Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v1alpha3: fix miscellaneous capitalization #14689

Merged
merged 1 commit into from Nov 29, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
9 changes: 7 additions & 2 deletions docs/cluster_spec.md
Expand Up @@ -1599,14 +1599,19 @@ the removal of fields no longer in use.
| kubelet.clientCaFile | kubelet.clientCAFile |
| kubeProxy.ipvsExcludeCidrs | kubeProxy.ipvsExcludeCIDRs |
| kubernetesApiAccess | api.access |
| masterKubelet | controlPlaneKubelet |
| masterKubelet.authenticationTokenWebhookCacheTtl | controlPlaneKubelet.authenticationTokenWebhookCacheTTL |
| masterKubelet.clientCaFile | controlPlaneKubelet.clientCAFile |
| masterPublicName | api.publicName |
| networking.amazonvpc.imageName | networking.amazonvpc.image |
| networking.amazonvpc.initImageName | networking.amazonvpc.initImage |
| networking.amazonvpc | networking.amazonVPC |
| networking.amazonvpc.imageName | networking.amazonVPC.image |
| networking.amazonvpc.initImageName | networking.amazonVPC.initImage |
| networking.canal.disableFlannelForwardRules | networking.canal.flanneldIptablesForwardRules (value inverted) |
| networking.cilium.disableMasquerade | networking.cilium.masquerade (value inverted) |
| networking.cilium.IPTablesRulesNoinstall | networking.cilium.installIptablesRules (value inverted) |
| networking.cilium.toFqdnsDnsRejectResponseCode | networking.cilium.toFQDNsDNSRejectResponseCode |
| networking.cilium.toFqdnsEnablePoller | networking.cilium.toFQDNsEnablePoller |
| networking.kuberouter | networking.kubeRouter |
| project | cloudProvider.gce.project |
| topology.bastion.bastionPublicName | topology.bastion.publicName |
| topology.dns.type | topology.dns |
2 changes: 1 addition & 1 deletion nodeup/pkg/model/networking/kube_router.go
Expand Up @@ -34,7 +34,7 @@ var _ fi.ModelBuilder = &KuberouterBuilder{}
func (b *KuberouterBuilder) Build(c *fi.ModelBuilderContext) error {
networking := b.Cluster.Spec.Networking

if networking.Kuberouter == nil {
if networking.KubeRouter == nil {
return nil
}

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/kops/cluster.go
Expand Up @@ -822,7 +822,7 @@ func (c *Cluster) fillClusterSpecNetworkingSpec() {
// OK
} else if c.Spec.Networking.Canal != nil {
// OK
} else if c.Spec.Networking.Kuberouter != nil {
} else if c.Spec.Networking.KubeRouter != nil {
// OK
} else if c.Spec.Networking.AmazonVPC != nil {
// OK
Expand Down
4 changes: 2 additions & 2 deletions pkg/apis/kops/networking.go
Expand Up @@ -29,9 +29,9 @@ type NetworkingSpec struct {
Flannel *FlannelNetworkingSpec `json:"flannel,omitempty"`
Calico *CalicoNetworkingSpec `json:"calico,omitempty"`
Canal *CanalNetworkingSpec `json:"canal,omitempty"`
Kuberouter *KuberouterNetworkingSpec `json:"kuberouter,omitempty"`
KubeRouter *KuberouterNetworkingSpec `json:"kubeRouter,omitempty"`
Romana *RomanaNetworkingSpec `json:"romana,omitempty"`
AmazonVPC *AmazonVPCNetworkingSpec `json:"amazonvpc,omitempty"`
AmazonVPC *AmazonVPCNetworkingSpec `json:"amazonVPC,omitempty"`
Cilium *CiliumNetworkingSpec `json:"cilium,omitempty"`
LyftVPC *LyftVPCNetworkingSpec `json:"lyftvpc,omitempty"`
GCE *GCENetworkingSpec `json:"gce,omitempty"`
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/kops/v1alpha2/networking.go
Expand Up @@ -29,7 +29,7 @@ type NetworkingSpec struct {
Flannel *FlannelNetworkingSpec `json:"flannel,omitempty"`
Calico *CalicoNetworkingSpec `json:"calico,omitempty"`
Canal *CanalNetworkingSpec `json:"canal,omitempty"`
Kuberouter *KuberouterNetworkingSpec `json:"kuberouter,omitempty"`
KubeRouter *KuberouterNetworkingSpec `json:"kuberouter,omitempty"`
Romana *RomanaNetworkingSpec `json:"romana,omitempty"`
AmazonVPC *AmazonVPCNetworkingSpec `json:"amazonvpc,omitempty"`
Cilium *CiliumNetworkingSpec `json:"cilium,omitempty"`
Expand Down
12 changes: 6 additions & 6 deletions pkg/apis/kops/v1alpha2/zz_generated.conversion.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions pkg/apis/kops/v1alpha2/zz_generated.deepcopy.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions pkg/apis/kops/v1alpha3/networking.go
Expand Up @@ -33,9 +33,9 @@ type NetworkingSpec struct {
Flannel *FlannelNetworkingSpec `json:"flannel,omitempty"`
Calico *CalicoNetworkingSpec `json:"calico,omitempty"`
Canal *CanalNetworkingSpec `json:"canal,omitempty"`
Kuberouter *KuberouterNetworkingSpec `json:"kuberouter,omitempty"`
KubeRouter *KuberouterNetworkingSpec `json:"kubeRouter,omitempty"`
Romana *kops.RomanaNetworkingSpec `json:"-"`
AmazonVPC *AmazonVPCNetworkingSpec `json:"amazonvpc,omitempty"`
AmazonVPC *AmazonVPCNetworkingSpec `json:"amazonVPC,omitempty"`
Cilium *CiliumNetworkingSpec `json:"cilium,omitempty"`
LyftVPC *kops.LyftVPCNetworkingSpec `json:"-"`
GCE *GCENetworkingSpec `json:"gce,omitempty"`
Expand Down
12 changes: 6 additions & 6 deletions pkg/apis/kops/v1alpha3/zz_generated.conversion.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions pkg/apis/kops/v1alpha3/zz_generated.deepcopy.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

10 changes: 5 additions & 5 deletions pkg/apis/kops/validation/instancegroup.go
Expand Up @@ -84,7 +84,7 @@ func ValidateInstanceGroup(g *kops.InstanceGroup, cloud fi.Cloud, strict bool) f
}

if fi.ValueOf(g.Spec.RootVolumeIOPS) < 0 {
allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "rootVolumeIops"), g.Spec.RootVolumeIOPS, "RootVolumeIOPS must be greater than 0"))
allErrs = append(allErrs, field.Invalid(field.NewPath("spec", "rootVolumeIOPS"), g.Spec.RootVolumeIOPS, "RootVolumeIOPS must be greater than 0"))
}

if fi.ValueOf(g.Spec.RootVolumeThroughput) < 0 {
Expand Down Expand Up @@ -401,27 +401,27 @@ func validateExternalLoadBalancer(lb *kops.LoadBalancerSpec, fldPath *field.Path

parsed, err := arn.Parse(actual)
if err != nil {
allErrs = append(allErrs, field.Invalid(fldPath.Child("targetGroupArn"), actual,
allErrs = append(allErrs, field.Invalid(fldPath.Child("targetGroupARN"), actual,
fmt.Sprintf("Target Group ARN must be a valid AWS ARN: %v", err)))
return allErrs
}

resource := strings.Split(parsed.Resource, "/")
if len(resource) != 3 {
allErrs = append(allErrs, field.Invalid(fldPath.Child("targetGroupArn"), actual,
allErrs = append(allErrs, field.Invalid(fldPath.Child("targetGroupARN"), actual,
"Target Group ARN resource must be a valid AWS ARN resource such as \"targetgroup/tg-name/1234567890123456\""))
return allErrs
}

kind := resource[0]
if kind != "targetgroup" {
allErrs = append(allErrs, field.Invalid(fldPath.Child("targetGroupArn"), kind,
allErrs = append(allErrs, field.Invalid(fldPath.Child("targetGroupARN"), kind,
"Target Group ARN resource type must be \"targetgroup\""))
}

name := resource[1]
if len(name) > 32 {
allErrs = append(allErrs, field.Invalid(fldPath.Child("targetGroupArn"), name,
allErrs = append(allErrs, field.Invalid(fldPath.Child("targetGroupARN"), name,
"Target Group ARN resource name must have at most 32 characters"))
}
}
Expand Down
16 changes: 8 additions & 8 deletions pkg/apis/kops/validation/validation.go
Expand Up @@ -253,7 +253,7 @@ func validateClusterSpec(spec *kops.ClusterSpec, c *kops.Cluster, fieldPath *fie
allErrs = append(allErrs, field.Forbidden(lbPath, "sslCertificate requires network loadbalancer. See https://github.com/kubernetes/kops/blob/master/permalinks/acm_nlb.md"))
}
if lbSpec.Class == kops.LoadBalancerClassNetwork && lbSpec.UseForInternalAPI && lbSpec.Type == kops.LoadBalancerTypeInternal {
allErrs = append(allErrs, field.Forbidden(lbPath, "useForInternalApi cannot be used with internal NLB due lack of hairpinning support"))
allErrs = append(allErrs, field.Forbidden(lbPath, "useForInternalAPI cannot be used with internal NLB due lack of hairpinning support"))
}
}

Expand Down Expand Up @@ -678,7 +678,7 @@ func validateKubeProxy(k *kops.KubeProxyConfig, fldPath *field.Path) field.Error

for i, x := range k.IPVSExcludeCIDRs {
if _, _, err := net.ParseCIDR(x); err != nil {
allErrs = append(allErrs, field.Invalid(fldPath.Child("ipvsExcludeCidrs").Index(i), x, "Invalid network CIDR"))
allErrs = append(allErrs, field.Invalid(fldPath.Child("ipvsExcludeCIDRs").Index(i), x, "Invalid network CIDR"))
}
}

Expand Down Expand Up @@ -854,17 +854,17 @@ func validateNetworking(cluster *kops.Cluster, v *kops.NetworkingSpec, fldPath *
allErrs = append(allErrs, validateNetworkingCanal(cluster, v.Canal, fldPath.Child("canal"))...)
}

if v.Kuberouter != nil {
if v.KubeRouter != nil {
if optionTaken {
allErrs = append(allErrs, field.Forbidden(fldPath.Child("kuberouter"), "only one networking option permitted"))
allErrs = append(allErrs, field.Forbidden(fldPath.Child("kubeRouter"), "only one networking option permitted"))
}
if c.KubeProxy != nil && (c.KubeProxy.Enabled == nil || *c.KubeProxy.Enabled) {
allErrs = append(allErrs, field.Forbidden(fldPath.Root().Child("spec", "kubeProxy", "enabled"), "kube-router requires kubeProxy to be disabled"))
}
optionTaken = true

if cluster.Spec.IsIPv6Only() {
allErrs = append(allErrs, field.Forbidden(fldPath.Child("kuberouter"), "kube-router does not support IPv6"))
allErrs = append(allErrs, field.Forbidden(fldPath.Child("kuberRouter"), "kube-router does not support IPv6"))
}
}

Expand All @@ -874,16 +874,16 @@ func validateNetworking(cluster *kops.Cluster, v *kops.NetworkingSpec, fldPath *

if v.AmazonVPC != nil {
if optionTaken {
allErrs = append(allErrs, field.Forbidden(fldPath.Child("amazonvpc"), "only one networking option permitted"))
allErrs = append(allErrs, field.Forbidden(fldPath.Child("amazonVPC"), "only one networking option permitted"))
}
optionTaken = true

if c.GetCloudProvider() != kops.CloudProviderAWS {
allErrs = append(allErrs, field.Forbidden(fldPath.Child("amazonvpc"), "amazon-vpc-routed-eni networking is supported only in AWS"))
allErrs = append(allErrs, field.Forbidden(fldPath.Child("amazonVPC"), "amazon-vpc-routed-eni networking is supported only in AWS"))
}

if cluster.Spec.IsIPv6Only() {
allErrs = append(allErrs, field.Forbidden(fldPath.Child("amazonvpc"), "amazon-vpc-routed-eni networking does not support IPv6"))
allErrs = append(allErrs, field.Forbidden(fldPath.Child("amazonVPC"), "amazon-vpc-routed-eni networking does not support IPv6"))
}

}
Expand Down
4 changes: 2 additions & 2 deletions pkg/apis/kops/zz_generated.deepcopy.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion pkg/model/awsmodel/firewall.go
Expand Up @@ -144,7 +144,7 @@ func (b *FirewallModelBuilder) applyNodeToMasterBlockSpecificPorts(c *fi.ModelBu
protocols = append(protocols, ProtocolIPIP)
}

if b.Cluster.Spec.Networking.Kuberouter != nil {
if b.Cluster.Spec.Networking.KubeRouter != nil {
protocols = append(protocols, ProtocolIPIP)
}

Expand Down
2 changes: 1 addition & 1 deletion pkg/model/bootstrapscript.go
Expand Up @@ -270,7 +270,7 @@ func (b *BootstrapScriptBuilder) ResourceNodeUp(c *fi.ModelBuilderContext, ig *k
keypairs = append(keypairs, "apiserver-aggregator-ca", "service-account", "etcd-clients-ca")
} else if !model.UseKopsControllerForNodeBootstrap(b.Cluster) {
keypairs = append(keypairs, "kubelet", "kube-proxy")
if b.Cluster.Spec.Networking.Kuberouter != nil {
if b.Cluster.Spec.Networking.KubeRouter != nil {
keypairs = append(keypairs, "kube-router")
}
}
Expand Down
2 changes: 1 addition & 1 deletion pkg/model/iam/iam_builder.go
Expand Up @@ -719,7 +719,7 @@ func ReadableStatePaths(cluster *kops.Cluster, role Subject) ([]string, error) {

if networkingSpec != nil {
// @check if kuberoute is enabled and permit access to the private key
if networkingSpec.Kuberouter != nil {
if networkingSpec.KubeRouter != nil {
paths = append(paths, "/pki/private/kube-router/*")
}

Expand Down
2 changes: 1 addition & 1 deletion pkg/model/openstackmodel/firewall.go
Expand Up @@ -446,7 +446,7 @@ func (b *FirewallModelBuilder) addCNIRules(c *fi.ModelBuilderContext, sgMap map[
protocols = append(protocols, ProtocolIPEncap)
}

if b.Cluster.Spec.Networking.Kuberouter != nil {
if b.Cluster.Spec.Networking.KubeRouter != nil {
protocols = append(protocols, ProtocolIPEncap)
}
}
Expand Down
2 changes: 1 addition & 1 deletion pkg/model/pki.go
Expand Up @@ -70,7 +70,7 @@ func (b *PKIModelBuilder) Build(c *fi.ModelBuilderContext) error {
c.AddTask(t)
}

if b.KopsModelContext.Cluster.Spec.Networking.Kuberouter != nil && !b.UseKopsControllerForNodeBootstrap() {
if b.KopsModelContext.Cluster.Spec.Networking.KubeRouter != nil && !b.UseKopsControllerForNodeBootstrap() {
t := &fitasks.Keypair{
Name: fi.PtrTo("kube-router"),
Lifecycle: b.Lifecycle,
Expand Down
2 changes: 1 addition & 1 deletion tests/e2e/pkg/tester/skip_regex.go
Expand Up @@ -73,7 +73,7 @@ func (t *Tester) setSkipRegexFlag() error {
// https://github.com/cilium/cilium/issues/18241
skipRegex += "|Services.should.create.endpoints.for.unready.pods"
skipRegex += "|Services.should.be.able.to.connect.to.terminating.and.unready.endpoints.if.PublishNotReadyAddresses.is.true"
} else if networking.Kuberouter != nil {
} else if networking.KubeRouter != nil {
skipRegex += "|load-balancer|hairpin|affinity\\stimeout|service\\.kubernetes\\.io|CLOSE_WAIT"
} else if networking.Kubenet != nil {
skipRegex += "|Services.*affinity"
Expand Down
2 changes: 1 addition & 1 deletion tests/integration/conversion/aws/v1alpha2.yaml
Expand Up @@ -58,7 +58,7 @@ spec:
masterPublicName: api.minimal.example.com
networkCIDR: 172.20.0.0/16
networking:
kubenet: {}
amazonvpc: {}
nonMasqueradeCIDR: 100.64.0.0/10
sshAccess:
- 0.0.0.0/0
Expand Down
2 changes: 1 addition & 1 deletion tests/integration/conversion/aws/v1alpha3.yaml
Expand Up @@ -57,7 +57,7 @@ spec:
kubernetesVersion: v1.21.0
networkCIDR: 172.20.0.0/16
networking:
kubenet: {}
amazonVPC: {}
nonMasqueradeCIDR: 100.64.0.0/10
sshAccess:
- 0.0.0.0/0
Expand Down
2 changes: 1 addition & 1 deletion tests/integration/conversion/azure/v1alpha2.yaml
Expand Up @@ -42,7 +42,7 @@ spec:
masterPublicName: api.minimal.example.com
networkCIDR: 172.20.0.0/16
networking:
kubenet: {}
kuberouter: {}
nonMasqueradeCIDR: 100.64.0.0/10
sshAccess:
- 0.0.0.0/0
Expand Down
2 changes: 1 addition & 1 deletion tests/integration/conversion/azure/v1alpha3.yaml
Expand Up @@ -40,7 +40,7 @@ spec:
kubernetesVersion: v1.21.0
networkCIDR: 172.20.0.0/16
networking:
kubenet: {}
kubeRouter: {}
nonMasqueradeCIDR: 100.64.0.0/10
sshAccess:
- 0.0.0.0/0
Expand Down
Expand Up @@ -1019,7 +1019,7 @@ func (b *BootstrapChannelBuilder) buildAddons(c *fi.ModelBuilderContext) (*Addon
}
}

if b.Cluster.Spec.Networking.Kuberouter != nil {
if b.Cluster.Spec.Networking.KubeRouter != nil {
key := "networking.kuberouter"

{
Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/cloudup/new_cluster.go
Expand Up @@ -1139,7 +1139,7 @@ func setupNetworking(opt *NewClusterOptions, cluster *api.Cluster) error {
case "canal":
cluster.Spec.Networking.Canal = &api.CanalNetworkingSpec{}
case "kube-router":
cluster.Spec.Networking.Kuberouter = &api.KuberouterNetworkingSpec{}
cluster.Spec.Networking.KubeRouter = &api.KuberouterNetworkingSpec{}
if cluster.Spec.KubeProxy == nil {
cluster.Spec.KubeProxy = &api.KubeProxyConfig{}
}
Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/cloudup/new_cluster_test.go
Expand Up @@ -237,7 +237,7 @@ func TestSetupNetworking(t *testing.T) {
Enabled: fi.PtrTo(false),
},
Networking: &api.NetworkingSpec{
Kuberouter: &api.KuberouterNetworkingSpec{},
KubeRouter: &api.KuberouterNetworkingSpec{},
},
},
},
Expand Down