|
1 |
| - |
2 | 1 | ---
|
3 | 2 | apiVersion: apiextensions.k8s.io/v1
|
4 | 3 | kind: CustomResourceDefinition
|
5 | 4 | metadata:
|
6 | 5 | annotations:
|
7 |
| - controller-gen.kubebuilder.io/version: v0.5.0 |
8 |
| - creationTimestamp: null |
| 6 | + controller-gen.kubebuilder.io/version: v0.13.0 |
9 | 7 | name: clusters.kops.k8s.io
|
10 | 8 | spec:
|
11 | 9 | group: kops.k8s.io
|
@@ -921,6 +919,10 @@ spec:
|
921 | 919 | description: State directory for execution state files (default
|
922 | 920 | "/run/containerd").
|
923 | 921 | type: string
|
| 922 | + testHandlerEnabled: |
| 923 | + description: TestHandlerEnabled enables a runtime called test-handler, |
| 924 | + specific to k/k e2e tests |
| 925 | + type: boolean |
924 | 926 | version:
|
925 | 927 | description: Version used to pick the containerd package.
|
926 | 928 | type: string
|
@@ -1513,9 +1515,9 @@ spec:
|
1513 | 1515 | masters so that they are not on the pod network. true is the kube-up
|
1514 | 1516 | behaviour, but it is very surprising: it means that daemonsets only
|
1515 | 1517 | work on the master if they have hostNetwork=true. false is now the
|
1516 |
| - default, and it will: * give the master a normal PodCIDR * run |
1517 |
| - kube-proxy on the master * enable debugging handlers on the master, |
1518 |
| - so kubectl logs works' |
| 1518 | + default, and it will: * give the master a normal PodCIDR * run kube-proxy |
| 1519 | + on the master * enable debugging handlers on the master, so kubectl |
| 1520 | + logs works' |
1519 | 1521 | type: boolean
|
1520 | 1522 | karpenter:
|
1521 | 1523 | description: Karpenter defines the Karpenter configuration.
|
@@ -2494,6 +2496,7 @@ spec:
|
2494 | 2496 | type: object
|
2495 | 2497 | type: array
|
2496 | 2498 | type: object
|
| 2499 | + x-kubernetes-map-type: atomic |
2497 | 2500 | weight:
|
2498 | 2501 | description: Weight associated with matching the
|
2499 | 2502 | corresponding nodeSelectorTerm, in the range 1-100.
|
@@ -2599,10 +2602,12 @@ spec:
|
2599 | 2602 | type: object
|
2600 | 2603 | type: array
|
2601 | 2604 | type: object
|
| 2605 | + x-kubernetes-map-type: atomic |
2602 | 2606 | type: array
|
2603 | 2607 | required:
|
2604 | 2608 | - nodeSelectorTerms
|
2605 | 2609 | type: object
|
| 2610 | + x-kubernetes-map-type: atomic |
2606 | 2611 | type: object
|
2607 | 2612 | podAffinity:
|
2608 | 2613 | description: Describes pod affinity scheduling rules (e.g.
|
@@ -2683,6 +2688,7 @@ spec:
|
2683 | 2688 | only "value". The requirements are ANDed.
|
2684 | 2689 | type: object
|
2685 | 2690 | type: object
|
| 2691 | + x-kubernetes-map-type: atomic |
2686 | 2692 | namespaceSelector:
|
2687 | 2693 | description: A label query over the set of namespaces
|
2688 | 2694 | that the term applies to. The term is applied
|
@@ -2740,6 +2746,7 @@ spec:
|
2740 | 2746 | only "value". The requirements are ANDed.
|
2741 | 2747 | type: object
|
2742 | 2748 | type: object
|
| 2749 | + x-kubernetes-map-type: atomic |
2743 | 2750 | namespaces:
|
2744 | 2751 | description: namespaces specifies a static list
|
2745 | 2752 | of namespace names that the term applies to.
|
@@ -2844,6 +2851,7 @@ spec:
|
2844 | 2851 | The requirements are ANDed.
|
2845 | 2852 | type: object
|
2846 | 2853 | type: object
|
| 2854 | + x-kubernetes-map-type: atomic |
2847 | 2855 | namespaceSelector:
|
2848 | 2856 | description: A label query over the set of namespaces
|
2849 | 2857 | that the term applies to. The term is applied
|
@@ -2900,6 +2908,7 @@ spec:
|
2900 | 2908 | The requirements are ANDed.
|
2901 | 2909 | type: object
|
2902 | 2910 | type: object
|
| 2911 | + x-kubernetes-map-type: atomic |
2903 | 2912 | namespaces:
|
2904 | 2913 | description: namespaces specifies a static list
|
2905 | 2914 | of namespace names that the term applies to. The
|
@@ -3003,6 +3012,7 @@ spec:
|
3003 | 3012 | only "value". The requirements are ANDed.
|
3004 | 3013 | type: object
|
3005 | 3014 | type: object
|
| 3015 | + x-kubernetes-map-type: atomic |
3006 | 3016 | namespaceSelector:
|
3007 | 3017 | description: A label query over the set of namespaces
|
3008 | 3018 | that the term applies to. The term is applied
|
@@ -3060,6 +3070,7 @@ spec:
|
3060 | 3070 | only "value". The requirements are ANDed.
|
3061 | 3071 | type: object
|
3062 | 3072 | type: object
|
| 3073 | + x-kubernetes-map-type: atomic |
3063 | 3074 | namespaces:
|
3064 | 3075 | description: namespaces specifies a static list
|
3065 | 3076 | of namespace names that the term applies to.
|
@@ -3164,6 +3175,7 @@ spec:
|
3164 | 3175 | The requirements are ANDed.
|
3165 | 3176 | type: object
|
3166 | 3177 | type: object
|
| 3178 | + x-kubernetes-map-type: atomic |
3167 | 3179 | namespaceSelector:
|
3168 | 3180 | description: A label query over the set of namespaces
|
3169 | 3181 | that the term applies to. The term is applied
|
@@ -3220,6 +3232,7 @@ spec:
|
3220 | 3232 | The requirements are ANDed.
|
3221 | 3233 | type: object
|
3222 | 3234 | type: object
|
| 3235 | + x-kubernetes-map-type: atomic |
3223 | 3236 | namespaces:
|
3224 | 3237 | description: namespaces specifies a static list
|
3225 | 3238 | of namespace names that the term applies to. The
|
@@ -3827,9 +3840,9 @@ spec:
|
3827 | 3840 | description: 'How should the kubelet configure the container bridge
|
3828 | 3841 | for hairpin packets. Setting this flag allows endpoints in a
|
3829 | 3842 | Service to loadbalance back to themselves if they should try
|
3830 |
| - to access their own Service. Values: "promiscuous-bridge": |
3831 |
| - make the container bridge promiscuous. "hairpin-veth": set |
3832 |
| - the hairpin flag on container veth interfaces. "none": do |
| 3843 | + to access their own Service. Values: "promiscuous-bridge": make |
| 3844 | + the container bridge promiscuous. "hairpin-veth": set |
| 3845 | + the hairpin flag on container veth interfaces. "none": do |
3833 | 3846 | nothing. Setting --configure-cbr0 to false implies that to achieve
|
3834 | 3847 | hairpin NAT one must set --hairpin-mode=veth-flag, because bridge
|
3835 | 3848 | assumes the existence of a container bridge named cbr0.'
|
@@ -4265,9 +4278,9 @@ spec:
|
4265 | 4278 | description: 'How should the kubelet configure the container bridge
|
4266 | 4279 | for hairpin packets. Setting this flag allows endpoints in a
|
4267 | 4280 | Service to loadbalance back to themselves if they should try
|
4268 |
| - to access their own Service. Values: "promiscuous-bridge": |
4269 |
| - make the container bridge promiscuous. "hairpin-veth": set |
4270 |
| - the hairpin flag on container veth interfaces. "none": do |
| 4281 | + to access their own Service. Values: "promiscuous-bridge": make |
| 4282 | + the container bridge promiscuous. "hairpin-veth": set |
| 4283 | + the hairpin flag on container veth interfaces. "none": do |
4271 | 4284 | nothing. Setting --configure-cbr0 to false implies that to achieve
|
4272 | 4285 | hairpin NAT one must set --hairpin-mode=veth-flag, because bridge
|
4273 | 4286 | assumes the existence of a container bridge named cbr0.'
|
@@ -5866,9 +5879,9 @@ spec:
|
5866 | 5879 | type: object
|
5867 | 5880 | updatePolicy:
|
5868 | 5881 | description: 'UpdatePolicy determines the policy for applying upgrades
|
5869 |
| - automatically. Valid values: ''automatic'' (default): apply updates |
| 5882 | + automatically. Valid values: ''automatic'' (default): apply updates |
5870 | 5883 | automatically (apply OS security upgrades, avoiding rebooting when
|
5871 |
| - possible) ''external'': do not apply updates automatically; they |
| 5884 | + possible) ''external'': do not apply updates automatically; they |
5872 | 5885 | are applied manually or by an external system'
|
5873 | 5886 | type: string
|
5874 | 5887 | useHostCertificates:
|
@@ -5903,9 +5916,3 @@ spec:
|
5903 | 5916 | type: object
|
5904 | 5917 | served: true
|
5905 | 5918 | storage: true
|
5906 |
| -status: |
5907 |
| - acceptedNames: |
5908 |
| - kind: "" |
5909 |
| - plural: "" |
5910 |
| - conditions: [] |
5911 |
| - storedVersions: [] |
|
0 commit comments