mirror of https://github.com/kubernetes/kops.git
Remove vestigial Cilium ContainerRuntimeLabels code
This commit is contained in:
parent
bfaee4e6ef
commit
fdc128fda4
|
|
@ -513,12 +513,6 @@ type CiliumNetworkingSpec struct {
|
||||||
// with the less powerful legacy implementation.
|
// with the less powerful legacy implementation.
|
||||||
// Default: false
|
// Default: false
|
||||||
ToFqdnsEnablePoller bool `json:"toFqdnsEnablePoller,omitempty"`
|
ToFqdnsEnablePoller bool `json:"toFqdnsEnablePoller,omitempty"`
|
||||||
// ContainerRuntimeLabels enables fetching of container-runtime labels from the specified container runtime and associating them with endpoints.
|
|
||||||
// Supported values are: "none", "containerd", "crio", "docker", "auto"
|
|
||||||
// As of Cilium 1.7.0, Cilium no longer fetches information from the
|
|
||||||
// container runtime and this field is ignored.
|
|
||||||
// Default: none
|
|
||||||
ContainerRuntimeLabels string `json:"containerRuntimeLabels,omitempty"`
|
|
||||||
// Ipam specifies the IP address allocation mode to use.
|
// Ipam specifies the IP address allocation mode to use.
|
||||||
// Possible values are "crd" and "eni".
|
// Possible values are "crd" and "eni".
|
||||||
// "eni" will use AWS native networking for pods. Eni requires masquerade to be set to false.
|
// "eni" will use AWS native networking for pods. Eni requires masquerade to be set to false.
|
||||||
|
|
|
||||||
|
|
@ -522,11 +522,8 @@ type CiliumNetworkingSpec struct {
|
||||||
// with the less powerful legacy implementation.
|
// with the less powerful legacy implementation.
|
||||||
// Default: false
|
// Default: false
|
||||||
ToFqdnsEnablePoller bool `json:"toFqdnsEnablePoller,omitempty"`
|
ToFqdnsEnablePoller bool `json:"toFqdnsEnablePoller,omitempty"`
|
||||||
// ContainerRuntimeLabels enables fetching of container-runtime labels from the specified container runtime and associating them with endpoints.
|
// ContainerRuntimeLabels is unused.
|
||||||
// Supported values are: "none", "containerd", "crio", "docker", "auto"
|
// +k8s:conversion-gen=false
|
||||||
// As of Cilium 1.7.0, Cilium no longer fetches information from the
|
|
||||||
// container runtime and this field is ignored.
|
|
||||||
// Default: none
|
|
||||||
ContainerRuntimeLabels string `json:"containerRuntimeLabels,omitempty"`
|
ContainerRuntimeLabels string `json:"containerRuntimeLabels,omitempty"`
|
||||||
// Ipam specifies the IP address allocation mode to use.
|
// Ipam specifies the IP address allocation mode to use.
|
||||||
// Possible values are "crd" and "eni".
|
// Possible values are "crd" and "eni".
|
||||||
|
|
|
||||||
|
|
@ -502,12 +502,6 @@ type CiliumNetworkingSpec struct {
|
||||||
// with the less powerful legacy implementation.
|
// with the less powerful legacy implementation.
|
||||||
// Default: false
|
// Default: false
|
||||||
ToFqdnsEnablePoller bool `json:"toFqdnsEnablePoller,omitempty"`
|
ToFqdnsEnablePoller bool `json:"toFqdnsEnablePoller,omitempty"`
|
||||||
// ContainerRuntimeLabels enables fetching of container-runtime labels from the specified container runtime and associating them with endpoints.
|
|
||||||
// Supported values are: "none", "containerd", "crio", "docker", "auto"
|
|
||||||
// As of Cilium 1.7.0, Cilium no longer fetches information from the
|
|
||||||
// container runtime and this field is ignored.
|
|
||||||
// Default: none
|
|
||||||
ContainerRuntimeLabels string `json:"containerRuntimeLabels,omitempty"`
|
|
||||||
// Ipam specifies the IP address allocation mode to use.
|
// Ipam specifies the IP address allocation mode to use.
|
||||||
// Possible values are "crd" and "eni".
|
// Possible values are "crd" and "eni".
|
||||||
// "eni" will use AWS native networking for pods. Eni requires masquerade to be set to false.
|
// "eni" will use AWS native networking for pods. Eni requires masquerade to be set to false.
|
||||||
|
|
|
||||||
|
|
@ -871,10 +871,6 @@ func validateNetworkingCilium(cluster *kops.Cluster, v *kops.CiliumNetworkingSpe
|
||||||
allErrs = append(allErrs, IsValidValue(fldPath.Child("monitorAggregation"), &v.MonitorAggregation, []string{"low", "medium", "maximum"})...)
|
allErrs = append(allErrs, IsValidValue(fldPath.Child("monitorAggregation"), &v.MonitorAggregation, []string{"low", "medium", "maximum"})...)
|
||||||
}
|
}
|
||||||
|
|
||||||
if v.ContainerRuntimeLabels != "" {
|
|
||||||
allErrs = append(allErrs, IsValidValue(fldPath.Child("containerRuntimeLabels"), &v.ContainerRuntimeLabels, []string{"none", "containerd", "crio", "docker", "auto"})...)
|
|
||||||
}
|
|
||||||
|
|
||||||
if v.IdentityAllocationMode != "" {
|
if v.IdentityAllocationMode != "" {
|
||||||
allErrs = append(allErrs, IsValidValue(fldPath.Child("identityAllocationMode"), &v.IdentityAllocationMode, []string{"crd", "kvstore"})...)
|
allErrs = append(allErrs, IsValidValue(fldPath.Child("identityAllocationMode"), &v.IdentityAllocationMode, []string{"crd", "kvstore"})...)
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -103,10 +103,6 @@ func (b *CiliumOptionsBuilder) BuildOptions(o interface{}) error {
|
||||||
c.ToFqdnsDNSRejectResponseCode = "refused"
|
c.ToFqdnsDNSRejectResponseCode = "refused"
|
||||||
}
|
}
|
||||||
|
|
||||||
if c.ContainerRuntimeLabels == "" {
|
|
||||||
c.ContainerRuntimeLabels = "none"
|
|
||||||
}
|
|
||||||
|
|
||||||
if c.AgentPrometheusPort == 0 {
|
if c.AgentPrometheusPort == 0 {
|
||||||
c.AgentPrometheusPort = wellknownports.CiliumPrometheusPort
|
c.AgentPrometheusPort = wellknownports.CiliumPrometheusPort
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -148,7 +148,6 @@ data:
|
||||||
# - none
|
# - none
|
||||||
# - auto (automatically detect the container runtime)
|
# - auto (automatically detect the container runtime)
|
||||||
#
|
#
|
||||||
container-runtime: "{{ .ContainerRuntimeLabels }}"
|
|
||||||
masquerade: "{{- if WithDefaultBool .DisableMasquerade false -}}false{{- else -}}true{{- end -}}"
|
masquerade: "{{- if WithDefaultBool .DisableMasquerade false -}}false{{- else -}}true{{- end -}}"
|
||||||
install-iptables-rules: "{{- if .IPTablesRulesNoinstall -}}false{{- else -}}true{{- end -}}"
|
install-iptables-rules: "{{- if .IPTablesRulesNoinstall -}}false{{- else -}}true{{- end -}}"
|
||||||
auto-direct-node-routes: "{{ .AutoDirectNodeRoutes }}"
|
auto-direct-node-routes: "{{ .AutoDirectNodeRoutes }}"
|
||||||
|
|
|
||||||
|
|
@ -201,7 +201,6 @@ data:
|
||||||
# - none
|
# - none
|
||||||
# - auto (automatically detect the container runtime)
|
# - auto (automatically detect the container runtime)
|
||||||
#
|
#
|
||||||
container-runtime: "{{ .ContainerRuntimeLabels }}"
|
|
||||||
masquerade: "{{- if WithDefaultBool .DisableMasquerade false -}}false{{- else -}}true{{- end -}}"
|
masquerade: "{{- if WithDefaultBool .DisableMasquerade false -}}false{{- else -}}true{{- end -}}"
|
||||||
install-iptables-rules: "{{- if .IPTablesRulesNoinstall -}}false{{- else -}}true{{- end -}}"
|
install-iptables-rules: "{{- if .IPTablesRulesNoinstall -}}false{{- else -}}true{{- end -}}"
|
||||||
auto-direct-node-routes: "{{ .AutoDirectNodeRoutes }}"
|
auto-direct-node-routes: "{{ .AutoDirectNodeRoutes }}"
|
||||||
|
|
|
||||||
|
|
@ -221,7 +221,6 @@ data:
|
||||||
# - none
|
# - none
|
||||||
# - auto (automatically detect the container runtime)
|
# - auto (automatically detect the container runtime)
|
||||||
#
|
#
|
||||||
container-runtime: "{{ .ContainerRuntimeLabels }}"
|
|
||||||
masquerade: "{{- if WithDefaultBool .DisableMasquerade false -}}false{{- else -}}true{{- end -}}"
|
masquerade: "{{- if WithDefaultBool .DisableMasquerade false -}}false{{- else -}}true{{- end -}}"
|
||||||
enable-ipv6-masquerade: "{{- if WithDefaultBool .DisableMasquerade false -}}false{{- else -}}true{{- end -}}"
|
enable-ipv6-masquerade: "{{- if WithDefaultBool .DisableMasquerade false -}}false{{- else -}}true{{- end -}}"
|
||||||
install-iptables-rules: "{{- if .IPTablesRulesNoinstall -}}false{{- else -}}true{{- end -}}"
|
install-iptables-rules: "{{- if .IPTablesRulesNoinstall -}}false{{- else -}}true{{- end -}}"
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue