41
41
metadata :
42
42
type : object
43
43
spec :
44
- <<<<<<< HEAD
45
44
description : ROSARoleConfigSpec defines the desired state of ROSARoleConfig
46
45
properties :
47
46
accountRoleConfig :
@@ -77,31 +76,29 @@ spec:
77
76
version :
78
77
description : ' Version of OpenShift that will be used to setup
79
78
policy tag, for example "4.11"'
80
- =======
81
- properties :
82
- accountRoleConfig :
83
- properties :
84
- path :
85
- type : string
86
- permissionsBoundaryARN :
87
- type : string
88
- prefix :
89
- maxLength : 4
90
- type : string
91
- sharedVPCConfig :
92
- properties :
93
- routeRoleARN :
94
- type : string
95
- vpcEndpointRoleArn :
96
- type : string
97
- type : object
98
- version :
99
- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
100
79
type : string
101
80
required :
102
81
- prefix
103
82
- version
104
83
type : object
84
+ credentialsSecretRef :
85
+ description : |-
86
+ CredentialsSecretRef references a secret with necessary credentials to connect to the OCM API.
87
+ The secret should contain the following data keys:
88
+ - ocmToken: eyJhbGciOiJIUzI1NiIsI....
89
+ - ocmApiUrl: Optional, defaults to 'https://api.openshift.com'
90
+ properties :
91
+ name :
92
+ default : " "
93
+ description : |-
94
+ Name of the referent.
95
+ This field is effectively required, but due to backwards compatibility is
96
+ allowed to be empty. Instances of this type with an empty value here are
97
+ almost certainly wrong.
98
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
99
+ type : string
100
+ type : object
101
+ x-kubernetes-map-type : atomic
105
102
identityRef :
106
103
description : AWSIdentityReference specifies a identity.
107
104
properties :
@@ -121,7 +118,6 @@ spec:
121
118
- name
122
119
type : object
123
120
oidcConfig :
124
- <<<<<<< HEAD
125
121
description : |-
126
122
OIDCConfig creates OIDC config in a S3 bucket for the client AWS account and populates it to be compliant with OIDC protocol.
127
123
It also creates a Secret in Secrets Manager containing the private key.
@@ -132,10 +128,6 @@ spec:
132
128
Can only be set if "enableExternalAuthProviders" is set to "True".
133
129
134
130
At most one provider can be configured.
135
- =======
136
- properties :
137
- externalAuthProviders :
138
- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
139
131
items :
140
132
description : ExternalAuthProvider is an external OIDC identity
141
133
provider that can issue tokens for this cluster
@@ -369,34 +361,47 @@ spec:
369
361
- issuer
370
362
- name
371
363
type : object
372
- <<<<<<< HEAD
373
364
maxItems : 1
374
365
type : array
375
366
x-kubernetes-list-map-keys :
376
367
- name
377
368
x-kubernetes-list-type : map
369
+ identityRef :
370
+ description : AWSIdentityReference specifies a identity.
371
+ properties :
372
+ kind :
373
+ description : Kind of the identity.
374
+ enum :
375
+ - AWSClusterControllerIdentity
376
+ - AWSClusterRoleIdentity
377
+ - AWSClusterStaticIdentity
378
+ type : string
379
+ name :
380
+ description : Name of the identity.
381
+ minLength : 1
382
+ type : string
383
+ required :
384
+ - kind
385
+ - name
386
+ type : object
378
387
managedOIDC :
379
388
default : true
380
389
description : ManagedOIDC indicates whether it is a Red Hat managed
381
390
or unmanaged (Customer hosted) OIDC Configuration. Default is
382
391
true.
383
- =======
384
- type : array
385
- managedOIDC :
386
- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
387
392
type : boolean
393
+ prefix :
394
+ type : string
395
+ region :
396
+ type : string
388
397
required :
389
398
- managedOIDC
399
+ - prefix
390
400
type : object
391
401
operatorRoleConfig :
392
- <<<<<<< HEAD
393
402
description : OperatorRoleConfig defines cluster-specific operator
394
403
IAM roles based on your cluster configuration.
395
404
properties :
396
- oidcConfigId :
397
- description : Registered OIDC configuration ID to add its issuer
398
- URL as the trusted relationship to the operator roles.''
399
- type : string
400
405
permissionsBoundaryARN :
401
406
description : The ARN of the policy that is used to set the permissions
402
407
boundary for the operator roles.
@@ -418,25 +423,9 @@ spec:
418
423
description : ' Role ARN associated with the shared VPC used
419
424
for Hosted Control Plane clusters, this role contains policies
420
425
to be used with the VPC endpoint'
421
- =======
422
- properties :
423
- oidcConfigId :
424
- type : string
425
- permissionsBoundaryARN :
426
- type : string
427
- prefix :
428
- maxLength : 4
429
- type : string
430
- sharedVPCConfig :
431
- properties :
432
- routeRoleARN :
433
- type : string
434
- vpcEndpointRoleArn :
435
- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
436
426
type : string
437
427
type : object
438
428
required :
439
- - oidcConfigId
440
429
- prefix
441
430
type : object
442
431
region :
@@ -450,7 +439,6 @@ spec:
450
439
description : ROSARoleConfigStatus defines the observed state of ROSARoleConfig
451
440
properties :
452
441
accountRolesRef :
453
- <<<<<<< HEAD
454
442
description : Created Account roles that can be used to
455
443
properties :
456
444
installerRoleARN :
@@ -466,18 +454,6 @@ spec:
466
454
description : WorkerRoleARN is an AWS IAM role that will be attached
467
455
to worker instances.
468
456
type : string
469
- required :
470
- - installerRoleARN
471
- - supportRoleARN
472
- =======
473
- properties :
474
- installerRoleARN :
475
- type : string
476
- supportRoleARN :
477
- type : string
478
- workerRoleARN :
479
- type : string
480
- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
481
457
type : object
482
458
conditions :
483
459
description : Conditions provide observations of the operational state
@@ -526,7 +502,6 @@ spec:
526
502
type : object
527
503
type : array
528
504
oidcID :
529
- <<<<<<< HEAD
530
505
description : ID of created OIDC config
531
506
type : string
532
507
oidcProviderARN :
@@ -570,23 +545,10 @@ spec:
570
545
\" *\"\n\t\t },\n\t\t {\n\t\t\t\" Effect\" : \" Allow\" ,\n\t\t\t\" Action\" :
571
546
[\n\t\t\t\t\" route53:ChangeResourceRecordSets\"\n\t\t\t ],\n\t\t\t\" Resource\" :
572
547
[\n\t\t\t\t\" arn:aws:route53:::PUBLIC_ZONE_ID\" ,\n\t\t\t\t\" arn:aws:route53:::PRIVATE_ZONE_ID\"\n\t\t\t ]\n\t\t }\n\t ]\n }"
573
- =======
574
- type : string
575
- oidcProviderARN :
576
- type : string
577
- operatorRolesRef :
578
- properties :
579
- controlPlaneOperatorARN :
580
- type : string
581
- imageRegistryARN :
582
- type : string
583
- ingressARN :
584
- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
585
548
type : string
586
549
kmsProviderARN :
587
550
type : string
588
551
kubeCloudControllerARN :
589
- <<<<<<< HEAD
590
552
description : |-
591
553
KubeCloudControllerARN is an ARN value referencing a role appropriate for the KCM/KCC.
592
554
Source: https://cloud-provider-aws.sigs.k8s.io/prerequisites/#iam-policies
@@ -737,18 +699,6 @@ spec:
737
699
- nodePoolManagementARN
738
700
- storageARN
739
701
type : object
740
- required :
741
- - operatorRolesRef
742
- =======
743
- type : string
744
- networkARN :
745
- type : string
746
- nodePoolManagementARN :
747
- type : string
748
- storageARN :
749
- type : string
750
- type : object
751
- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
752
702
type : object
753
703
type : object
754
704
served : true
0 commit comments