/conversion:go_default_library",

View File

@ -25,4 +25,6 @@ type BastionSpec struct {
type BastionLoadBalancerSpec struct {
AdditionalSecurityGroups []string `json:"additionalSecurityGroups,omitempty"`
// Type of load balancer to create, it can be Public or Internal.
Type LoadBalancerType `json:"type,omitempty"`
}

View File

@ -17,6 +17,7 @@ limitations under the License.
package v1alpha3
import (
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/resource"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/intstr"
@ -221,6 +222,8 @@ type ServiceAccountIssuerDiscoveryConfig struct {
DiscoveryStore string `json:"discoveryStore,omitempty"`
// EnableAWSOIDCProvider will provision an AWS OIDC provider that trusts the ServiceAccount Issuer
EnableAWSOIDCProvider bool `json:"enableAWSOIDCProvider,omitempty"`
// AdditionalAudiences adds user defined audiences to the provisioned AWS OIDC provider
AdditionalAudiences []string `json:"additionalAudiences,omitempty"`
}
// ServiceAccountExternalPermissions grants a ServiceAccount permissions to external resources.
@ -472,6 +475,10 @@ type KubeDNSConfig struct {
CacheMaxSize int `json:"cacheMaxSize,omitempty"`
// CacheMaxConcurrent is the maximum number of concurrent queries for dnsmasq
CacheMaxConcurrent int `json:"cacheMaxConcurrent,omitempty"`
// Tolerations are tolerations to apply to the kube-dns deployment
Tolerations []corev1.Toleration `json:"tolerations,omitempty"`
// Affinity is the kube-dns affinity, uses the same syntax as kubectl's affinity
Affinity *corev1.Affinity `json:"affinity,omitempty"`
// CoreDNSImage is used to override the default image used for CoreDNS
CoreDNSImage string `json:"coreDNSImage,omitempty"`
// CPAImage is used to override the default image used for Cluster Proportional Autoscaler

View File

@ -299,6 +299,12 @@ type CiliumNetworkingSpec struct {
// BPFRoot is not implemented and may be removed in the future.
// Setting this has no effect.
BPFRoot string `json:"bpfRoot,omitempty"`
// ChainingMode allows to use Cilium in combination with other CNI plugins.
// With Cilium CNI chaining, the base network connectivity and IP address management is managed
// by the non-Cilium CNI plugin, but Cilium attaches eBPF programs to the network devices created
// by the non-Cilium plugin to provide L3/L4 network visibility, policy enforcement and other advanced features.
// Default: none
ChainingMode string `json:"chainingMode,omitempty"`
// ContainerRuntime is not implemented and may be removed in the future.
// Setting this has no effect.
ContainerRuntime []string `json:"containerRuntime,omitempty"`

View File

@ -1569,6 +1569,7 @@ func Convert_kops_AzureConfiguration_To_v1alpha3_AzureConfiguration(in *kops.Azu
func autoConvert_v1alpha3_BastionLoadBalancerSpec_To_kops_BastionLoadBalancerSpec(in *BastionLoadBalancerSpec, out *kops.BastionLoadBalancerSpec, s conversion.Scope) error {
out.AdditionalSecurityGroups = in.AdditionalSecurityGroups
out.Type = kops.LoadBalancerType(in.Type)
return nil
}
@ -1579,6 +1580,7 @@ func Convert_v1alpha3_BastionLoadBalancerSpec_To_kops_BastionLoadBalancerSpec(in
func autoConvert_kops_BastionLoadBalancerSpec_To_v1alpha3_BastionLoadBalancerSpec(in *kops.BastionLoadBalancerSpec, out *BastionLoadBalancerSpec, s conversion.Scope) error {
out.AdditionalSecurityGroups = in.AdditionalSecurityGroups
out.Type = LoadBalancerType(in.Type)
return nil
}
@ -1803,6 +1805,7 @@ func autoConvert_v1alpha3_CiliumNetworkingSpec_To_kops_CiliumNetworkingSpec(in *
out.AllowLocalhost = in.AllowLocalhost
out.AutoIpv6NodeRoutes = in.AutoIpv6NodeRoutes
out.BPFRoot = in.BPFRoot
out.ChainingMode = in.ChainingMode
out.ContainerRuntime = in.ContainerRuntime
out.ContainerRuntimeEndpoint = in.ContainerRuntimeEndpoint
out.Debug = in.Debug
@ -1911,6 +1914,7 @@ func autoConvert_kops_CiliumNetworkingSpec_To_v1alpha3_CiliumNetworkingSpec(in *
out.AllowLocalhost = in.AllowLocalhost
out.AutoIpv6NodeRoutes = in.AutoIpv6NodeRoutes
out.BPFRoot = in.BPFRoot
out.ChainingMode = in.ChainingMode
out.ContainerRuntime = in.ContainerRuntime
out.ContainerRuntimeEndpoint = in.ContainerRuntimeEndpoint
out.Debug = in.Debug
@ -5036,6 +5040,8 @@ func Convert_kops_KubeControllerManagerConfig_To_v1alpha3_KubeControllerManagerC
func autoConvert_v1alpha3_KubeDNSConfig_To_kops_KubeDNSConfig(in *KubeDNSConfig, out *kops.KubeDNSConfig, s conversion.Scope) error {
out.CacheMaxSize = in.CacheMaxSize
out.CacheMaxConcurrent = in.CacheMaxConcurrent
out.Tolerations = in.Tolerations
out.Affinity = in.Affinity
out.CoreDNSImage = in.CoreDNSImage
out.CPAImage = in.CPAImage
out.Domain = in.Domain
@ -5069,6 +5075,8 @@ func Convert_v1alpha3_KubeDNSConfig_To_kops_KubeDNSConfig(in *KubeDNSConfig, out
func autoConvert_kops_KubeDNSConfig_To_v1alpha3_KubeDNSConfig(in *kops.KubeDNSConfig, out *KubeDNSConfig, s conversion.Scope) error {
out.CacheMaxSize = in.CacheMaxSize
out.CacheMaxConcurrent = in.CacheMaxConcurrent
out.Tolerations = in.Tolerations
out.Affinity = in.Affinity
out.CoreDNSImage = in.CoreDNSImage
out.CPAImage = in.CPAImage
out.Domain = in.Domain
@ -6682,6 +6690,7 @@ func Convert_kops_ServiceAccountExternalPermission_To_v1alpha3_ServiceAccountExt
func autoConvert_v1alpha3_ServiceAccountIssuerDiscoveryConfig_To_kops_ServiceAccountIssuerDiscoveryConfig(in *ServiceAccountIssuerDiscoveryConfig, out *kops.ServiceAccountIssuerDiscoveryConfig, s conversion.Scope) error {
out.DiscoveryStore = in.DiscoveryStore
out.EnableAWSOIDCProvider = in.EnableAWSOIDCProvider
out.AdditionalAudiences = in.AdditionalAudiences
return nil
}
@ -6693,6 +6702,7 @@ func Convert_v1alpha3_ServiceAccountIssuerDiscoveryConfig_To_kops_ServiceAccount
func autoConvert_kops_ServiceAccountIssuerDiscoveryConfig_To_v1alpha3_ServiceAccountIssuerDiscoveryConfig(in *kops.ServiceAccountIssuerDiscoveryConfig, out *ServiceAccountIssuerDiscoveryConfig, s conversion.Scope) error {
out.DiscoveryStore = in.DiscoveryStore
out.EnableAWSOIDCProvider = in.EnableAWSOIDCProvider
out.AdditionalAudiences = in.AdditionalAudiences
return nil
}

View File

@ -22,6 +22,7 @@ limitations under the License.
package v1alpha3
import (
corev1 "k8s.io/api/core/v1"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
runtime "k8s.io/apimachinery/pkg/runtime"
intstr "k8s.io/apimachinery/pkg/util/intstr"
@ -1184,7 +1185,7 @@ func (in *ClusterSpec) DeepCopyInto(out *ClusterSpec) {
if in.ServiceAccountIssuerDiscovery != nil {
in, out := &in.ServiceAccountIssuerDiscovery, &out.ServiceAccountIssuerDiscovery
*out = new(ServiceAccountIssuerDiscoveryConfig)
**out = **in
(*in).DeepCopyInto(*out)
}
if in.SnapshotController != nil {
in, out := &in.SnapshotController, &out.SnapshotController
@ -3084,6 +3085,18 @@ func (in *KubeControllerManagerConfig) DeepCopy() *KubeControllerManagerConfig {
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (in *KubeDNSConfig) DeepCopyInto(out *KubeDNSConfig) {
*out = *in
if in.Tolerations != nil {
in, out := &in.Tolerations, &out.Tolerations
*out = make([]corev1.Toleration, len(*in))
for i := range *in {
(*in)[i].DeepCopyInto(&(*out)[i])
}
}
if in.Affinity != nil {
in, out := &in.Affinity, &out.Affinity
*out = new(corev1.Affinity)
(*in).DeepCopyInto(*out)
}
if in.StubDomains != nil {
in, out := &in.StubDomains, &out.StubDomains
*out = make(map[string][]string, len(*in))
@ -4641,6 +4654,11 @@ func (in *ServiceAccountExternalPermission) DeepCopy() *ServiceAccountExternalPe
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (in *ServiceAccountIssuerDiscoveryConfig) DeepCopyInto(out *ServiceAccountIssuerDiscoveryConfig) {
*out = *in
if in.AdditionalAudiences != nil {
in, out := &in.AdditionalAudiences, &out.AdditionalAudiences
*out = make([]string, len(*in))
copy(*out, *in)
}
return
}