Skip to content

Commit 2b6f47e

Browse files
committed
wip: stuff
Signed-off-by: Richard Case <[email protected]>
1 parent af25e3b commit 2b6f47e

File tree

4 files changed

+72
-67
lines changed

4 files changed

+72
-67
lines changed

bootstrap/eks/controllers/eksconfig_controller_reconciler_test.go

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -423,9 +423,8 @@ func newAMCP(name string) *ekscontrolplanev1.AWSManagedControlPlane {
423423
Namespace: "default",
424424
},
425425
Spec: ekscontrolplanev1.AWSManagedControlPlaneSpec{
426-
AWSManagedControlPlaneClassSpec: ekscontrolplanev1.AWSManagedControlPlaneClassSpec{
427-
EKSClusterName: generatedName,
428-
},
426+
EKSClusterName: generatedName,
427+
AWSManagedControlPlaneClassSpec: ekscontrolplanev1.AWSManagedControlPlaneClassSpec{},
429428
},
430429
}
431430
}

controlplane/eks/api/v1beta2/awsmanagedcontrolplane_types.go

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,12 @@ const (
3636
type AWSManagedControlPlaneSpec struct { //nolint: maligned
3737
AWSManagedControlPlaneClassSpec `json:",inline"`
3838

39+
// EKSClusterName allows you to specify the name of the EKS cluster in
40+
// AWS. If you don't specify a name then a default name will be created
41+
// based on the namespace and name of the managed control plane.
42+
// +optional
43+
EKSClusterName string `json:"eksClusterName,omitempty"`
44+
3945
// ControlPlaneEndpoint represents the endpoint used to communicate with the control plane.
4046
// +optional
4147
ControlPlaneEndpoint clusterv1.APIEndpoint `json:"controlPlaneEndpoint"`
@@ -142,6 +148,9 @@ type AWSManagedControlPlaneStatus struct {
142148
// associated identity provider
143149
// +optional
144150
IdentityProviderStatus IdentityProviderStatus `json:"identityProviderStatus,omitempty"`
151+
// Version defines the Kubernetes version for the control plane instance.
152+
// +optional
153+
Version string `json:"version"`
145154
}
146155

147156
// +kubebuilder:object:root=true

controlplane/eks/api/v1beta2/awsmanagedcontrolplane_webhook_test.go

Lines changed: 61 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -84,26 +84,26 @@ func TestDefaultingWebhook(t *testing.T) {
8484
resourceName: "cluster1",
8585
resourceNS: "default",
8686
expectHash: false,
87-
expectSpec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
88-
EKSClusterName: "default_cluster1", Bastion: defaultTestBastion, IdentityRef: defaultIdentityRef, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator,
87+
expectSpec: AWSManagedControlPlaneSpec{EKSClusterName: "default_cluster1", AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
88+
Bastion: defaultTestBastion, IdentityRef: defaultIdentityRef, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator,
8989
}},
9090
},
9191
{
9292
name: "less than 100 chars, dot in name",
9393
resourceName: "team1.cluster1",
9494
resourceNS: "default",
9595
expectHash: false,
96-
expectSpec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
97-
EKSClusterName: "default_team1_cluster1", Bastion: defaultTestBastion, IdentityRef: defaultIdentityRef, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator,
96+
expectSpec: AWSManagedControlPlaneSpec{EKSClusterName: "default_team1_cluster1", AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
97+
Bastion: defaultTestBastion, IdentityRef: defaultIdentityRef, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator,
9898
}},
9999
},
100100
{
101101
name: "more than 100 chars",
102102
resourceName: "abcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcdeabcde",
103103
resourceNS: "default",
104104
expectHash: true,
105-
expectSpec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
106-
EKSClusterName: "capi_", Bastion: defaultTestBastion, IdentityRef: defaultIdentityRef, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator,
105+
expectSpec: AWSManagedControlPlaneSpec{EKSClusterName: "capi_", AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
106+
Bastion: defaultTestBastion, IdentityRef: defaultIdentityRef, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator,
107107
}},
108108
},
109109
{
@@ -112,8 +112,8 @@ func TestDefaultingWebhook(t *testing.T) {
112112
resourceNS: "default",
113113
expectHash: false,
114114
spec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{Version: &vV1_17_1}},
115-
expectSpec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
116-
EKSClusterName: "default_cluster1", Bastion: defaultTestBastion, Version: &vV1_17_1, IdentityRef: defaultIdentityRef, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator,
115+
expectSpec: AWSManagedControlPlaneSpec{EKSClusterName: "default_cluster1", AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
116+
Bastion: defaultTestBastion, Version: &vV1_17_1, IdentityRef: defaultIdentityRef, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator,
117117
}},
118118
},
119119
{
@@ -122,22 +122,22 @@ func TestDefaultingWebhook(t *testing.T) {
122122
resourceNS: "default",
123123
expectHash: false,
124124
spec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{Bastion: infrav1.Bastion{AllowedCIDRBlocks: []string{"100.100.100.100/0"}}}},
125-
expectSpec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: "default_cluster1", IdentityRef: defaultIdentityRef, Bastion: infrav1.Bastion{AllowedCIDRBlocks: []string{"100.100.100.100/0"}}, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator}},
125+
expectSpec: AWSManagedControlPlaneSpec{EKSClusterName: "default_cluster1", AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{IdentityRef: defaultIdentityRef, Bastion: infrav1.Bastion{AllowedCIDRBlocks: []string{"100.100.100.100/0"}}, NetworkSpec: defaultNetworkSpec, TokenMethod: &EKSTokenMethodIAMAuthenticator}},
126126
},
127127
{
128128
name: "with CNI on network",
129129
resourceName: "cluster1",
130130
resourceNS: "default",
131131
expectHash: false,
132132
spec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{NetworkSpec: infrav1.NetworkSpec{CNI: &infrav1.CNISpec{}}}},
133-
expectSpec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: "default_cluster1", IdentityRef: defaultIdentityRef, Bastion: defaultTestBastion, NetworkSpec: infrav1.NetworkSpec{CNI: &infrav1.CNISpec{}, VPC: defaultVPCSpec}, TokenMethod: &EKSTokenMethodIAMAuthenticator}},
133+
expectSpec: AWSManagedControlPlaneSpec{EKSClusterName: "default_cluster1", AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{IdentityRef: defaultIdentityRef, Bastion: defaultTestBastion, NetworkSpec: infrav1.NetworkSpec{CNI: &infrav1.CNISpec{}, VPC: defaultVPCSpec}, TokenMethod: &EKSTokenMethodIAMAuthenticator}},
134134
},
135135
{
136136
name: "secondary CIDR",
137137
resourceName: "cluster1",
138138
resourceNS: "default",
139139
expectHash: false,
140-
expectSpec: AWSManagedControlPlaneSpec{AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: "default_cluster1", IdentityRef: defaultIdentityRef, Bastion: defaultTestBastion, NetworkSpec: defaultNetworkSpec, SecondaryCidrBlock: nil, TokenMethod: &EKSTokenMethodIAMAuthenticator}},
140+
expectSpec: AWSManagedControlPlaneSpec{EKSClusterName: "default_cluster1", AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{IdentityRef: defaultIdentityRef, Bastion: defaultTestBastion, NetworkSpec: defaultNetworkSpec, SecondaryCidrBlock: nil, TokenMethod: &EKSTokenMethodIAMAuthenticator}},
141141
},
142142
}
143143

@@ -331,8 +331,8 @@ func TestWebhookCreate(t *testing.T) {
331331
Namespace: "default",
332332
},
333333
Spec: AWSManagedControlPlaneSpec{
334+
EKSClusterName: tc.eksClusterName,
334335
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
335-
EKSClusterName: tc.eksClusterName,
336336
KubeProxy: tc.kubeProxy,
337337
AdditionalTags: tc.additionalTags,
338338
VpcCni: tc.vpcCNI,
@@ -493,11 +493,11 @@ func TestWebhookCreateIPv6Details(t *testing.T) {
493493
Namespace: "default",
494494
},
495495
Spec: AWSManagedControlPlaneSpec{
496+
EKSClusterName: "test-cluster",
496497
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
497-
EKSClusterName: "test-cluster",
498-
Addons: tc.addons,
499-
NetworkSpec: tc.networkSpec,
500-
Version: aws.String(tc.kubeVersion),
498+
Addons: tc.addons,
499+
NetworkSpec: tc.networkSpec,
500+
Version: aws.String(tc.kubeVersion),
501501
},
502502
},
503503
}
@@ -526,109 +526,113 @@ func TestWebhookUpdate(t *testing.T) {
526526
{
527527
name: "ekscluster specified, same cluster names",
528528
oldClusterSpec: AWSManagedControlPlaneSpec{
529-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: "default_cluster1"},
529+
EKSClusterName: "default_cluster1",
530+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
530531
},
531532
newClusterSpec: AWSManagedControlPlaneSpec{
532-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: "default_cluster1"},
533+
EKSClusterName: "default_cluster1",
534+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
533535
},
534536
expectError: false,
535537
},
536538
{
537539
name: "ekscluster specified, different cluster names",
538540
oldClusterSpec: AWSManagedControlPlaneSpec{
539-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: "default_cluster1"},
541+
EKSClusterName: "default_cluster1",
542+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
540543
},
541544
newClusterSpec: AWSManagedControlPlaneSpec{
542-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: "default_cluster2"},
545+
EKSClusterName: "default_cluster2",
546+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
543547
},
544548
expectError: true,
545549
},
546550
{
547551
name: "old ekscluster specified, no new cluster name",
548552
oldClusterSpec: AWSManagedControlPlaneSpec{
549-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: "default_cluster1"},
553+
EKSClusterName: "default_cluster1",
554+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
550555
},
551556
newClusterSpec: AWSManagedControlPlaneSpec{
552-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{EKSClusterName: ""},
557+
EKSClusterName: "",
558+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
553559
},
554560
expectError: true,
555561
},
556562
{
557563
name: "older version",
558564
oldClusterSpec: AWSManagedControlPlaneSpec{
565+
EKSClusterName: "default_cluster1",
559566
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
560-
EKSClusterName: "default_cluster1",
561-
Version: &vV1_17,
567+
Version: &vV1_17,
562568
},
563569
},
564570
newClusterSpec: AWSManagedControlPlaneSpec{
571+
EKSClusterName: "default_cluster1",
565572
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
566-
EKSClusterName: "default_cluster1",
567-
Version: &vV1_16,
573+
Version: &vV1_16,
568574
},
569575
},
570576
expectError: true,
571577
},
572578
{
573579
name: "same version",
574580
oldClusterSpec: AWSManagedControlPlaneSpec{
581+
EKSClusterName: "default_cluster1",
575582
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
576-
EKSClusterName: "default_cluster1",
577-
Version: &vV1_17,
583+
Version: &vV1_17,
578584
},
579585
},
580586
newClusterSpec: AWSManagedControlPlaneSpec{
587+
EKSClusterName: "default_cluster1",
581588
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
582-
EKSClusterName: "default_cluster1",
583-
Version: &vV1_17,
589+
Version: &vV1_17,
584590
},
585591
},
586592
expectError: false,
587593
},
588594
{
589595
name: "newer version",
590596
oldClusterSpec: AWSManagedControlPlaneSpec{
597+
EKSClusterName: "default_cluster1",
591598
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
592-
EKSClusterName: "default_cluster1",
593-
Version: &vV1_16,
599+
Version: &vV1_16,
594600
},
595601
},
596602
newClusterSpec: AWSManagedControlPlaneSpec{
603+
EKSClusterName: "default_cluster1",
597604
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
598-
EKSClusterName: "default_cluster1",
599-
Version: &vV1_17,
605+
Version: &vV1_17,
600606
},
601607
},
602608
expectError: false,
603609
},
604610
{
605611
name: "change in encryption config to nil",
606612
oldClusterSpec: AWSManagedControlPlaneSpec{
613+
EKSClusterName: "default_cluster1",
607614
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
608-
EKSClusterName: "default_cluster1",
609615
EncryptionConfig: &EncryptionConfig{
610616
Provider: pointer.String("provider"),
611617
Resources: []*string{pointer.String("foo"), pointer.String("bar")},
612618
},
613619
},
614620
},
615621
newClusterSpec: AWSManagedControlPlaneSpec{
616-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
617-
EKSClusterName: "default_cluster1",
618-
},
622+
EKSClusterName: "default_cluster1",
623+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
619624
},
620625
expectError: true,
621626
},
622627
{
623628
name: "change in encryption config from nil to valid encryption-config",
624629
oldClusterSpec: AWSManagedControlPlaneSpec{
625-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
626-
EKSClusterName: "default_cluster1",
627-
},
630+
EKSClusterName: "default_cluster1",
631+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
628632
},
629633
newClusterSpec: AWSManagedControlPlaneSpec{
634+
EKSClusterName: "default_cluster1",
630635
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
631-
EKSClusterName: "default_cluster1",
632636
EncryptionConfig: &EncryptionConfig{
633637
Provider: pointer.String("provider"),
634638
Resources: []*string{pointer.String("foo"), pointer.String("bar")},
@@ -640,17 +644,17 @@ func TestWebhookUpdate(t *testing.T) {
640644
{
641645
name: "change in provider of encryption config",
642646
oldClusterSpec: AWSManagedControlPlaneSpec{
647+
EKSClusterName: "default_cluster1",
643648
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
644-
EKSClusterName: "default_cluster1",
645649
EncryptionConfig: &EncryptionConfig{
646650
Provider: pointer.String("provider"),
647651
Resources: []*string{pointer.String("foo"), pointer.String("bar")},
648652
},
649653
},
650654
},
651655
newClusterSpec: AWSManagedControlPlaneSpec{
656+
EKSClusterName: "default_cluster1",
652657
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
653-
EKSClusterName: "default_cluster1",
654658
EncryptionConfig: &EncryptionConfig{
655659
Provider: pointer.String("new-provider"),
656660
Resources: []*string{pointer.String("foo"), pointer.String("bar")},
@@ -662,16 +666,16 @@ func TestWebhookUpdate(t *testing.T) {
662666
{
663667
name: "no change in provider of encryption config",
664668
oldClusterSpec: AWSManagedControlPlaneSpec{
669+
EKSClusterName: "default_cluster1",
665670
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
666-
EKSClusterName: "default_cluster1",
667671
EncryptionConfig: &EncryptionConfig{
668672
Provider: pointer.String("provider"),
669673
},
670674
},
671675
},
672676
newClusterSpec: AWSManagedControlPlaneSpec{
677+
EKSClusterName: "default_cluster1",
673678
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
674-
EKSClusterName: "default_cluster1",
675679
EncryptionConfig: &EncryptionConfig{
676680
Provider: pointer.String("provider"),
677681
},
@@ -682,13 +686,12 @@ func TestWebhookUpdate(t *testing.T) {
682686
{
683687
name: "ekscluster specified, same name, invalid tags",
684688
oldClusterSpec: AWSManagedControlPlaneSpec{
685-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
686-
EKSClusterName: "default_cluster1",
687-
},
689+
EKSClusterName: "default_cluster1",
690+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
688691
},
689692
newClusterSpec: AWSManagedControlPlaneSpec{
693+
EKSClusterName: "default_cluster1",
690694
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
691-
EKSClusterName: "default_cluster1",
692695
AdditionalTags: infrav1.Tags{
693696
"key-1": "value-1",
694697
"": "value-2",
@@ -702,17 +705,17 @@ func TestWebhookUpdate(t *testing.T) {
702705
{
703706
name: "changing ipv6 enabled is not allowed after it has been set - false, true",
704707
oldClusterSpec: AWSManagedControlPlaneSpec{
708+
EKSClusterName: "default_cluster1",
705709
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
706-
EKSClusterName: "default_cluster1",
707710
NetworkSpec: infrav1.NetworkSpec{
708711
VPC: infrav1.VPCSpec{},
709712
},
710713
Version: pointer.String("1.22"),
711714
},
712715
},
713716
newClusterSpec: AWSManagedControlPlaneSpec{
717+
EKSClusterName: "default_cluster1",
714718
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
715-
EKSClusterName: "default_cluster1",
716719
NetworkSpec: infrav1.NetworkSpec{
717720
VPC: infrav1.VPCSpec{
718721
IPv6: &infrav1.IPv6{},
@@ -725,8 +728,8 @@ func TestWebhookUpdate(t *testing.T) {
725728
{
726729
name: "changing ipv6 enabled is not allowed after it has been set - true, false",
727730
oldClusterSpec: AWSManagedControlPlaneSpec{
731+
EKSClusterName: "default_cluster1",
728732
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
729-
EKSClusterName: "default_cluster1",
730733
NetworkSpec: infrav1.NetworkSpec{
731734
VPC: infrav1.VPCSpec{
732735
IPv6: &infrav1.IPv6{},
@@ -742,8 +745,8 @@ func TestWebhookUpdate(t *testing.T) {
742745
},
743746
},
744747
newClusterSpec: AWSManagedControlPlaneSpec{
748+
EKSClusterName: "default_cluster1",
745749
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
746-
EKSClusterName: "default_cluster1",
747750
NetworkSpec: infrav1.NetworkSpec{
748751
VPC: infrav1.VPCSpec{},
749752
},
@@ -827,9 +830,8 @@ func TestValidatingWebhookCreateSecondaryCidr(t *testing.T) {
827830

828831
mcp := &AWSManagedControlPlane{
829832
Spec: AWSManagedControlPlaneSpec{
830-
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
831-
EKSClusterName: "default_cluster1",
832-
},
833+
EKSClusterName: "default_cluster1",
834+
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{},
833835
},
834836
}
835837
if tc.cidrRange != "" {
@@ -897,16 +899,16 @@ func TestValidatingWebhookUpdateSecondaryCidr(t *testing.T) {
897899

898900
newMCP := &AWSManagedControlPlane{
899901
Spec: AWSManagedControlPlaneSpec{
902+
EKSClusterName: "default_cluster1",
900903
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
901-
EKSClusterName: "default_cluster1",
902904
SecondaryCidrBlock: aws.String(tc.cidrRange),
903905
},
904906
},
905907
}
906908
oldMCP := &AWSManagedControlPlane{
907909
Spec: AWSManagedControlPlaneSpec{
910+
EKSClusterName: "default_cluster1",
908911
AWSManagedControlPlaneClassSpec: AWSManagedControlPlaneClassSpec{
909-
EKSClusterName: "default_cluster1",
910912
SecondaryCidrBlock: nil,
911913
},
912914
},

0 commit comments

Comments
 (0)