Skip to content

Commit 3d26d75

Browse files
committed
Add RosaRoleConfig API and CRD.
1 parent 5fbe128 commit 3d26d75

File tree

4 files changed

+143
-2
lines changed

4 files changed

+143
-2
lines changed

config/crd/bases/infrastructure.cluster.x-k8s.io_rosaroleconfigs.yaml

Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ spec:
4141
metadata:
4242
type: object
4343
spec:
44+
<<<<<<< HEAD
4445
description: ROSARoleConfigSpec defines the desired state of ROSARoleConfig
4546
properties:
4647
accountRoleConfig:
@@ -76,6 +77,26 @@ spec:
7677
version:
7778
description: ' Version of OpenShift that will be used to setup
7879
policy tag, for example "4.11"'
80+
=======
81+
properties:
82+
accountRoleConfig:
83+
properties:
84+
path:
85+
type: string
86+
permissionsBoundaryARN:
87+
type: string
88+
prefix:
89+
maxLength: 4
90+
type: string
91+
sharedVPCConfig:
92+
properties:
93+
routeRoleARN:
94+
type: string
95+
vpcEndpointRoleArn:
96+
type: string
97+
type: object
98+
version:
99+
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
79100
type: string
80101
required:
81102
- prefix
@@ -100,6 +121,7 @@ spec:
100121
- name
101122
type: object
102123
oidcConfig:
124+
<<<<<<< HEAD
103125
description: |-
104126
OIDCConfig creates OIDC config in a S3 bucket for the client AWS account and populates it to be compliant with OIDC protocol.
105127
It also creates a Secret in Secrets Manager containing the private key.
@@ -110,6 +132,10 @@ spec:
110132
Can only be set if "enableExternalAuthProviders" is set to "True".
111133
112134
At most one provider can be configured.
135+
=======
136+
properties:
137+
externalAuthProviders:
138+
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
113139
items:
114140
description: ExternalAuthProvider is an external OIDC identity
115141
provider that can issue tokens for this cluster
@@ -343,6 +369,7 @@ spec:
343369
- issuer
344370
- name
345371
type: object
372+
<<<<<<< HEAD
346373
maxItems: 1
347374
type: array
348375
x-kubernetes-list-map-keys:
@@ -353,11 +380,16 @@ spec:
353380
description: ManagedOIDC indicates whether it is a Red Hat managed
354381
or unmanaged (Customer hosted) OIDC Configuration. Default is
355382
true.
383+
=======
384+
type: array
385+
managedOIDC:
386+
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
356387
type: boolean
357388
required:
358389
- managedOIDC
359390
type: object
360391
operatorRoleConfig:
392+
<<<<<<< HEAD
361393
description: OperatorRoleConfig defines cluster-specific operator
362394
IAM roles based on your cluster configuration.
363395
properties:
@@ -386,6 +418,21 @@ spec:
386418
description: ' Role ARN associated with the shared VPC used
387419
for Hosted Control Plane clusters, this role contains policies
388420
to be used with the VPC endpoint'
421+
=======
422+
properties:
423+
oidcConfigId:
424+
type: string
425+
permissionsBoundaryARN:
426+
type: string
427+
prefix:
428+
maxLength: 4
429+
type: string
430+
sharedVPCConfig:
431+
properties:
432+
routeRoleARN:
433+
type: string
434+
vpcEndpointRoleArn:
435+
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
389436
type: string
390437
type: object
391438
required:
@@ -403,6 +450,7 @@ spec:
403450
description: ROSARoleConfigStatus defines the observed state of ROSARoleConfig
404451
properties:
405452
accountRolesRef:
453+
<<<<<<< HEAD
406454
description: Created Account roles that can be used to
407455
properties:
408456
installerRoleARN:
@@ -421,6 +469,15 @@ spec:
421469
required:
422470
- installerRoleARN
423471
- supportRoleARN
472+
=======
473+
properties:
474+
installerRoleARN:
475+
type: string
476+
supportRoleARN:
477+
type: string
478+
workerRoleARN:
479+
type: string
480+
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
424481
type: object
425482
conditions:
426483
description: Conditions provide observations of the operational state
@@ -469,6 +526,7 @@ spec:
469526
type: object
470527
type: array
471528
oidcID:
529+
<<<<<<< HEAD
472530
description: ID of created OIDC config
473531
type: string
474532
oidcProviderARN:
@@ -512,10 +570,23 @@ spec:
512570
\"*\"\n\t\t},\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\":
513571
[\n\t\t\t\t\"route53:ChangeResourceRecordSets\"\n\t\t\t],\n\t\t\t\"Resource\":
514572
[\n\t\t\t\t\"arn:aws:route53:::PUBLIC_ZONE_ID\",\n\t\t\t\t\"arn:aws:route53:::PRIVATE_ZONE_ID\"\n\t\t\t]\n\t\t}\n\t]\n}"
573+
=======
574+
type: string
575+
oidcProviderARN:
576+
type: string
577+
operatorRolesRef:
578+
properties:
579+
controlPlaneOperatorARN:
580+
type: string
581+
imageRegistryARN:
582+
type: string
583+
ingressARN:
584+
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
515585
type: string
516586
kmsProviderARN:
517587
type: string
518588
kubeCloudControllerARN:
589+
<<<<<<< HEAD
519590
description: |-
520591
KubeCloudControllerARN is an ARN value referencing a role appropriate for the KCM/KCC.
521592
Source: https://cloud-provider-aws.sigs.k8s.io/prerequisites/#iam-policies
@@ -668,6 +739,16 @@ spec:
668739
type: object
669740
required:
670741
- operatorRolesRef
742+
=======
743+
type: string
744+
networkARN:
745+
type: string
746+
nodePoolManagementARN:
747+
type: string
748+
storageARN:
749+
type: string
750+
type: object
751+
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
671752
type: object
672753
type: object
673754
served: true

controllers/suite_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ import (
2525
"k8s.io/client-go/kubernetes/scheme"
2626
ctrl "sigs.k8s.io/controller-runtime"
2727

28-
// +kubebuilder:scaffold:imports
2928
infrav1 "sigs.k8s.io/cluster-api-provider-aws/v2/api/v1beta2"
3029
"sigs.k8s.io/cluster-api-provider-aws/v2/test/helpers"
30+
// +kubebuilder:scaffold:imports
3131
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
3232
kubeadmv1beta1 "sigs.k8s.io/cluster-api/controlplane/kubeadm/api/v1beta1"
3333
)

exp/api/v1beta2/zz_generated.deepcopy.go

Lines changed: 60 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

main.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,6 @@ import (
4343
"sigs.k8s.io/controller-runtime/pkg/controller"
4444
"sigs.k8s.io/controller-runtime/pkg/webhook"
4545

46-
// +kubebuilder:scaffold:imports
4746
infrav1beta1 "sigs.k8s.io/cluster-api-provider-aws/v2/api/v1beta1"
4847
infrav1 "sigs.k8s.io/cluster-api-provider-aws/v2/api/v1beta2"
4948
eksbootstrapv1beta1 "sigs.k8s.io/cluster-api-provider-aws/v2/bootstrap/eks/api/v1beta1"
@@ -66,6 +65,7 @@ import (
6665
"sigs.k8s.io/cluster-api-provider-aws/v2/pkg/logger"
6766
"sigs.k8s.io/cluster-api-provider-aws/v2/pkg/record"
6867
"sigs.k8s.io/cluster-api-provider-aws/v2/version"
68+
// +kubebuilder:scaffold:imports
6969
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
7070
expclusterv1 "sigs.k8s.io/cluster-api/exp/api/v1beta1"
7171
"sigs.k8s.io/cluster-api/util/flags"

0 commit comments

Comments
 (0)