41
41
metadata :
42
42
type : object
43
43
spec :
44
+ <<<<<<< HEAD
44
45
description : ROSARoleConfigSpec defines the desired state of ROSARoleConfig
45
46
properties :
46
47
accountRoleConfig :
76
77
version :
77
78
description : ' Version of OpenShift that will be used to setup
78
79
policy tag, for example "4.11"'
80
+ =======
81
+ properties :
82
+ accountRoleConfig :
83
+ properties :
84
+ path :
85
+ type : string
86
+ permissionsBoundaryARN :
87
+ type : string
88
+ prefix :
89
+ maxLength : 4
90
+ type : string
91
+ sharedVPCConfig :
92
+ properties :
93
+ routeRoleARN :
94
+ type : string
95
+ vpcEndpointRoleArn :
96
+ type : string
97
+ type : object
98
+ version :
99
+ >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
79
100
type : string
80
101
required :
81
102
- prefix
@@ -100,6 +121,7 @@ spec:
100
121
- name
101
122
type : object
102
123
oidcConfig :
124
+ <<<<<<< HEAD
103
125
description : |-
104
126
OIDCConfig creates OIDC config in a S3 bucket for the client AWS account and populates it to be compliant with OIDC protocol.
105
127
It also creates a Secret in Secrets Manager containing the private key.
@@ -110,6 +132,10 @@ spec:
110
132
Can only be set if "enableExternalAuthProviders" is set to "True".
111
133
112
134
At most one provider can be configured.
135
+ =======
136
+ properties :
137
+ externalAuthProviders :
138
+ >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
113
139
items :
114
140
description : ExternalAuthProvider is an external OIDC identity
115
141
provider that can issue tokens for this cluster
@@ -343,6 +369,7 @@ spec:
343
369
- issuer
344
370
- name
345
371
type : object
372
+ <<<<<<< HEAD
346
373
maxItems : 1
347
374
type : array
348
375
x-kubernetes-list-map-keys :
@@ -353,11 +380,16 @@ spec:
353
380
description : ManagedOIDC indicates whether it is a Red Hat managed
354
381
or unmanaged (Customer hosted) OIDC Configuration. Default is
355
382
true.
383
+ =======
384
+ type : array
385
+ managedOIDC :
386
+ >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
356
387
type : boolean
357
388
required :
358
389
- managedOIDC
359
390
type : object
360
391
operatorRoleConfig :
392
+ <<<<<<< HEAD
361
393
description : OperatorRoleConfig defines cluster-specific operator
362
394
IAM roles based on your cluster configuration.
363
395
properties :
@@ -386,6 +418,21 @@ spec:
386
418
description : ' Role ARN associated with the shared VPC used
387
419
for Hosted Control Plane clusters, this role contains policies
388
420
to be used with the VPC endpoint'
421
+ =======
422
+ properties :
423
+ oidcConfigId :
424
+ type : string
425
+ permissionsBoundaryARN :
426
+ type : string
427
+ prefix :
428
+ maxLength : 4
429
+ type : string
430
+ sharedVPCConfig :
431
+ properties :
432
+ routeRoleARN :
433
+ type : string
434
+ vpcEndpointRoleArn :
435
+ >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
389
436
type : string
390
437
type : object
391
438
required :
@@ -403,6 +450,7 @@ spec:
403
450
description : ROSARoleConfigStatus defines the observed state of ROSARoleConfig
404
451
properties :
405
452
accountRolesRef :
453
+ <<<<<<< HEAD
406
454
description : Created Account roles that can be used to
407
455
properties :
408
456
installerRoleARN :
@@ -421,6 +469,15 @@ spec:
421
469
required :
422
470
- installerRoleARN
423
471
- supportRoleARN
472
+ =======
473
+ properties :
474
+ installerRoleARN :
475
+ type : string
476
+ supportRoleARN :
477
+ type : string
478
+ workerRoleARN :
479
+ type : string
480
+ >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
424
481
type : object
425
482
conditions :
426
483
description : Conditions provide observations of the operational state
@@ -469,6 +526,7 @@ spec:
469
526
type : object
470
527
type : array
471
528
oidcID :
529
+ <<<<<<< HEAD
472
530
description : ID of created OIDC config
473
531
type : string
474
532
oidcProviderARN :
@@ -512,10 +570,23 @@ spec:
512
570
\" *\"\n\t\t },\n\t\t {\n\t\t\t\" Effect\" : \" Allow\" ,\n\t\t\t\" Action\" :
513
571
[\n\t\t\t\t\" route53:ChangeResourceRecordSets\"\n\t\t\t ],\n\t\t\t\" Resource\" :
514
572
[\n\t\t\t\t\" arn:aws:route53:::PUBLIC_ZONE_ID\" ,\n\t\t\t\t\" arn:aws:route53:::PRIVATE_ZONE_ID\"\n\t\t\t ]\n\t\t }\n\t ]\n }"
573
+ =======
574
+ type : string
575
+ oidcProviderARN :
576
+ type : string
577
+ operatorRolesRef :
578
+ properties :
579
+ controlPlaneOperatorARN :
580
+ type : string
581
+ imageRegistryARN :
582
+ type : string
583
+ ingressARN :
584
+ >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
515
585
type : string
516
586
kmsProviderARN :
517
587
type : string
518
588
kubeCloudControllerARN :
589
+ <<<<<<< HEAD
519
590
description : |-
520
591
KubeCloudControllerARN is an ARN value referencing a role appropriate for the KCM/KCC.
521
592
Source: https://cloud-provider-aws.sigs.k8s.io/prerequisites/#iam-policies
@@ -668,6 +739,16 @@ spec:
668
739
type : object
669
740
required :
670
741
- operatorRolesRef
742
+ =======
743
+ type : string
744
+ networkARN :
745
+ type : string
746
+ nodePoolManagementARN :
747
+ type : string
748
+ storageARN :
749
+ type : string
750
+ type : object
751
+ >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
671
752
type : object
672
753
type : object
673
754
served : true
0 commit comments