Skip to content

Commit

Permalink
Update crd
Browse files Browse the repository at this point in the history
  • Loading branch information
jackkleeman committed Feb 14, 2024
1 parent e2c53ed commit 4007288
Show file tree
Hide file tree
Showing 3 changed files with 9 additions and 1 deletion.
4 changes: 4 additions & 0 deletions crd/RestateCluster.pkl
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,10 @@ class Compute {

/// Security configuration
class Security {
/// if set, create a AWS PodIdentityAssociation using the ACK CRD in order to give the Restate pod
/// access to this role
awsPodIdentityAssociationRoleArn: String?

/// Network peers to allow access to restate ports If unset, will not allow any new traffic. Set any of
/// these to [] to allow all traffic - not recommended.
networkPeers: NetworkPeers?
Expand Down
4 changes: 4 additions & 0 deletions crd/crd.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -158,6 +158,10 @@ spec:
description: Security configuration
nullable: true
properties:
awsPodIdentityAssociationRoleArn:
description: if set, create a AWS PodIdentityAssociation using the ACK CRD in order to give the Restate pod access to this role
nullable: true
type: string
networkPeers:
description: Network peers to allow access to restate ports If unset, will not allow any new traffic. Set any of these to [] to allow all traffic - not recommended.
nullable: true
Expand Down
2 changes: 1 addition & 1 deletion src/controller.rs
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,7 @@ fn env_schema(g: &mut schemars::gen::SchemaGenerator) -> schemars::schema::Schem
#[serde(rename_all = "camelCase")]
pub struct RestateClusterSecurity {
pub service_account_annotations: Option<BTreeMap<String, String>>,
// if set, create a AWS PodIdentityAssociation using the ACK CRD in order to give the Restate pod access to this role
/// if set, create a AWS PodIdentityAssociation using the ACK CRD in order to give the Restate pod access to this role
pub aws_pod_identity_association_role_arn: Option<String>,
pub network_peers: Option<RestateClusterNetworkPeers>,
}
Expand Down

0 comments on commit 4007288

Please sign in to comment.