4141 metadata :
4242 type : object
4343 spec :
44- <<<<<<< HEAD
4544 description : ROSARoleConfigSpec defines the desired state of ROSARoleConfig
4645 properties :
4746 accountRoleConfig :
7776 version :
7877 description : ' Version of OpenShift that will be used to setup
7978 policy tag, for example "4.11"'
80- =======
81- properties :
82- accountRoleConfig :
83- properties :
84- path :
85- type : string
86- permissionsBoundaryARN :
87- type : string
88- prefix :
89- maxLength : 4
90- type : string
91- sharedVPCConfig :
92- properties :
93- routeRoleARN :
94- type : string
95- vpcEndpointRoleArn :
96- type : string
97- type : object
98- version :
99- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
10079 type : string
10180 required :
10281 - prefix
@@ -121,7 +100,6 @@ spec:
121100 - name
122101 type : object
123102 oidcConfig :
124- <<<<<<< HEAD
125103 description : |-
126104 OIDCConfig creates OIDC config in a S3 bucket for the client AWS account and populates it to be compliant with OIDC protocol.
127105 It also creates a Secret in Secrets Manager containing the private key.
@@ -132,10 +110,6 @@ spec:
132110 Can only be set if "enableExternalAuthProviders" is set to "True".
133111
134112 At most one provider can be configured.
135- =======
136- properties :
137- externalAuthProviders :
138- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
139113 items :
140114 description : ExternalAuthProvider is an external OIDC identity
141115 provider that can issue tokens for this cluster
@@ -369,27 +343,44 @@ spec:
369343 - issuer
370344 - name
371345 type : object
372- <<<<<<< HEAD
373346 maxItems : 1
374347 type : array
375348 x-kubernetes-list-map-keys :
376349 - name
377350 x-kubernetes-list-type : map
351+ identityRef :
352+ description : AWSIdentityReference specifies a identity.
353+ properties :
354+ kind :
355+ description : Kind of the identity.
356+ enum :
357+ - AWSClusterControllerIdentity
358+ - AWSClusterRoleIdentity
359+ - AWSClusterStaticIdentity
360+ type : string
361+ name :
362+ description : Name of the identity.
363+ minLength : 1
364+ type : string
365+ required :
366+ - kind
367+ - name
368+ type : object
378369 managedOIDC :
379370 default : true
380371 description : ManagedOIDC indicates whether it is a Red Hat managed
381372 or unmanaged (Customer hosted) OIDC Configuration. Default is
382373 true.
383- =======
384- type : array
385- managedOIDC :
386- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
387374 type : boolean
375+ prefix :
376+ type : string
377+ region :
378+ type : string
388379 required :
389380 - managedOIDC
381+ - prefix
390382 type : object
391383 operatorRoleConfig :
392- <<<<<<< HEAD
393384 description : OperatorRoleConfig defines cluster-specific operator
394385 IAM roles based on your cluster configuration.
395386 properties :
@@ -418,21 +409,6 @@ spec:
418409 description : ' Role ARN associated with the shared VPC used
419410 for Hosted Control Plane clusters, this role contains policies
420411 to be used with the VPC endpoint'
421- =======
422- properties :
423- oidcConfigId :
424- type : string
425- permissionsBoundaryARN :
426- type : string
427- prefix :
428- maxLength : 4
429- type : string
430- sharedVPCConfig :
431- properties :
432- routeRoleARN :
433- type : string
434- vpcEndpointRoleArn :
435- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
436412 type : string
437413 type : object
438414 required :
@@ -450,7 +426,6 @@ spec:
450426 description : ROSARoleConfigStatus defines the observed state of ROSARoleConfig
451427 properties :
452428 accountRolesRef :
453- <<<<<<< HEAD
454429 description : Created Account roles that can be used to
455430 properties :
456431 installerRoleARN :
@@ -469,15 +444,6 @@ spec:
469444 required :
470445 - installerRoleARN
471446 - supportRoleARN
472- =======
473- properties :
474- installerRoleARN :
475- type : string
476- supportRoleARN :
477- type : string
478- workerRoleARN :
479- type : string
480- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
481447 type : object
482448 conditions :
483449 description : Conditions provide observations of the operational state
@@ -526,7 +492,6 @@ spec:
526492 type : object
527493 type : array
528494 oidcID :
529- <<<<<<< HEAD
530495 description : ID of created OIDC config
531496 type : string
532497 oidcProviderARN :
@@ -570,23 +535,10 @@ spec:
570535 \" *\"\n\t\t },\n\t\t {\n\t\t\t\" Effect\" : \" Allow\" ,\n\t\t\t\" Action\" :
571536 [\n\t\t\t\t\" route53:ChangeResourceRecordSets\"\n\t\t\t ],\n\t\t\t\" Resource\" :
572537 [\n\t\t\t\t\" arn:aws:route53:::PUBLIC_ZONE_ID\" ,\n\t\t\t\t\" arn:aws:route53:::PRIVATE_ZONE_ID\"\n\t\t\t ]\n\t\t }\n\t ]\n }"
573- =======
574- type : string
575- oidcProviderARN :
576- type : string
577- operatorRolesRef :
578- properties :
579- controlPlaneOperatorARN :
580- type : string
581- imageRegistryARN :
582- type : string
583- ingressARN :
584- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
585538 type : string
586539 kmsProviderARN :
587540 type : string
588541 kubeCloudControllerARN :
589- <<<<<<< HEAD
590542 description : |-
591543 KubeCloudControllerARN is an ARN value referencing a role appropriate for the KCM/KCC.
592544 Source: https://cloud-provider-aws.sigs.k8s.io/prerequisites/#iam-policies
@@ -739,16 +691,6 @@ spec:
739691 type : object
740692 required :
741693 - operatorRolesRef
742- =======
743- type : string
744- networkARN :
745- type : string
746- nodePoolManagementARN :
747- type : string
748- storageARN :
749- type : string
750- type : object
751- >>>>>>> 7c770d9ae (Add RosaRoleConfig API and CRD.)
752694 type : object
753695 type : object
754696 served : true
0 commit comments