kops
@@ -94,6 +94,10 @@ Appears In:
+additionalNetworkCIDRs string array
+AdditionalNetworkCIDRs is a list of aditional CIDR used for the AWS VPC or otherwise allocated to k8s. This is a real CIDR, not the internal k8s network On AWS, it maps to any aditional CIDRs added to a VPC.
+
+
additionalPolicies object
Additional policies to add for roles
@@ -712,6 +716,44 @@ Appears In:
AuthorizationSpec kops/v1alpha2
+
+
+
+Field
+Description
+
+
+
+
+
+
+
+
+AmazonVPCNetworkingSpec v1alpha2 kops
+
+
+
+Group
+Version
+Kind
+
+
+
+
+kops
+v1alpha2
+AmazonVPCNetworkingSpec
+
+
+
+AmazonVPCNetworkingSpec declares that we want Amazon VPC CNI networking
+
+
@@ -2337,6 +2379,10 @@ Appears In:
APIServerCount is the number of api servers
+auditLogFormat string
+AuditLogFormat flag specifies the format type for audit log files.
+
+
auditLogMaxAge integer
The maximum number of days to retain old audit log files based on the timestamp encoded in their filename.
@@ -2438,23 +2484,31 @@ Appears In:
oidcCAFile string
-If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
+OIDCCAFile if set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
oidcClientID string
-The client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.
+OIDCClientID is the client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.
oidcGroupsClaim string
-If provided, the name of a custom OpenID Connect claim for specifying user groups. The claim value is expected to be a string or array of strings.
+OIDCGroupsClaim if provided, the name of a custom OpenID Connect claim for specifying user groups. The claim value is expected to be a string or array of strings.
+
+
+oidcGroupsPrefix string
+OIDCGroupsPrefix is the prefix prepended to group claims to prevent clashes with existing names (such as 'system:' groups)
oidcIssuerURL string
-The URL of the OpenID issuer, only HTTPS scheme will be accepted. If set, it will be used to verify the OIDC JSON Web Token (JWT).
+OIDCIssuerURL is the URL of the OpenID issuer, only HTTPS scheme will be accepted. If set, it will be used to verify the OIDC JSON Web Token (JWT).
oidcUsernameClaim string
-The OpenID claim to use as the user name. Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.
+OIDCUsernameClaim is the OpenID claim to use as the user name. Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.
+
+
+oidcUsernamePrefix string
+OIDCUsernamePrefix is the prefix prepended to username claims to prevent clashes with existing names (such as 'system:' users).
proxyClientCertFile string
@@ -2936,6 +2990,10 @@ Appears In:
ImageGCLowThresholdPercent is the percent of disk usage before which image garbage collection is never run. Lowest disk usage to garbage collect to.
+imagePullProgressDeadline Duration
+ImagePullProgressDeadline is the timeout for image pulls If no pulling progress is made before this deadline, the image pulling will be cancelled. (default 1m0s)
+
+
kubeReserved object
Resource reservation for kubernetes system daemons like the kubelet, container runtime, node problem detector, etc.
@@ -3240,6 +3298,7 @@ Appears In:
+LoadBalancerAccessSpec provides configuration details related to API LoadBalancer and its access
Appears In:
@@ -3256,6 +3315,10 @@ Appears In:
+additionalSecurityGroups string array
+
+
+
idleTimeoutSeconds integer
@@ -3299,6 +3362,10 @@ Appears In:
+amazonvpc AmazonVPCNetworkingSpec
+
+
+
calico CalicoNetworkingSpec
diff --git a/docs/apireference/build/manifest.json b/docs/apireference/build/manifest.json
index a78be9f752..5d697045b9 100644
--- a/docs/apireference/build/manifest.json
+++ b/docs/apireference/build/manifest.json
@@ -25,6 +25,9 @@
{
"filename": "_generated_alwaysallowauthorizationspec_v1alpha2_kops_definition.md"
},
+ {
+ "filename": "_generated_amazonvpcnetworkingspec_v1alpha2_kops_definition.md"
+ },
{
"filename": "_generated_assets_v1alpha2_kops_definition.md"
},
diff --git a/docs/apireference/build/navData.js b/docs/apireference/build/navData.js
index f22a342b2c..4e432a37c0 100644
--- a/docs/apireference/build/navData.js
+++ b/docs/apireference/build/navData.js
@@ -1 +1 @@
-(function(){navData = {"toc":[{"section":"-strong-old-versions-strong-","subsections":[]},{"section":"-strong-definitions-strong-","subsections":[{"section":"weavenetworkingspec-v1alpha2-kops"},{"section":"watchevent-v1-meta"},{"section":"userdata-v1alpha2-kops"},{"section":"topologyspec-v1alpha2-kops"},{"section":"time-v1-meta"},{"section":"statusdetails-v1-meta"},{"section":"statuscause-v1-meta"},{"section":"status-v1-meta"},{"section":"serveraddressbyclientcidr-v1-meta"},{"section":"romananetworkingspec-v1alpha2-kops"},{"section":"rbacauthorizationspec-v1alpha2-kops"},{"section":"preconditions-v1-meta"},{"section":"patch-v1-meta"},{"section":"ownerreference-v1-meta"},{"section":"objectmeta-v1-meta"},{"section":"networkingspec-v1alpha2-kops"},{"section":"loadbalanceraccessspec-v1alpha2-kops"},{"section":"listmeta-v1-meta"},{"section":"leaderelectionconfiguration-v1alpha2-kops"},{"section":"kuberouternetworkingspec-v1alpha2-kops"},{"section":"kubenetnetworkingspec-v1alpha2-kops"},{"section":"kubeletconfigspec-v1alpha2-kops"},{"section":"kubeschedulerconfig-v1alpha2-kops"},{"section":"kubeproxyconfig-v1alpha2-kops"},{"section":"kubednsconfig-v1alpha2-kops"},{"section":"kubecontrollermanagerconfig-v1alpha2-kops"},{"section":"kubeapiserverconfig-v1alpha2-kops"},{"section":"kopeionetworkingspec-v1alpha2-kops"},{"section":"kopeioauthenticationspec-v1alpha2-kops"},{"section":"initializers-v1-meta"},{"section":"initializer-v1-meta"},{"section":"iamspec-v1alpha2-kops"},{"section":"hookspec-v1alpha2-kops"},{"section":"httpproxy-v1alpha2-kops"},{"section":"groupversionfordiscovery-v1-meta"},{"section":"flannelnetworkingspec-v1alpha2-kops"},{"section":"fileassetspec-v1alpha2-kops"},{"section":"externalnetworkingspec-v1alpha2-kops"},{"section":"externaldnsconfig-v1alpha2-kops"},{"section":"execcontaineraction-v1alpha2-kops"},{"section":"etcdmemberspec-v1alpha2-kops"},{"section":"etcdclusterspec-v1alpha2-kops"},{"section":"egressproxyspec-v1alpha2-kops"},{"section":"duration-v1-meta"},{"section":"dockerconfig-v1alpha2-kops"},{"section":"deleteoptions-v1-meta"},{"section":"dnsspec-v1alpha2-kops"},{"section":"dnsaccessspec-v1alpha2-kops"},{"section":"clustersubnetspec-v1alpha2-kops"},{"section":"cloudcontrollermanagerconfig-v1alpha2-kops"},{"section":"cloudconfiguration-v1alpha2-kops"},{"section":"classicnetworkingspec-v1alpha2-kops"},{"section":"canalnetworkingspec-v1alpha2-kops"},{"section":"caliconetworkingspec-v1alpha2-kops"},{"section":"cninetworkingspec-v1alpha2-kops"},{"section":"bastionspec-v1alpha2-kops"},{"section":"authorizationspec-v1alpha2-kops"},{"section":"authenticationspec-v1alpha2-kops"},{"section":"assets-v1alpha2-kops"},{"section":"alwaysallowauthorizationspec-v1alpha2-kops"},{"section":"accessspec-v1alpha2-kops"},{"section":"apiresource-v1-meta"},{"section":"apigroup-v1-meta"}]},{"section":"instancegroup-v1alpha2-kops","subsections":[]},{"section":"cluster-v1alpha2-kops","subsections":[]},{"section":"-strong-kops-strong-","subsections":[]}],"flatToc":["-strong-old-versions-strong-","weavenetworkingspec-v1alpha2-kops","watchevent-v1-meta","userdata-v1alpha2-kops","topologyspec-v1alpha2-kops","time-v1-meta","statusdetails-v1-meta","statuscause-v1-meta","status-v1-meta","serveraddressbyclientcidr-v1-meta","romananetworkingspec-v1alpha2-kops","rbacauthorizationspec-v1alpha2-kops","preconditions-v1-meta","patch-v1-meta","ownerreference-v1-meta","objectmeta-v1-meta","networkingspec-v1alpha2-kops","loadbalanceraccessspec-v1alpha2-kops","listmeta-v1-meta","leaderelectionconfiguration-v1alpha2-kops","kuberouternetworkingspec-v1alpha2-kops","kubenetnetworkingspec-v1alpha2-kops","kubeletconfigspec-v1alpha2-kops","kubeschedulerconfig-v1alpha2-kops","kubeproxyconfig-v1alpha2-kops","kubednsconfig-v1alpha2-kops","kubecontrollermanagerconfig-v1alpha2-kops","kubeapiserverconfig-v1alpha2-kops","kopeionetworkingspec-v1alpha2-kops","kopeioauthenticationspec-v1alpha2-kops","initializers-v1-meta","initializer-v1-meta","iamspec-v1alpha2-kops","hookspec-v1alpha2-kops","httpproxy-v1alpha2-kops","groupversionfordiscovery-v1-meta","flannelnetworkingspec-v1alpha2-kops","fileassetspec-v1alpha2-kops","externalnetworkingspec-v1alpha2-kops","externaldnsconfig-v1alpha2-kops","execcontaineraction-v1alpha2-kops","etcdmemberspec-v1alpha2-kops","etcdclusterspec-v1alpha2-kops","egressproxyspec-v1alpha2-kops","duration-v1-meta","dockerconfig-v1alpha2-kops","deleteoptions-v1-meta","dnsspec-v1alpha2-kops","dnsaccessspec-v1alpha2-kops","clustersubnetspec-v1alpha2-kops","cloudcontrollermanagerconfig-v1alpha2-kops","cloudconfiguration-v1alpha2-kops","classicnetworkingspec-v1alpha2-kops","canalnetworkingspec-v1alpha2-kops","caliconetworkingspec-v1alpha2-kops","cninetworkingspec-v1alpha2-kops","bastionspec-v1alpha2-kops","authorizationspec-v1alpha2-kops","authenticationspec-v1alpha2-kops","assets-v1alpha2-kops","alwaysallowauthorizationspec-v1alpha2-kops","accessspec-v1alpha2-kops","apiresource-v1-meta","apigroup-v1-meta","-strong-definitions-strong-","instancegroup-v1alpha2-kops","cluster-v1alpha2-kops","-strong-kops-strong-"]};})();
\ No newline at end of file
+(function(){navData = {"toc":[{"section":"-strong-old-versions-strong-","subsections":[]},{"section":"-strong-definitions-strong-","subsections":[{"section":"weavenetworkingspec-v1alpha2-kops"},{"section":"watchevent-v1-meta"},{"section":"userdata-v1alpha2-kops"},{"section":"topologyspec-v1alpha2-kops"},{"section":"time-v1-meta"},{"section":"statusdetails-v1-meta"},{"section":"statuscause-v1-meta"},{"section":"status-v1-meta"},{"section":"serveraddressbyclientcidr-v1-meta"},{"section":"romananetworkingspec-v1alpha2-kops"},{"section":"rbacauthorizationspec-v1alpha2-kops"},{"section":"preconditions-v1-meta"},{"section":"patch-v1-meta"},{"section":"ownerreference-v1-meta"},{"section":"objectmeta-v1-meta"},{"section":"networkingspec-v1alpha2-kops"},{"section":"loadbalanceraccessspec-v1alpha2-kops"},{"section":"listmeta-v1-meta"},{"section":"leaderelectionconfiguration-v1alpha2-kops"},{"section":"kuberouternetworkingspec-v1alpha2-kops"},{"section":"kubenetnetworkingspec-v1alpha2-kops"},{"section":"kubeletconfigspec-v1alpha2-kops"},{"section":"kubeschedulerconfig-v1alpha2-kops"},{"section":"kubeproxyconfig-v1alpha2-kops"},{"section":"kubednsconfig-v1alpha2-kops"},{"section":"kubecontrollermanagerconfig-v1alpha2-kops"},{"section":"kubeapiserverconfig-v1alpha2-kops"},{"section":"kopeionetworkingspec-v1alpha2-kops"},{"section":"kopeioauthenticationspec-v1alpha2-kops"},{"section":"initializers-v1-meta"},{"section":"initializer-v1-meta"},{"section":"iamspec-v1alpha2-kops"},{"section":"hookspec-v1alpha2-kops"},{"section":"httpproxy-v1alpha2-kops"},{"section":"groupversionfordiscovery-v1-meta"},{"section":"flannelnetworkingspec-v1alpha2-kops"},{"section":"fileassetspec-v1alpha2-kops"},{"section":"externalnetworkingspec-v1alpha2-kops"},{"section":"externaldnsconfig-v1alpha2-kops"},{"section":"execcontaineraction-v1alpha2-kops"},{"section":"etcdmemberspec-v1alpha2-kops"},{"section":"etcdclusterspec-v1alpha2-kops"},{"section":"egressproxyspec-v1alpha2-kops"},{"section":"duration-v1-meta"},{"section":"dockerconfig-v1alpha2-kops"},{"section":"deleteoptions-v1-meta"},{"section":"dnsspec-v1alpha2-kops"},{"section":"dnsaccessspec-v1alpha2-kops"},{"section":"clustersubnetspec-v1alpha2-kops"},{"section":"cloudcontrollermanagerconfig-v1alpha2-kops"},{"section":"cloudconfiguration-v1alpha2-kops"},{"section":"classicnetworkingspec-v1alpha2-kops"},{"section":"canalnetworkingspec-v1alpha2-kops"},{"section":"caliconetworkingspec-v1alpha2-kops"},{"section":"cninetworkingspec-v1alpha2-kops"},{"section":"bastionspec-v1alpha2-kops"},{"section":"authorizationspec-v1alpha2-kops"},{"section":"authenticationspec-v1alpha2-kops"},{"section":"assets-v1alpha2-kops"},{"section":"amazonvpcnetworkingspec-v1alpha2-kops"},{"section":"alwaysallowauthorizationspec-v1alpha2-kops"},{"section":"accessspec-v1alpha2-kops"},{"section":"apiresource-v1-meta"},{"section":"apigroup-v1-meta"}]},{"section":"instancegroup-v1alpha2-kops","subsections":[]},{"section":"cluster-v1alpha2-kops","subsections":[]},{"section":"-strong-kops-strong-","subsections":[]}],"flatToc":["-strong-old-versions-strong-","weavenetworkingspec-v1alpha2-kops","watchevent-v1-meta","userdata-v1alpha2-kops","topologyspec-v1alpha2-kops","time-v1-meta","statusdetails-v1-meta","statuscause-v1-meta","status-v1-meta","serveraddressbyclientcidr-v1-meta","romananetworkingspec-v1alpha2-kops","rbacauthorizationspec-v1alpha2-kops","preconditions-v1-meta","patch-v1-meta","ownerreference-v1-meta","objectmeta-v1-meta","networkingspec-v1alpha2-kops","loadbalanceraccessspec-v1alpha2-kops","listmeta-v1-meta","leaderelectionconfiguration-v1alpha2-kops","kuberouternetworkingspec-v1alpha2-kops","kubenetnetworkingspec-v1alpha2-kops","kubeletconfigspec-v1alpha2-kops","kubeschedulerconfig-v1alpha2-kops","kubeproxyconfig-v1alpha2-kops","kubednsconfig-v1alpha2-kops","kubecontrollermanagerconfig-v1alpha2-kops","kubeapiserverconfig-v1alpha2-kops","kopeionetworkingspec-v1alpha2-kops","kopeioauthenticationspec-v1alpha2-kops","initializers-v1-meta","initializer-v1-meta","iamspec-v1alpha2-kops","hookspec-v1alpha2-kops","httpproxy-v1alpha2-kops","groupversionfordiscovery-v1-meta","flannelnetworkingspec-v1alpha2-kops","fileassetspec-v1alpha2-kops","externalnetworkingspec-v1alpha2-kops","externaldnsconfig-v1alpha2-kops","execcontaineraction-v1alpha2-kops","etcdmemberspec-v1alpha2-kops","etcdclusterspec-v1alpha2-kops","egressproxyspec-v1alpha2-kops","duration-v1-meta","dockerconfig-v1alpha2-kops","deleteoptions-v1-meta","dnsspec-v1alpha2-kops","dnsaccessspec-v1alpha2-kops","clustersubnetspec-v1alpha2-kops","cloudcontrollermanagerconfig-v1alpha2-kops","cloudconfiguration-v1alpha2-kops","classicnetworkingspec-v1alpha2-kops","canalnetworkingspec-v1alpha2-kops","caliconetworkingspec-v1alpha2-kops","cninetworkingspec-v1alpha2-kops","bastionspec-v1alpha2-kops","authorizationspec-v1alpha2-kops","authenticationspec-v1alpha2-kops","assets-v1alpha2-kops","amazonvpcnetworkingspec-v1alpha2-kops","alwaysallowauthorizationspec-v1alpha2-kops","accessspec-v1alpha2-kops","apiresource-v1-meta","apigroup-v1-meta","-strong-definitions-strong-","instancegroup-v1alpha2-kops","cluster-v1alpha2-kops","-strong-kops-strong-"]};})();
\ No newline at end of file
diff --git a/pkg/openapi/openapi_generated.go b/pkg/openapi/openapi_generated.go
index c69db95541..815076603a 100644
--- a/pkg/openapi/openapi_generated.go
+++ b/pkg/openapi/openapi_generated.go
@@ -20839,6 +20839,15 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
},
Dependencies: []string{},
},
+ "k8s.io/kops/pkg/apis/kops/v1alpha1.AmazonVPCNetworkingSpec": {
+ Schema: spec.Schema{
+ SchemaProps: spec.SchemaProps{
+ Description: "AmazonVPCNetworkingSpec declares that we want Amazon VPC CNI networking",
+ Properties: map[string]spec.Schema{},
+ },
+ },
+ Dependencies: []string{},
+ },
"k8s.io/kops/pkg/apis/kops/v1alpha1.Assets": {
Schema: spec.Schema{
SchemaProps: spec.SchemaProps{
@@ -21336,6 +21345,20 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Format: "",
},
},
+ "additionalNetworkCIDRs": {
+ SchemaProps: spec.SchemaProps{
+ Description: "AdditionalNetworkCIDRs is a list of aditional CIDR used for the AWS VPC or otherwise allocated to k8s. This is a real CIDR, not the internal k8s network On AWS, it maps to any aditional CIDRs added to a VPC.",
+ Type: []string{"array"},
+ Items: &spec.SchemaOrArray{
+ Schema: &spec.Schema{
+ SchemaProps: spec.SchemaProps{
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ },
+ },
+ },
"networkID": {
SchemaProps: spec.SchemaProps{
Description: "NetworkID is an identifier of a network, if we want to reuse/share an existing network (e.g. an AWS VPC)",
@@ -22902,35 +22925,49 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
},
"oidcUsernameClaim": {
SchemaProps: spec.SchemaProps{
- Description: "The OpenID claim to use as the user name. Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.",
+ Description: "OIDCUsernameClaim is the OpenID claim to use as the user name. Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ "oidcUsernamePrefix": {
+ SchemaProps: spec.SchemaProps{
+ Description: "OIDCUsernamePrefix is the prefix prepended to username claims to prevent clashes with existing names (such as 'system:' users).",
Type: []string{"string"},
Format: "",
},
},
"oidcGroupsClaim": {
SchemaProps: spec.SchemaProps{
- Description: "If provided, the name of a custom OpenID Connect claim for specifying user groups. The claim value is expected to be a string or array of strings.",
+ Description: "OIDCGroupsClaim if provided, the name of a custom OpenID Connect claim for specifying user groups. The claim value is expected to be a string or array of strings.",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ "oidcGroupsPrefix": {
+ SchemaProps: spec.SchemaProps{
+ Description: "OIDCGroupsPrefix is the prefix prepended to group claims to prevent clashes with existing names (such as 'system:' groups)",
Type: []string{"string"},
Format: "",
},
},
"oidcIssuerURL": {
SchemaProps: spec.SchemaProps{
- Description: "The URL of the OpenID issuer, only HTTPS scheme will be accepted. If set, it will be used to verify the OIDC JSON Web Token (JWT).",
+ Description: "OIDCIssuerURL is the URL of the OpenID issuer, only HTTPS scheme will be accepted. If set, it will be used to verify the OIDC JSON Web Token (JWT).",
Type: []string{"string"},
Format: "",
},
},
"oidcClientID": {
SchemaProps: spec.SchemaProps{
- Description: "The client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.",
+ Description: "OIDCClientID is the client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.",
Type: []string{"string"},
Format: "",
},
},
"oidcCAFile": {
SchemaProps: spec.SchemaProps{
- Description: "If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file",
+ Description: "OIDCCAFile if set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file",
Type: []string{"string"},
Format: "",
},
@@ -22949,6 +22986,13 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Format: "",
},
},
+ "auditLogFormat": {
+ SchemaProps: spec.SchemaProps{
+ Description: "AuditLogFormat flag specifies the format type for audit log files.",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
"auditLogPath": {
SchemaProps: spec.SchemaProps{
Description: "If set, all requests coming to the apiserver will be logged to this file.",
@@ -23694,6 +23738,12 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Format: "int32",
},
},
+ "imagePullProgressDeadline": {
+ SchemaProps: spec.SchemaProps{
+ Description: "ImagePullProgressDeadline is the timeout for image pulls If no pulling progress is made before this deadline, the image pulling will be cancelled. (default 1m0s)",
+ Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"),
+ },
+ },
"evictionHard": {
SchemaProps: spec.SchemaProps{
Description: "Comma-delimited list of hard eviction expressions. For example, 'memory.available<300Mi'.",
@@ -23875,6 +23925,7 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
"k8s.io/kops/pkg/apis/kops/v1alpha1.LoadBalancerAccessSpec": {
Schema: spec.Schema{
SchemaProps: spec.SchemaProps{
+ Description: "LoadBalancerAccessSpec provides configuration details related to API LoadBalancer and its access",
Properties: map[string]spec.Schema{
"type": {
SchemaProps: spec.SchemaProps{
@@ -23888,6 +23939,19 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Format: "int64",
},
},
+ "additionalSecurityGroups": {
+ SchemaProps: spec.SchemaProps{
+ Type: []string{"array"},
+ Items: &spec.SchemaOrArray{
+ Schema: &spec.Schema{
+ SchemaProps: spec.SchemaProps{
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ },
+ },
+ },
},
},
},
@@ -23953,11 +24017,16 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Ref: ref("k8s.io/kops/pkg/apis/kops/v1alpha1.RomanaNetworkingSpec"),
},
},
+ "amazonvpc": {
+ SchemaProps: spec.SchemaProps{
+ Ref: ref("k8s.io/kops/pkg/apis/kops/v1alpha1.AmazonVPCNetworkingSpec"),
+ },
+ },
},
},
},
Dependencies: []string{
- "k8s.io/kops/pkg/apis/kops/v1alpha1.CNINetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.CalicoNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.CanalNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.ClassicNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.ExternalNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.FlannelNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.KopeioNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.KubenetNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.KuberouterNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.RomanaNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.WeaveNetworkingSpec"},
+ "k8s.io/kops/pkg/apis/kops/v1alpha1.AmazonVPCNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.CNINetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.CalicoNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.CanalNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.ClassicNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.ExternalNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.FlannelNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.KopeioNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.KubenetNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.KuberouterNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.RomanaNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha1.WeaveNetworkingSpec"},
},
"k8s.io/kops/pkg/apis/kops/v1alpha1.RBACAuthorizationSpec": {
Schema: spec.Schema{
@@ -24197,6 +24266,15 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
},
Dependencies: []string{},
},
+ "k8s.io/kops/pkg/apis/kops/v1alpha2.AmazonVPCNetworkingSpec": {
+ Schema: spec.Schema{
+ SchemaProps: spec.SchemaProps{
+ Description: "AmazonVPCNetworkingSpec declares that we want Amazon VPC CNI networking",
+ Properties: map[string]spec.Schema{},
+ },
+ },
+ Dependencies: []string{},
+ },
"k8s.io/kops/pkg/apis/kops/v1alpha2.Assets": {
Schema: spec.Schema{
SchemaProps: spec.SchemaProps{
@@ -24679,6 +24757,20 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Format: "",
},
},
+ "additionalNetworkCIDRs": {
+ SchemaProps: spec.SchemaProps{
+ Description: "AdditionalNetworkCIDRs is a list of aditional CIDR used for the AWS VPC or otherwise allocated to k8s. This is a real CIDR, not the internal k8s network On AWS, it maps to any aditional CIDRs added to a VPC.",
+ Type: []string{"array"},
+ Items: &spec.SchemaOrArray{
+ Schema: &spec.Schema{
+ SchemaProps: spec.SchemaProps{
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ },
+ },
+ },
"networkID": {
SchemaProps: spec.SchemaProps{
Description: "NetworkID is an identifier of a network, if we want to reuse/share an existing network (e.g. an AWS VPC)",
@@ -26434,35 +26526,49 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
},
"oidcUsernameClaim": {
SchemaProps: spec.SchemaProps{
- Description: "The OpenID claim to use as the user name. Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.",
+ Description: "OIDCUsernameClaim is the OpenID claim to use as the user name. Note that claims other than the default ('sub') is not guaranteed to be unique and immutable.",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ "oidcUsernamePrefix": {
+ SchemaProps: spec.SchemaProps{
+ Description: "OIDCUsernamePrefix is the prefix prepended to username claims to prevent clashes with existing names (such as 'system:' users).",
Type: []string{"string"},
Format: "",
},
},
"oidcGroupsClaim": {
SchemaProps: spec.SchemaProps{
- Description: "If provided, the name of a custom OpenID Connect claim for specifying user groups. The claim value is expected to be a string or array of strings.",
+ Description: "OIDCGroupsClaim if provided, the name of a custom OpenID Connect claim for specifying user groups. The claim value is expected to be a string or array of strings.",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ "oidcGroupsPrefix": {
+ SchemaProps: spec.SchemaProps{
+ Description: "OIDCGroupsPrefix is the prefix prepended to group claims to prevent clashes with existing names (such as 'system:' groups)",
Type: []string{"string"},
Format: "",
},
},
"oidcIssuerURL": {
SchemaProps: spec.SchemaProps{
- Description: "The URL of the OpenID issuer, only HTTPS scheme will be accepted. If set, it will be used to verify the OIDC JSON Web Token (JWT).",
+ Description: "OIDCIssuerURL is the URL of the OpenID issuer, only HTTPS scheme will be accepted. If set, it will be used to verify the OIDC JSON Web Token (JWT).",
Type: []string{"string"},
Format: "",
},
},
"oidcClientID": {
SchemaProps: spec.SchemaProps{
- Description: "The client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.",
+ Description: "OIDCClientID is the client ID for the OpenID Connect client, must be set if oidc-issuer-url is set.",
Type: []string{"string"},
Format: "",
},
},
"oidcCAFile": {
SchemaProps: spec.SchemaProps{
- Description: "If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file",
+ Description: "OIDCCAFile if set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file",
Type: []string{"string"},
Format: "",
},
@@ -26481,6 +26587,13 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Format: "",
},
},
+ "auditLogFormat": {
+ SchemaProps: spec.SchemaProps{
+ Description: "AuditLogFormat flag specifies the format type for audit log files.",
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
"auditLogPath": {
SchemaProps: spec.SchemaProps{
Description: "If set, all requests coming to the apiserver will be logged to this file.",
@@ -27223,6 +27336,12 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Format: "int32",
},
},
+ "imagePullProgressDeadline": {
+ SchemaProps: spec.SchemaProps{
+ Description: "ImagePullProgressDeadline is the timeout for image pulls If no pulling progress is made before this deadline, the image pulling will be cancelled. (default 1m0s)",
+ Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.Duration"),
+ },
+ },
"evictionHard": {
SchemaProps: spec.SchemaProps{
Description: "Comma-delimited list of hard eviction expressions. For example, 'memory.available<300Mi'.",
@@ -27404,6 +27523,7 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
"k8s.io/kops/pkg/apis/kops/v1alpha2.LoadBalancerAccessSpec": {
Schema: spec.Schema{
SchemaProps: spec.SchemaProps{
+ Description: "LoadBalancerAccessSpec provides configuration details related to API LoadBalancer and its access",
Properties: map[string]spec.Schema{
"type": {
SchemaProps: spec.SchemaProps{
@@ -27417,6 +27537,19 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Format: "int64",
},
},
+ "additionalSecurityGroups": {
+ SchemaProps: spec.SchemaProps{
+ Type: []string{"array"},
+ Items: &spec.SchemaOrArray{
+ Schema: &spec.Schema{
+ SchemaProps: spec.SchemaProps{
+ Type: []string{"string"},
+ Format: "",
+ },
+ },
+ },
+ },
+ },
},
},
},
@@ -27482,11 +27615,16 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
Ref: ref("k8s.io/kops/pkg/apis/kops/v1alpha2.RomanaNetworkingSpec"),
},
},
+ "amazonvpc": {
+ SchemaProps: spec.SchemaProps{
+ Ref: ref("k8s.io/kops/pkg/apis/kops/v1alpha2.AmazonVPCNetworkingSpec"),
+ },
+ },
},
},
},
Dependencies: []string{
- "k8s.io/kops/pkg/apis/kops/v1alpha2.CNINetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.CalicoNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.CanalNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.ClassicNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.ExternalNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.FlannelNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.KopeioNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.KubenetNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.KuberouterNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.RomanaNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.WeaveNetworkingSpec"},
+ "k8s.io/kops/pkg/apis/kops/v1alpha2.AmazonVPCNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.CNINetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.CalicoNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.CanalNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.ClassicNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.ExternalNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.FlannelNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.KopeioNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.KubenetNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.KuberouterNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.RomanaNetworkingSpec", "k8s.io/kops/pkg/apis/kops/v1alpha2.WeaveNetworkingSpec"},
},
"k8s.io/kops/pkg/apis/kops/v1alpha2.RBACAuthorizationSpec": {
Schema: spec.Schema{