mirror of https://github.com/kubernetes/kops.git
commit
97afdf9f97
|
@ -412,6 +412,9 @@ type KubeAPIServerConfig struct {
|
||||||
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
||||||
// otherwise the host's root CA set will be used.
|
// otherwise the host's root CA set will be used.
|
||||||
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
||||||
|
|
||||||
|
AuthorizationMode *string `json:"authorizationMode,omitempty" flag:"authorization-mode"`
|
||||||
|
AuthorizationRBACSuperUser *string `json:"authorizationRbacSuperUser,omitempty" flag:"authorization-rbac-super-user"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type KubeControllerManagerConfig struct {
|
type KubeControllerManagerConfig struct {
|
||||||
|
|
|
@ -408,6 +408,9 @@ type KubeAPIServerConfig struct {
|
||||||
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
||||||
// otherwise the host's root CA set will be used.
|
// otherwise the host's root CA set will be used.
|
||||||
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
||||||
|
|
||||||
|
AuthorizationMode *string `json:"authorizationMode,omitempty" flag:"authorization-mode"`
|
||||||
|
AuthorizationRBACSuperUser *string `json:"authorizationRbacSuperUser,omitempty" flag:"authorization-rbac-super-user"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type KubeControllerManagerConfig struct {
|
type KubeControllerManagerConfig struct {
|
||||||
|
|
|
@ -964,6 +964,8 @@ func autoConvert_v1alpha1_KubeAPIServerConfig_To_kops_KubeAPIServerConfig(in *Ku
|
||||||
out.OIDCIssuerURL = in.OIDCIssuerURL
|
out.OIDCIssuerURL = in.OIDCIssuerURL
|
||||||
out.OIDCClientID = in.OIDCClientID
|
out.OIDCClientID = in.OIDCClientID
|
||||||
out.OIDCCAFile = in.OIDCCAFile
|
out.OIDCCAFile = in.OIDCCAFile
|
||||||
|
out.AuthorizationMode = in.AuthorizationMode
|
||||||
|
out.AuthorizationRBACSuperUser = in.AuthorizationRBACSuperUser
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -999,6 +1001,8 @@ func autoConvert_kops_KubeAPIServerConfig_To_v1alpha1_KubeAPIServerConfig(in *ko
|
||||||
out.OIDCIssuerURL = in.OIDCIssuerURL
|
out.OIDCIssuerURL = in.OIDCIssuerURL
|
||||||
out.OIDCClientID = in.OIDCClientID
|
out.OIDCClientID = in.OIDCClientID
|
||||||
out.OIDCCAFile = in.OIDCCAFile
|
out.OIDCCAFile = in.OIDCCAFile
|
||||||
|
out.AuthorizationMode = in.AuthorizationMode
|
||||||
|
out.AuthorizationRBACSuperUser = in.AuthorizationRBACSuperUser
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -176,6 +176,9 @@ type KubeAPIServerConfig struct {
|
||||||
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
// If set, the OpenID server's certificate will be verified by one of the authorities in the oidc-ca-file
|
||||||
// otherwise the host's root CA set will be used.
|
// otherwise the host's root CA set will be used.
|
||||||
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
OIDCCAFile *string `json:"oidcCAFile,omitempty" flag:"oidc-ca-file"`
|
||||||
|
|
||||||
|
AuthorizationMode *string `json:"authorizationMode,omitempty" flag:"authorization-mode"`
|
||||||
|
AuthorizationRBACSuperUser *string `json:"authorizationRbacSuperUser,omitempty" flag:"authorization-rbac-super-user"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type KubeControllerManagerConfig struct {
|
type KubeControllerManagerConfig struct {
|
||||||
|
|
Loading…
Reference in New Issue