Merge pull request #12472 from johngmyers/iam-substruct

Cleanup ClusterSpec code
This commit is contained in:
Kubernetes Prow Robot 2021-10-03 00:27:06 -07:00 committed by GitHub
commit def5386d14
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
60 changed files with 20 additions and 397 deletions

View File

@ -939,12 +939,10 @@ spec:
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
x-kubernetes-int-or-string: true
enableEtcdTLS:
description: EnableEtcdTLS indicates the etcd service should
use TLS between peers and clients
description: EnableEtcdTLS is unused.
type: boolean
enableTLSAuth:
description: EnableTLSAuth indicates client and peer TLS auth
should be enforced
description: EnableTLSAuth is unused.
type: boolean
etcdMembers:
description: Members stores the configurations for each member

View File

@ -359,41 +359,12 @@ func (c *NodeupModelContext) IsKubernetesLT(version string) bool {
return !c.IsKubernetesGTE(version)
}
// UseEtcdTLS checks if the etcd cluster has TLS enabled bool
func (c *NodeupModelContext) UseEtcdTLS() bool {
// @note: because we enforce that 'both' have to be enabled for TLS we only need to check one here.
for _, x := range c.Cluster.Spec.EtcdClusters {
if x.EnableEtcdTLS {
return true
}
}
return false
}
// UseVolumeMounts is used to check if we have volume mounts enabled as we need to
// insert requires and afters in various places
func (c *NodeupModelContext) UseVolumeMounts() bool {
return len(c.NodeupConfig.VolumeMounts) > 0
}
// UseEtcdTLSAuth checks the peer-auth is set in both cluster
// @NOTE: in retrospect i think we should have consolidated the common config in the wrapper struct; it
// feels weird we set things like version, tls etc per cluster since they both have to be the same.
func (c *NodeupModelContext) UseEtcdTLSAuth() bool {
if !c.UseEtcdTLS() {
return false
}
for _, x := range c.Cluster.Spec.EtcdClusters {
if x.EnableTLSAuth {
return true
}
}
return false
}
// UseKopsControllerForNodeBootstrap checks if nodeup should use kops-controller to bootstrap.
func (c *NodeupModelContext) UseKopsControllerForNodeBootstrap() bool {
return model.UseKopsControllerForNodeBootstrap(c.Cluster)

View File

@ -552,10 +552,6 @@ const (
EtcdProviderTypeManager EtcdProviderType = "Manager"
)
var SupportedEtcdProviderTypes = []string{
string(EtcdProviderTypeManager),
}
// EtcdClusterSpec is the etcd cluster specification
type EtcdClusterSpec struct {
// Name is the name of the etcd cluster (main, events etc)
@ -565,9 +561,9 @@ type EtcdClusterSpec struct {
Provider EtcdProviderType `json:"provider,omitempty"`
// Members stores the configurations for each member of the cluster (including the data volume)
Members []EtcdMemberSpec `json:"etcdMembers,omitempty"`
// EnableEtcdTLS indicates the etcd service should use TLS between peers and clients
// EnableEtcdTLS is unused.
EnableEtcdTLS bool `json:"enableEtcdTLS,omitempty"`
// EnableTLSAuth indicates client and peer TLS auth should be enforced
// EnableTLSAuth is unused.
EnableTLSAuth bool `json:"enableTLSAuth,omitempty"`
// Version is the version of etcd to run.
Version string `json:"version,omitempty"`

View File

@ -563,9 +563,9 @@ type EtcdClusterSpec struct {
Provider EtcdProviderType `json:"provider,omitempty"`
// Members stores the configurations for each member of the cluster (including the data volume)
Members []EtcdMemberSpec `json:"etcdMembers,omitempty"`
// EnableEtcdTLS indicates the etcd service should use TLS between peers and clients
// EnableEtcdTLS is unused.
EnableEtcdTLS bool `json:"enableEtcdTLS,omitempty"`
// EnableTLSAuth indicates client and peer TLS auth should be enforced
// EnableTLSAuth is unused.
EnableTLSAuth bool `json:"enableTLSAuth,omitempty"`
// Version is the version of etcd to run.
Version string `json:"version,omitempty"`

View File

@ -563,9 +563,9 @@ type EtcdClusterSpec struct {
Provider EtcdProviderType `json:"provider,omitempty"`
// Members stores the configurations for each member of the cluster (including the data volume)
Members []EtcdMemberSpec `json:"etcdMembers,omitempty"`
// EnableEtcdTLS indicates the etcd service should use TLS between peers and clients
// EnableEtcdTLS is unused.
EnableEtcdTLS bool `json:"enableEtcdTLS,omitempty"`
// EnableTLSAuth indicates client and peer TLS auth should be enforced
// EnableTLSAuth is unused.
EnableTLSAuth bool `json:"enableTLSAuth,omitempty"`
// Version is the version of etcd to run.
Version string `json:"version,omitempty"`

View File

@ -201,7 +201,6 @@ func validateClusterSpec(spec *kops.ClusterSpec, c *kops.Cluster, fieldPath *fie
allErrs = append(allErrs, validateEtcdClusterSpec(etcdCluster, c, fieldEtcdClusters.Index(i))...)
}
allErrs = append(allErrs, validateEtcdBackupStore(spec.EtcdClusters, fieldEtcdClusters)...)
allErrs = append(allErrs, validateEtcdTLS(spec.EtcdClusters, fieldEtcdClusters)...)
allErrs = append(allErrs, validateEtcdStorage(spec.EtcdClusters, fieldEtcdClusters)...)
}
}
@ -224,10 +223,6 @@ func validateClusterSpec(spec *kops.ClusterSpec, c *kops.Cluster, fieldPath *fie
}
}
if spec.IAM == nil || spec.IAM.Legacy {
allErrs = append(allErrs, field.Forbidden(fieldPath.Child("iam", "legacy"), "legacy IAM permissions are no longer supported"))
}
if spec.RollingUpdate != nil {
allErrs = append(allErrs, validateRollingUpdate(spec.RollingUpdate, fieldPath.Child("rollingUpdate"), false)...)
}
@ -256,6 +251,10 @@ func validateClusterSpec(spec *kops.ClusterSpec, c *kops.Cluster, fieldPath *fie
}
if spec.IAM != nil {
if spec.IAM.Legacy {
allErrs = append(allErrs, field.Forbidden(fieldPath.Child("iam", "legacy"), "legacy IAM permissions are no longer supported"))
}
if len(spec.IAM.ServiceAccountExternalPermissions) > 0 {
if spec.ServiceAccountIssuerDiscovery == nil || !spec.ServiceAccountIssuerDiscovery.EnableAWSOIDCProvider {
allErrs = append(allErrs, field.Forbidden(fieldPath.Child("iam", "serviceAccountExternalPermissions"), "serviceAccountExternalPermissions requires AWS OIDC Provider to be enabled"))
@ -1005,7 +1004,7 @@ func validateEtcdClusterSpec(spec kops.EtcdClusterSpec, c *kops.Cluster, fieldPa
}
if spec.Provider != "" {
value := string(spec.Provider)
allErrs = append(allErrs, IsValidValue(fieldPath.Child("provider"), &value, kops.SupportedEtcdProviderTypes)...)
allErrs = append(allErrs, IsValidValue(fieldPath.Child("provider"), &value, []string{string(kops.EtcdProviderTypeManager)})...)
}
if len(spec.Members) == 0 {
allErrs = append(allErrs, field.Required(fieldPath.Child("etcdMembers"), "No members defined in etcd cluster"))
@ -1035,23 +1034,6 @@ func validateEtcdBackupStore(specs []kops.EtcdClusterSpec, fieldPath *field.Path
return allErrs
}
// validateEtcdTLS checks the TLS settings for etcd are valid
func validateEtcdTLS(specs []kops.EtcdClusterSpec, fieldPath *field.Path) field.ErrorList {
allErrs := field.ErrorList{}
var usingTLS int
for _, x := range specs {
if x.EnableEtcdTLS {
usingTLS++
}
}
// check both clusters are using tls if one is enabled
if usingTLS > 0 && usingTLS != len(specs) {
allErrs = append(allErrs, field.Forbidden(fieldPath.Index(0).Child("enableEtcdTLS"), "both etcd clusters must have TLS enabled or none at all"))
}
return allErrs
}
// validateEtcdStorage is responsible for checking versions are identical.
func validateEtcdStorage(specs []kops.EtcdClusterSpec, fieldPath *field.Path) field.ErrorList {
allErrs := field.ErrorList{}

View File

@ -444,7 +444,6 @@ func Test_Validate_AdditionalPolicies(t *testing.T) {
},
},
},
IAM: &kops.IAMSpec{},
}
errs := validateClusterSpec(clusterSpec, &kops.Cluster{Spec: *clusterSpec}, field.NewPath("spec"))
testErrors(t, g.Input, errs, g.ExpectedErrors)

View File

@ -168,7 +168,7 @@ func (b *PolicyBuilder) BuildAlicloudPolicyMaster() (*Policy, error) {
return nil, fmt.Errorf("failed to generate Alicloud RAM OSS access statements: %v", err)
}
if b.Cluster.Spec.IAM.AllowContainerRegistry {
if b.Cluster.Spec.IAM != nil && b.Cluster.Spec.IAM.AllowContainerRegistry {
addCRPermissions(p)
}
@ -190,7 +190,7 @@ func (b *PolicyBuilder) BuildAlicloudPolicyNode() (*Policy, error) {
return nil, fmt.Errorf("failed to generate Alicloud RAM OSS access statements: %v", err)
}
if b.Cluster.Spec.IAM.AllowContainerRegistry {
if b.Cluster.Spec.IAM != nil && b.Cluster.Spec.IAM.AllowContainerRegistry {
addCRPermissions(p)
}

View File

@ -141,15 +141,11 @@ func (b *KubeAPIServerOptionsBuilder) BuildOptions(o interface{}) error {
c.EtcdServersOverrides = nil
for _, etcdCluster := range clusterSpec.EtcdClusters {
protocol := "http"
if etcdCluster.EnableEtcdTLS {
protocol = "https"
}
switch etcdCluster.Name {
case "main":
c.EtcdServers = append(c.EtcdServers, protocol+"://127.0.0.1:4001")
c.EtcdServers = append(c.EtcdServers, "https://127.0.0.1:4001")
case "events":
c.EtcdServersOverrides = append(c.EtcdServersOverrides, "/events#"+protocol+"://127.0.0.1:4002")
c.EtcdServersOverrides = append(c.EtcdServersOverrides, "/events#https://127.0.0.1:4002")
}
}

View File

@ -17,9 +17,6 @@ limitations under the License.
package components
import (
"fmt"
"strings"
"k8s.io/kops/pkg/apis/kops"
"k8s.io/kops/upup/pkg/fi/loader"
)
@ -43,10 +40,6 @@ func (b *EtcdOptionsBuilder) BuildOptions(o interface{}) error {
for i := range spec.EtcdClusters {
c := &spec.EtcdClusters[i]
if c.Provider == "" {
c.Provider = kops.EtcdProviderTypeManager
}
// Ensure the version is set
if c.Version == "" {
// We run the k8s-recommended versions of etcd
@ -58,15 +51,6 @@ func (b *EtcdOptionsBuilder) BuildOptions(o interface{}) error {
c.Version = DefaultEtcd3Version_1_17
}
}
// We make sure that etcd v3 is used
version := strings.TrimPrefix(c.Version, "v")
if !strings.HasPrefix(version, "3.") {
return fmt.Errorf("unexpected etcd version %q", c.Version)
}
c.EnableEtcdTLS = true
c.EnableTLSAuth = true
}
return nil

View File

@ -310,17 +310,6 @@ func (b *KopsModelContext) UseNetworkLoadBalancer() bool {
return b.Cluster.Spec.API.LoadBalancer.Class == kops.LoadBalancerClassNetwork
}
// UseEtcdTLS checks to see if etcd tls is enabled
func (b *KopsModelContext) UseEtcdTLS() bool {
for _, x := range b.Cluster.Spec.EtcdClusters {
if x.EnableEtcdTLS {
return true
}
}
return false
}
// UseSSHKey returns true if SSHKeyName from the cluster spec is set to a nonempty string
// or there is an SSH public key provisioned in the key store.
func (b *KopsModelContext) UseSSHKey() bool {

View File

@ -298,7 +298,7 @@ func (r *NodeRoleAPIServer) BuildAWSPolicy(b *PolicyBuilder) (*Policy, error) {
addKMSIAMPolicies(p, stringorslice.Slice(b.KMSKeys))
}
if b.Cluster.Spec.IAM.AllowContainerRegistry {
if b.Cluster.Spec.IAM != nil && b.Cluster.Spec.IAM.AllowContainerRegistry {
addECRPermissions(p)
}
@ -365,7 +365,7 @@ func (r *NodeRoleMaster) BuildAWSPolicy(b *PolicyBuilder) (*Policy, error) {
}
}
if b.Cluster.Spec.IAM.AllowContainerRegistry {
if b.Cluster.Spec.IAM != nil && b.Cluster.Spec.IAM.AllowContainerRegistry {
addECRPermissions(p)
}
@ -395,7 +395,7 @@ func (r *NodeRoleNode) BuildAWSPolicy(b *PolicyBuilder) (*Policy, error) {
return nil, fmt.Errorf("failed to generate AWS IAM S3 access statements: %v", err)
}
if b.Cluster.Spec.IAM.AllowContainerRegistry {
if b.Cluster.Spec.IAM != nil && b.Cluster.Spec.IAM.AllowContainerRegistry {
addECRPermissions(p)
}

View File

@ -47,8 +47,6 @@ func BuildMinimalCluster(clusterName string) *kops.Cluster {
},
}
c.Spec.IAM = &kops.IAMSpec{}
c.Spec.Networking = &kops.NetworkingSpec{}
c.Spec.NetworkCIDR = "172.20.0.0/16"

View File

@ -31,23 +31,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/bastionuserdata.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/bastionuserdata.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -46,23 +46,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/complex.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/complex.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/compress.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/compress.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/123.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/123.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,8 +27,6 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://tests/existing-iam.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: a
@ -37,12 +35,9 @@ spec:
- instanceGroup: master-us-test-1c
name: c
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://tests/existing-iam.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: a
@ -51,7 +46,6 @@ spec:
- instanceGroup: master-us-test-1c
name: c
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -30,8 +30,6 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/existingsg.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: a
@ -40,12 +38,9 @@ spec:
- instanceGroup: master-us-test-1c
name: c
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/existingsg.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: a
@ -54,7 +49,6 @@ spec:
- instanceGroup: master-us-test-1c
name: c
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: external-dns

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: external-dns

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/externallb.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/externallb.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -35,23 +35,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/externalpolicies.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/externalpolicies.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,8 +27,6 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://tests/ha.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: a
@ -37,12 +35,9 @@ spec:
- instanceGroup: master-us-test-1c
name: c
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://tests/ha.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: a
@ -51,7 +46,6 @@ spec:
- instanceGroup: master-us-test-1c
name: c
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,8 +27,6 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://tests/ha-gce.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test1-a
name: "1"
@ -37,12 +35,9 @@ spec:
- instanceGroup: master-us-test1-c
name: "3"
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://tests/ha-gce.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test1-a
name: "1"
@ -51,7 +46,6 @@ spec:
- instanceGroup: master-us-test1-c
name: "3"
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal-ipv6.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal-ipv6.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -50,23 +50,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -50,23 +50,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -43,23 +43,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,8 +27,6 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
@ -37,19 +35,15 @@ spec:
volumeThroughput: 125
volumeType: gp3
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
volumeSize: 20
volumeType: gp3
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal-ipv6.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal-ipv6.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -28,23 +28,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal-warmpool.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal-warmpool.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://tests/minimal-gce.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test1-a
name: "1"
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://tests/minimal-gce.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test1-a
name: "1"
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://tests/minimal-gce-private.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test1-a
name: "1"
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://tests/minimal-gce-private.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test1-a
name: "1"
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -26,23 +26,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.k8s.local/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.k8s.local/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,8 +27,6 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
@ -37,12 +35,9 @@ spec:
- instanceGroup: master-us-test-1c
name: us-test-1c
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
@ -51,7 +46,6 @@ spec:
- instanceGroup: master-us-test-1c
name: us-test-1c
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,8 +27,6 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
@ -37,12 +35,9 @@ spec:
- instanceGroup: master-us-test-1c
name: us-test-1c
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
@ -51,7 +46,6 @@ spec:
- instanceGroup: master-us-test-1c
name: us-test-1c
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/nthsqsresources.longclustername.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/nthsqsresources.longclustername.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -30,23 +30,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privatecanal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privatecanal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -38,23 +38,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.3
- backups:
backupStore: memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.3
externalDns:
provider: dns-controller

View File

@ -29,33 +29,24 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/cilium
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: cilium
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -32,23 +32,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privatedns1.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privatedns1.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privatedns2.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privatedns2.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privateflannel.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privateflannel.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/privateweave.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/privateweave.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -36,23 +36,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -29,23 +29,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/unmanaged.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/unmanaged.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -27,23 +27,17 @@ spec:
etcdClusters:
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/main
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: main
provider: Manager
version: 3.4.13
- backups:
backupStore: memfs://clusters.example.com/minimal.example.com/backups/etcd/events
enableEtcdTLS: true
enableTLSAuth: true
etcdMembers:
- instanceGroup: master-us-test-1a
name: us-test-1a
name: events
provider: Manager
version: 3.4.13
externalDns:
provider: dns-controller

View File

@ -71,12 +71,10 @@ type TemplateFunctions struct {
func (tf *TemplateFunctions) AddTo(dest template.FuncMap, secretStore fi.SecretStore) (err error) {
cluster := tf.Cluster
dest["EtcdScheme"] = tf.EtcdScheme
dest["SharedVPC"] = tf.SharedVPC
dest["ToJSON"] = tf.ToJSON
dest["ToYAML"] = tf.ToYAML
dest["UseBootstrapTokens"] = tf.UseBootstrapTokens
dest["UseEtcdTLS"] = tf.UseEtcdTLS
// Remember that we may be on a different arch from the target. Hard-code for now.
dest["replace"] = func(s, find, replace string) string {
return strings.Replace(s, find, replace, -1)
@ -280,15 +278,6 @@ func (tf *TemplateFunctions) ToYAML(data interface{}) string {
return string(encoded)
}
// EtcdScheme parses and grabs the protocol to the etcd cluster
func (tf *TemplateFunctions) EtcdScheme() string {
if tf.UseEtcdTLS() {
return "https"
}
return "http"
}
// SharedVPC is a simple helper function which makes the templates for a shared VPC clearer
func (tf *TemplateFunctions) SharedVPC() bool {
return tf.Cluster.SharedVPC()