Skip to content

Commit 6056618

Browse files
committed
tmp cmt
1 parent 3d26d75 commit 6056618

File tree

16 files changed

+19411
-156
lines changed

16 files changed

+19411
-156
lines changed

Dockerfile

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,17 @@ WORKDIR /workspace
2828
# Copy the Go Modules manifests
2929
COPY go.mod go.mod
3030
COPY go.sum go.sum
31+
COPY ./rosa /workspace/rosa
32+
33+
3134
# Cache deps before building and copying source so that we don't need to re-download as much
3235
# and so that source changes don't invalidate our downloaded layer
3336
RUN --mount=type=cache,target=/root/.local/share/golang \
3437
--mount=type=cache,target=/go/pkg/mod \
3538
go mod download
3639

40+
# RUN go mod download
41+
3742
# Copy the sources
3843
COPY ./ ./
3944

PROJECT

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
version: "2"
21
domain: cluster.x-k8s.io
32
repo: sigs.k8s.io/cluster-api-provider-aws
3+
version: "2"
44
resources:
55
- group: infrastructure
66
kind: AWSMachine

clusterctl

85.7 MB
Binary file not shown.

config/crd/bases/infrastructure.cluster.x-k8s.io_rosaroleconfigs.yaml

Lines changed: 23 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,6 @@ spec:
4141
metadata:
4242
type: object
4343
spec:
44-
<<<<<<< HEAD
4544
description: ROSARoleConfigSpec defines the desired state of ROSARoleConfig
4645
properties:
4746
accountRoleConfig:
@@ -77,26 +76,6 @@ spec:
7776
version:
7877
description: ' Version of OpenShift that will be used to setup
7978
policy tag, for example "4.11"'
80-
=======
81-
properties:
82-
accountRoleConfig:
83-
properties:
84-
path:
85-
type: string
86-
permissionsBoundaryARN:
87-
type: string
88-
prefix:
89-
maxLength: 4
90-
type: string
91-
sharedVPCConfig:
92-
properties:
93-
routeRoleARN:
94-
type: string
95-
vpcEndpointRoleArn:
96-
type: string
97-
type: object
98-
version:
99-
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
10079
type: string
10180
required:
10281
- prefix
@@ -121,7 +100,6 @@ spec:
121100
- name
122101
type: object
123102
oidcConfig:
124-
<<<<<<< HEAD
125103
description: |-
126104
OIDCConfig creates OIDC config in a S3 bucket for the client AWS account and populates it to be compliant with OIDC protocol.
127105
It also creates a Secret in Secrets Manager containing the private key.
@@ -132,10 +110,6 @@ spec:
132110
Can only be set if "enableExternalAuthProviders" is set to "True".
133111
134112
At most one provider can be configured.
135-
=======
136-
properties:
137-
externalAuthProviders:
138-
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
139113
items:
140114
description: ExternalAuthProvider is an external OIDC identity
141115
provider that can issue tokens for this cluster
@@ -369,27 +343,44 @@ spec:
369343
- issuer
370344
- name
371345
type: object
372-
<<<<<<< HEAD
373346
maxItems: 1
374347
type: array
375348
x-kubernetes-list-map-keys:
376349
- name
377350
x-kubernetes-list-type: map
351+
identityRef:
352+
description: AWSIdentityReference specifies a identity.
353+
properties:
354+
kind:
355+
description: Kind of the identity.
356+
enum:
357+
- AWSClusterControllerIdentity
358+
- AWSClusterRoleIdentity
359+
- AWSClusterStaticIdentity
360+
type: string
361+
name:
362+
description: Name of the identity.
363+
minLength: 1
364+
type: string
365+
required:
366+
- kind
367+
- name
368+
type: object
378369
managedOIDC:
379370
default: true
380371
description: ManagedOIDC indicates whether it is a Red Hat managed
381372
or unmanaged (Customer hosted) OIDC Configuration. Default is
382373
true.
383-
=======
384-
type: array
385-
managedOIDC:
386-
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
387374
type: boolean
375+
prefix:
376+
type: string
377+
region:
378+
type: string
388379
required:
389380
- managedOIDC
381+
- prefix
390382
type: object
391383
operatorRoleConfig:
392-
<<<<<<< HEAD
393384
description: OperatorRoleConfig defines cluster-specific operator
394385
IAM roles based on your cluster configuration.
395386
properties:
@@ -418,21 +409,6 @@ spec:
418409
description: ' Role ARN associated with the shared VPC used
419410
for Hosted Control Plane clusters, this role contains policies
420411
to be used with the VPC endpoint'
421-
=======
422-
properties:
423-
oidcConfigId:
424-
type: string
425-
permissionsBoundaryARN:
426-
type: string
427-
prefix:
428-
maxLength: 4
429-
type: string
430-
sharedVPCConfig:
431-
properties:
432-
routeRoleARN:
433-
type: string
434-
vpcEndpointRoleArn:
435-
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
436412
type: string
437413
type: object
438414
required:
@@ -450,7 +426,6 @@ spec:
450426
description: ROSARoleConfigStatus defines the observed state of ROSARoleConfig
451427
properties:
452428
accountRolesRef:
453-
<<<<<<< HEAD
454429
description: Created Account roles that can be used to
455430
properties:
456431
installerRoleARN:
@@ -469,15 +444,6 @@ spec:
469444
required:
470445
- installerRoleARN
471446
- supportRoleARN
472-
=======
473-
properties:
474-
installerRoleARN:
475-
type: string
476-
supportRoleARN:
477-
type: string
478-
workerRoleARN:
479-
type: string
480-
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
481447
type: object
482448
conditions:
483449
description: Conditions provide observations of the operational state
@@ -526,7 +492,6 @@ spec:
526492
type: object
527493
type: array
528494
oidcID:
529-
<<<<<<< HEAD
530495
description: ID of created OIDC config
531496
type: string
532497
oidcProviderARN:
@@ -570,23 +535,10 @@ spec:
570535
\"*\"\n\t\t},\n\t\t{\n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Action\":
571536
[\n\t\t\t\t\"route53:ChangeResourceRecordSets\"\n\t\t\t],\n\t\t\t\"Resource\":
572537
[\n\t\t\t\t\"arn:aws:route53:::PUBLIC_ZONE_ID\",\n\t\t\t\t\"arn:aws:route53:::PRIVATE_ZONE_ID\"\n\t\t\t]\n\t\t}\n\t]\n}"
573-
=======
574-
type: string
575-
oidcProviderARN:
576-
type: string
577-
operatorRolesRef:
578-
properties:
579-
controlPlaneOperatorARN:
580-
type: string
581-
imageRegistryARN:
582-
type: string
583-
ingressARN:
584-
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
585538
type: string
586539
kmsProviderARN:
587540
type: string
588541
kubeCloudControllerARN:
589-
<<<<<<< HEAD
590542
description: |-
591543
KubeCloudControllerARN is an ARN value referencing a role appropriate for the KCM/KCC.
592544
Source: https://cloud-provider-aws.sigs.k8s.io/prerequisites/#iam-policies
@@ -739,16 +691,6 @@ spec:
739691
type: object
740692
required:
741693
- operatorRolesRef
742-
=======
743-
type: string
744-
networkARN:
745-
type: string
746-
nodePoolManagementARN:
747-
type: string
748-
storageARN:
749-
type: string
750-
type: object
751-
>>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
752694
type: object
753695
type: object
754696
served: true

0 commit comments

Comments
 (0)