Skip to content

Commit

Permalink
Update generated code
Browse files Browse the repository at this point in the history
  • Loading branch information
dependabot[bot] committed Nov 27, 2024
1 parent 717c568 commit 4a19734
Show file tree
Hide file tree
Showing 19 changed files with 55 additions and 489 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: eksconfigs.bootstrap.cluster.x-k8s.io
spec:
group: bootstrap.cluster.x-k8s.io
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: eksconfigtemplates.bootstrap.cluster.x-k8s.io
spec:
group: bootstrap.cluster.x-k8s.io
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: rosacontrolplanes.controlplane.cluster.x-k8s.io
spec:
group: controlplane.cluster.x-k8s.io
Expand Down Expand Up @@ -180,9 +180,7 @@ spec:
This field is effectively required, but due to backwards compatibility is
allowed to be empty. Instances of this type with an empty value here are
almost certainly wrong.
TODO: Add other useful fields. apiVersion, kind, uid?
More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Drop `kubebuilder:default` when controller-gen doesn't need it https://github.com/kubernetes-sigs/kubebuilder/issues/3896.
type: string
type: object
x-kubernetes-map-type: atomic
Expand All @@ -194,7 +192,6 @@ spec:
As these machinepool not created using ROSAMachinePool CR, they will not be visible/managed by ROSA CAPI provider.
`rosa list machinepools -c <rosaClusterName>` can be used to view those machinepools.
This field will be removed in the future once the current limitation is resolved.
properties:
autoscaling:
Expand Down Expand Up @@ -253,7 +250,6 @@ spec:
ExternalAuthProviders are external OIDC identity providers that can issue tokens for this cluster.
Can only be set if "enableExternalAuthProviders" is set to "True".
At most one provider can be configured.
items:
description: ExternalAuthProvider is an external OIDC identity provider
Expand All @@ -279,10 +275,8 @@ spec:
Prefix is a string to prefix the value from the token in the result of the
claim mapping.
By default, no prefixing occurs.
Example: if `prefix` is set to "myoidc:"" and the `claim` in JWT contains
an array of strings "a", "b" and "c", the mapping will result in an
array of string "myoidc:a", "myoidc:b" and "myoidc:c".
Expand All @@ -295,7 +289,6 @@ spec:
Username is a name of the claim that should be used to construct
usernames for the cluster identity.
Default value: "sub"
properties:
claim:
Expand All @@ -311,14 +304,11 @@ spec:
description: |-
PrefixPolicy specifies how a prefix should apply.
By default, claims other than `email` will be prefixed with the issuer URL to
prevent naming clashes with other plugins.
Set to "NoPrefix" to disable prefixing.
Example:
(1) `prefix` is set to "myoidc:" and `claim` is set to "username".
If the JWT claim `username` contains value `userA`, the resulting
Expand Down Expand Up @@ -574,8 +564,8 @@ spec:
properties:
controlPlaneOperatorARN:
description: "ControlPlaneOperatorARN is an ARN value referencing
a role appropriate for the Control Plane Operator.\n\n\nThe
following is an example of a valid policy document:\n\n\n{\n\t\"Version\":
a role appropriate for the Control Plane Operator.\n\nThe following
is an example of a valid policy document:\n\n{\n\t\"Version\":
\"2012-10-17\",\n\t\"Statement\": [\n\t\t{\n\t\t\t\"Effect\":
\"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"ec2:CreateVpcEndpoint\",\n\t\t\t\t\"ec2:DescribeVpcEndpoints\",\n\t\t\t\t\"ec2:ModifyVpcEndpoint\",\n\t\t\t\t\"ec2:DeleteVpcEndpoints\",\n\t\t\t\t\"ec2:CreateTags\",\n\t\t\t\t\"route53:ListHostedZones\",\n\t\t\t\t\"ec2:CreateSecurityGroup\",\n\t\t\t\t\"ec2:AuthorizeSecurityGroupIngress\",\n\t\t\t\t\"ec2:AuthorizeSecurityGroupEgress\",\n\t\t\t\t\"ec2:DeleteSecurityGroup\",\n\t\t\t\t\"ec2:RevokeSecurityGroupIngress\",\n\t\t\t\t\"ec2:RevokeSecurityGroupEgress\",\n\t\t\t\t\"ec2:DescribeSecurityGroups\",\n\t\t\t\t\"ec2:DescribeVpcs\",\n\t\t\t],\n\t\t\t\"Resource\":
\"*\"\n\t\t},\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\":
Expand All @@ -584,8 +574,8 @@ spec:
type: string
imageRegistryARN:
description: "ImageRegistryARN is an ARN value referencing a role
appropriate for the Image Registry Operator.\n\n\nThe following
is an example of a valid policy document:\n\n\n{\n\t\"Version\":
appropriate for the Image Registry Operator.\n\nThe following
is an example of a valid policy document:\n\n{\n\t\"Version\":
\"2012-10-17\",\n\t\"Statement\": [\n\t\t{\n\t\t\t\"Effect\":
\"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"s3:CreateBucket\",\n\t\t\t\t\"s3:DeleteBucket\",\n\t\t\t\t\"s3:PutBucketTagging\",\n\t\t\t\t\"s3:GetBucketTagging\",\n\t\t\t\t\"s3:PutBucketPublicAccessBlock\",\n\t\t\t\t\"s3:GetBucketPublicAccessBlock\",\n\t\t\t\t\"s3:PutEncryptionConfiguration\",\n\t\t\t\t\"s3:GetEncryptionConfiguration\",\n\t\t\t\t\"s3:PutLifecycleConfiguration\",\n\t\t\t\t\"s3:GetLifecycleConfiguration\",\n\t\t\t\t\"s3:GetBucketLocation\",\n\t\t\t\t\"s3:ListBucket\",\n\t\t\t\t\"s3:GetObject\",\n\t\t\t\t\"s3:PutObject\",\n\t\t\t\t\"s3:DeleteObject\",\n\t\t\t\t\"s3:ListBucketMultipartUploads\",\n\t\t\t\t\"s3:AbortMultipartUpload\",\n\t\t\t\t\"s3:ListMultipartUploadParts\"\n\t\t\t],\n\t\t\t\"Resource\":
\"*\"\n\t\t}\n\t]\n}"
Expand All @@ -597,11 +587,11 @@ spec:
\"Allow\",\n\t\t\t\t\"Principal\": {\n\t\t\t\t\t\"Federated\":
\"{{ .ProviderARN }}\"\n\t\t\t\t},\n\t\t\t\t\t\"Action\": \"sts:AssumeRoleWithWebIdentity\",\n\t\t\t\t\"Condition\":
{\n\t\t\t\t\t\"StringEquals\": {\n\t\t\t\t\t\t\"{{ .ProviderName
}}:sub\": {{ .ServiceAccounts }}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t]\n\t}\n\n\nIngressARN
}}:sub\": {{ .ServiceAccounts }}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t]\n\t}\n\nIngressARN
is an ARN value referencing a role appropriate for the Ingress
Operator.\n\n\nThe following is an example of a valid policy
document:\n\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
[\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"elasticloadbalancing:DescribeLoadBalancers\",\n\t\t\t\t\"tag:GetResources\",\n\t\t\t\t\"route53:ListHostedZones\"\n\t\t\t],\n\t\t\t\"Resource\":
Operator.\n\nThe following is an example of a valid policy document:\n\n{\n\t\"Version\":
\"2012-10-17\",\n\t\"Statement\": [\n\t\t{\n\t\t\t\"Effect\":
\"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"elasticloadbalancing:DescribeLoadBalancers\",\n\t\t\t\t\"tag:GetResources\",\n\t\t\t\t\"route53:ListHostedZones\"\n\t\t\t],\n\t\t\t\"Resource\":
\"*\"\n\t\t},\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\":
[\n\t\t\t\t\"route53:ChangeResourceRecordSets\"\n\t\t\t],\n\t\t\t\"Resource\":
[\n\t\t\t\t\"arn:aws:route53:::PUBLIC_ZONE_ID\",\n\t\t\t\t\"arn:aws:route53:::PRIVATE_ZONE_ID\"\n\t\t\t]\n\t\t}\n\t]\n}"
Expand All @@ -613,10 +603,8 @@ spec:
KubeCloudControllerARN is an ARN value referencing a role appropriate for the KCM/KCC.
Source: https://cloud-provider-aws.sigs.k8s.io/prerequisites/#iam-policies
The following is an example of a valid policy document:
{
"Version": "2012-10-17",
"Statement": [
Expand Down Expand Up @@ -690,8 +678,8 @@ spec:
type: string
networkARN:
description: "NetworkARN is an ARN value referencing a role appropriate
for the Network Operator.\n\n\nThe following is an example of
a valid policy document:\n\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
for the Network Operator.\n\nThe following is an example of
a valid policy document:\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
[\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"ec2:DescribeInstances\",\n
\ \"ec2:DescribeInstanceStatus\",\n \"ec2:DescribeInstanceTypes\",\n
\ \"ec2:UnassignPrivateIpAddresses\",\n \"ec2:AssignPrivateIpAddresses\",\n
Expand All @@ -701,8 +689,8 @@ spec:
type: string
nodePoolManagementARN:
description: "NodePoolManagementARN is an ARN value referencing
a role appropriate for the CAPI Controller.\n\n\nThe following
is an example of a valid policy document:\n\n\n{\n \"Version\":
a role appropriate for the CAPI Controller.\n\nThe following
is an example of a valid policy document:\n\n{\n \"Version\":
\"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": [\n
\ \"ec2:AssociateRouteTable\",\n \"ec2:AttachInternetGateway\",\n
\ \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateInternetGateway\",\n
Expand Down Expand Up @@ -746,8 +734,8 @@ spec:
type: string
storageARN:
description: "StorageARN is an ARN value referencing a role appropriate
for the Storage Operator.\n\n\nThe following is an example of
a valid policy document:\n\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
for the Storage Operator.\n\nThe following is an example of
a valid policy document:\n\n{\n\t\"Version\": \"2012-10-17\",\n\t\"Statement\":
[\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\": [\n\t\t\t\t\"ec2:AttachVolume\",\n\t\t\t\t\"ec2:CreateSnapshot\",\n\t\t\t\t\"ec2:CreateTags\",\n\t\t\t\t\"ec2:CreateVolume\",\n\t\t\t\t\"ec2:DeleteSnapshot\",\n\t\t\t\t\"ec2:DeleteTags\",\n\t\t\t\t\"ec2:DeleteVolume\",\n\t\t\t\t\"ec2:DescribeInstances\",\n\t\t\t\t\"ec2:DescribeSnapshots\",\n\t\t\t\t\"ec2:DescribeTags\",\n\t\t\t\t\"ec2:DescribeVolumes\",\n\t\t\t\t\"ec2:DescribeVolumesModifications\",\n\t\t\t\t\"ec2:DetachVolume\",\n\t\t\t\t\"ec2:ModifyVolume\"\n\t\t\t],\n\t\t\t\"Resource\":
\"*\"\n\t\t}\n\t]\n}"
type: string
Expand Down Expand Up @@ -885,7 +873,6 @@ spec:
FailureMessage will be set in the event that there is a terminal problem
reconciling the state and will be set to a descriptive error message.
This field should not be set for transitive errors that a controller
faces that are expected to be fixed automatically over
time (like service outages), but instead indicate that something is
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: awsclustercontrolleridentities.infrastructure.cluster.x-k8s.io
spec:
group: infrastructure.cluster.x-k8s.io
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.16.5
name: awsclusterroleidentities.infrastructure.cluster.x-k8s.io
spec:
group: infrastructure.cluster.x-k8s.io
Expand Down
Loading

0 comments on commit 4a19734

Please sign in to comment.