|
1 | | - |
2 | 1 | --- |
3 | 2 | apiVersion: apiextensions.k8s.io/v1 |
4 | 3 | kind: CustomResourceDefinition |
5 | 4 | metadata: |
6 | 5 | annotations: |
7 | | - controller-gen.kubebuilder.io/version: v0.5.0 |
8 | | - creationTimestamp: null |
| 6 | + controller-gen.kubebuilder.io/version: v0.13.0 |
9 | 7 | name: clusters.kops.k8s.io |
10 | 8 | spec: |
11 | 9 | group: kops.k8s.io |
@@ -921,6 +919,10 @@ spec: |
921 | 919 | description: State directory for execution state files (default |
922 | 920 | "/run/containerd"). |
923 | 921 | type: string |
| 922 | + testHandlerEnabled: |
| 923 | + description: TestHandlerEnabled enables a runtime called test-handler, |
| 924 | + specific to k/k e2e tests |
| 925 | + type: boolean |
924 | 926 | version: |
925 | 927 | description: Version used to pick the containerd package. |
926 | 928 | type: string |
@@ -1513,9 +1515,9 @@ spec: |
1513 | 1515 | masters so that they are not on the pod network. true is the kube-up |
1514 | 1516 | behaviour, but it is very surprising: it means that daemonsets only |
1515 | 1517 | work on the master if they have hostNetwork=true. false is now the |
1516 | | - default, and it will: * give the master a normal PodCIDR * run |
1517 | | - kube-proxy on the master * enable debugging handlers on the master, |
1518 | | - so kubectl logs works' |
| 1518 | + default, and it will: * give the master a normal PodCIDR * run kube-proxy |
| 1519 | + on the master * enable debugging handlers on the master, so kubectl |
| 1520 | + logs works' |
1519 | 1521 | type: boolean |
1520 | 1522 | karpenter: |
1521 | 1523 | description: Karpenter defines the Karpenter configuration. |
@@ -2494,6 +2496,7 @@ spec: |
2494 | 2496 | type: object |
2495 | 2497 | type: array |
2496 | 2498 | type: object |
| 2499 | + x-kubernetes-map-type: atomic |
2497 | 2500 | weight: |
2498 | 2501 | description: Weight associated with matching the |
2499 | 2502 | corresponding nodeSelectorTerm, in the range 1-100. |
@@ -2599,10 +2602,12 @@ spec: |
2599 | 2602 | type: object |
2600 | 2603 | type: array |
2601 | 2604 | type: object |
| 2605 | + x-kubernetes-map-type: atomic |
2602 | 2606 | type: array |
2603 | 2607 | required: |
2604 | 2608 | - nodeSelectorTerms |
2605 | 2609 | type: object |
| 2610 | + x-kubernetes-map-type: atomic |
2606 | 2611 | type: object |
2607 | 2612 | podAffinity: |
2608 | 2613 | description: Describes pod affinity scheduling rules (e.g. |
@@ -2683,6 +2688,7 @@ spec: |
2683 | 2688 | only "value". The requirements are ANDed. |
2684 | 2689 | type: object |
2685 | 2690 | type: object |
| 2691 | + x-kubernetes-map-type: atomic |
2686 | 2692 | namespaceSelector: |
2687 | 2693 | description: A label query over the set of namespaces |
2688 | 2694 | that the term applies to. The term is applied |
@@ -2740,6 +2746,7 @@ spec: |
2740 | 2746 | only "value". The requirements are ANDed. |
2741 | 2747 | type: object |
2742 | 2748 | type: object |
| 2749 | + x-kubernetes-map-type: atomic |
2743 | 2750 | namespaces: |
2744 | 2751 | description: namespaces specifies a static list |
2745 | 2752 | of namespace names that the term applies to. |
@@ -2844,6 +2851,7 @@ spec: |
2844 | 2851 | The requirements are ANDed. |
2845 | 2852 | type: object |
2846 | 2853 | type: object |
| 2854 | + x-kubernetes-map-type: atomic |
2847 | 2855 | namespaceSelector: |
2848 | 2856 | description: A label query over the set of namespaces |
2849 | 2857 | that the term applies to. The term is applied |
@@ -2900,6 +2908,7 @@ spec: |
2900 | 2908 | The requirements are ANDed. |
2901 | 2909 | type: object |
2902 | 2910 | type: object |
| 2911 | + x-kubernetes-map-type: atomic |
2903 | 2912 | namespaces: |
2904 | 2913 | description: namespaces specifies a static list |
2905 | 2914 | of namespace names that the term applies to. The |
@@ -3003,6 +3012,7 @@ spec: |
3003 | 3012 | only "value". The requirements are ANDed. |
3004 | 3013 | type: object |
3005 | 3014 | type: object |
| 3015 | + x-kubernetes-map-type: atomic |
3006 | 3016 | namespaceSelector: |
3007 | 3017 | description: A label query over the set of namespaces |
3008 | 3018 | that the term applies to. The term is applied |
@@ -3060,6 +3070,7 @@ spec: |
3060 | 3070 | only "value". The requirements are ANDed. |
3061 | 3071 | type: object |
3062 | 3072 | type: object |
| 3073 | + x-kubernetes-map-type: atomic |
3063 | 3074 | namespaces: |
3064 | 3075 | description: namespaces specifies a static list |
3065 | 3076 | of namespace names that the term applies to. |
@@ -3164,6 +3175,7 @@ spec: |
3164 | 3175 | The requirements are ANDed. |
3165 | 3176 | type: object |
3166 | 3177 | type: object |
| 3178 | + x-kubernetes-map-type: atomic |
3167 | 3179 | namespaceSelector: |
3168 | 3180 | description: A label query over the set of namespaces |
3169 | 3181 | that the term applies to. The term is applied |
@@ -3220,6 +3232,7 @@ spec: |
3220 | 3232 | The requirements are ANDed. |
3221 | 3233 | type: object |
3222 | 3234 | type: object |
| 3235 | + x-kubernetes-map-type: atomic |
3223 | 3236 | namespaces: |
3224 | 3237 | description: namespaces specifies a static list |
3225 | 3238 | of namespace names that the term applies to. The |
@@ -3827,9 +3840,9 @@ spec: |
3827 | 3840 | description: 'How should the kubelet configure the container bridge |
3828 | 3841 | for hairpin packets. Setting this flag allows endpoints in a |
3829 | 3842 | Service to loadbalance back to themselves if they should try |
3830 | | - to access their own Service. Values: "promiscuous-bridge": |
3831 | | - make the container bridge promiscuous. "hairpin-veth": set |
3832 | | - the hairpin flag on container veth interfaces. "none": do |
| 3843 | + to access their own Service. Values: "promiscuous-bridge": make |
| 3844 | + the container bridge promiscuous. "hairpin-veth": set |
| 3845 | + the hairpin flag on container veth interfaces. "none": do |
3833 | 3846 | nothing. Setting --configure-cbr0 to false implies that to achieve |
3834 | 3847 | hairpin NAT one must set --hairpin-mode=veth-flag, because bridge |
3835 | 3848 | assumes the existence of a container bridge named cbr0.' |
@@ -4265,9 +4278,9 @@ spec: |
4265 | 4278 | description: 'How should the kubelet configure the container bridge |
4266 | 4279 | for hairpin packets. Setting this flag allows endpoints in a |
4267 | 4280 | Service to loadbalance back to themselves if they should try |
4268 | | - to access their own Service. Values: "promiscuous-bridge": |
4269 | | - make the container bridge promiscuous. "hairpin-veth": set |
4270 | | - the hairpin flag on container veth interfaces. "none": do |
| 4281 | + to access their own Service. Values: "promiscuous-bridge": make |
| 4282 | + the container bridge promiscuous. "hairpin-veth": set |
| 4283 | + the hairpin flag on container veth interfaces. "none": do |
4271 | 4284 | nothing. Setting --configure-cbr0 to false implies that to achieve |
4272 | 4285 | hairpin NAT one must set --hairpin-mode=veth-flag, because bridge |
4273 | 4286 | assumes the existence of a container bridge named cbr0.' |
@@ -5866,9 +5879,9 @@ spec: |
5866 | 5879 | type: object |
5867 | 5880 | updatePolicy: |
5868 | 5881 | description: 'UpdatePolicy determines the policy for applying upgrades |
5869 | | - automatically. Valid values: ''automatic'' (default): apply updates |
| 5882 | + automatically. Valid values: ''automatic'' (default): apply updates |
5870 | 5883 | automatically (apply OS security upgrades, avoiding rebooting when |
5871 | | - possible) ''external'': do not apply updates automatically; they |
| 5884 | + possible) ''external'': do not apply updates automatically; they |
5872 | 5885 | are applied manually or by an external system' |
5873 | 5886 | type: string |
5874 | 5887 | useHostCertificates: |
@@ -5903,9 +5916,3 @@ spec: |
5903 | 5916 | type: object |
5904 | 5917 | served: true |
5905 | 5918 | storage: true |
5906 | | -status: |
5907 | | - acceptedNames: |
5908 | | - kind: "" |
5909 | | - plural: "" |
5910 | | - conditions: [] |
5911 | | - storedVersions: [] |
|
0 commit comments