Skip to content

Commit af25e3b

Browse files
committed
wip: working changes
Signed-off-by: Richard Case <[email protected]>
1 parent 8ef3e34 commit af25e3b

File tree

4 files changed

+12
-77
lines changed

4 files changed

+12
-77
lines changed

config/crd/bases/controlplane.cluster.x-k8s.io_awsmanagedcontrolplanes.yaml

Lines changed: 7 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1707,14 +1707,11 @@ spec:
17071707
description: Bastion contains options to configure the bastion host.
17081708
properties:
17091709
allowedCIDRBlocks:
1710-
allOf:
1711-
- items:
1712-
type: string
1713-
- items:
1714-
type: string
17151710
description: AllowedCIDRBlocks is a list of CIDR blocks allowed
17161711
to access the bastion host. They are set as ingress rules for
17171712
the Bastion host's Security Group (defaults to 0.0.0.0/0).
1713+
items:
1714+
type: string
17181715
type: array
17191716
ami:
17201717
description: AMI will use the specified AMI to boot the bastion.
@@ -1785,13 +1782,10 @@ spec:
17851782
publicly accessible
17861783
type: boolean
17871784
publicCIDRs:
1788-
allOf:
1789-
- items:
1790-
type: string
1791-
- items:
1792-
type: string
17931785
description: PublicCIDRs specifies which blocks can access the
17941786
public endpoint
1787+
items:
1788+
type: string
17951789
type: array
17961790
type: object
17971791
iamAuthenticatorConfig:
@@ -2308,23 +2302,18 @@ spec:
23082302
description: The AWS Region the cluster lives in.
23092303
type: string
23102304
roleAdditionalPolicies:
2311-
allOf:
2312-
- items:
2313-
type: string
2314-
- items:
2315-
type: string
23162305
description: RoleAdditionalPolicies allows you to attach additional
23172306
polices to the control plane role. You must enable the EKSAllowAddRoles
23182307
feature flag to incorporate these into the created role.
2308+
items:
2309+
type: string
23192310
type: array
23202311
roleName:
2321-
allOf:
2322-
- minLength: 2
2323-
- minLength: 2
23242312
description: RoleName specifies the name of IAM role that gives EKS
23252313
permission to make API calls. If the role is pre-existing we will
23262314
treat it as unmanaged and not delete it on deletion. If the EKSEnableIAM
23272315
feature flag is true and no name is supplied then a role is created.
2316+
minLength: 2
23282317
type: string
23292318
secondaryCidrBlock:
23302319
description: SecondaryCidrBlock is the additional CIDR range to use

controlplane/eks/api/v1beta1/zz_generated.conversion.go

Lines changed: 5 additions & 14 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

controlplane/eks/api/v1beta2/awsmanagedcontrolplane_types.go

Lines changed: 0 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -36,38 +36,9 @@ const (
3636
type AWSManagedControlPlaneSpec struct { //nolint: maligned
3737
AWSManagedControlPlaneClassSpec `json:",inline"`
3838

39-
// EKSClusterName allows you to specify the name of the EKS cluster in
40-
// AWS. If you don't specify a name then a default name will be created
41-
// based on the namespace and name of the managed control plane.
42-
// +optional
43-
EKSClusterName string `json:"eksClusterName,omitempty"`
44-
45-
// RoleName specifies the name of IAM role that gives EKS
46-
// permission to make API calls. If the role is pre-existing
47-
// we will treat it as unmanaged and not delete it on
48-
// deletion. If the EKSEnableIAM feature flag is true
49-
// and no name is supplied then a role is created.
50-
// +kubebuilder:validation:MinLength:=2
51-
// +optional
52-
RoleName *string `json:"roleName,omitempty"`
53-
54-
// RoleAdditionalPolicies allows you to attach additional polices to
55-
// the control plane role. You must enable the EKSAllowAddRoles
56-
// feature flag to incorporate these into the created role.
57-
// +optional
58-
RoleAdditionalPolicies *[]string `json:"roleAdditionalPolicies,omitempty"`
59-
60-
// Endpoints specifies access to this cluster's control plane endpoints
61-
// +optional
62-
EndpointAccess EndpointAccess `json:"endpointAccess,omitempty"`
63-
6439
// ControlPlaneEndpoint represents the endpoint used to communicate with the control plane.
6540
// +optional
6641
ControlPlaneEndpoint clusterv1.APIEndpoint `json:"controlPlaneEndpoint"`
67-
68-
// Bastion contains options to configure the bastion host.
69-
// +optional
70-
Bastion infrav1.Bastion `json:"bastion"`
7142
}
7243

7344
// KubeProxy specifies how the kube-proxy daemonset is managed.

controlplane/eks/api/v1beta2/zz_generated.deepcopy.go

Lines changed: 0 additions & 16 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)