Skip to content

Commit 29d364b

Browse files
committed
Revert "Merge pull request openshift#1410 from bpickard22/gatway-subnet-api"
This reverts commit f9d67cd, reversing changes made to 5fdd751.
1 parent 4f7969b commit 29d364b

File tree

7 files changed

+0
-465
lines changed

7 files changed

+0
-465
lines changed

openapi/generated_openapi/zz_generated.openapi.go

Lines changed: 0 additions & 58 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

openapi/openapi.json

Lines changed: 0 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -25210,16 +25210,6 @@
2521025210
"description": "IPForwarding controls IP forwarding for all traffic on OVN-Kubernetes managed interfaces (such as br-ex). By default this is set to Restricted, and Kubernetes related traffic is still forwarded appropriately, but other IP traffic will not be routed by the OCP node. If there is a desire to allow the host to forward traffic across OVN-Kubernetes managed interfaces, then set this field to \"Global\". The supported values are \"Restricted\" and \"Global\".",
2521125211
"type": "string"
2521225212
},
25213-
"ipv4": {
25214-
"description": "ipv4 allows users to configure IP settings for IPv4 connections. When omitted, this means no opinion and the default configuration is used. Check individual members fields within ipv4 for details of default values.",
25215-
"default": {},
25216-
"$ref": "#/definitions/com.github.openshift.api.operator.v1.IPv4GatewayConfig"
25217-
},
25218-
"ipv6": {
25219-
"description": "ipv6 allows users to configure IP settings for IPv6 connections. When omitted, this means no opinion and the default configuration is used. Check individual members fields within ipv6 for details of default values.",
25220-
"default": {},
25221-
"$ref": "#/definitions/com.github.openshift.api.operator.v1.IPv6GatewayConfig"
25222-
},
2522325213
"routingViaHost": {
2522425214
"description": "RoutingViaHost allows pod egress traffic to exit via the ovn-k8s-mp0 management port into the host before sending it out. If this is not set, traffic will always egress directly from OVN to outside without touching the host stack. Setting this to true means hardware offload will not be supported. Default is false if GatewayConfig is specified.",
2522525215
"type": "boolean"
@@ -25463,26 +25453,6 @@
2546325453
"com.github.openshift.api.operator.v1.IPsecConfig": {
2546425454
"type": "object"
2546525455
},
25466-
"com.github.openshift.api.operator.v1.IPv4GatewayConfig": {
25467-
"description": "IPV4GatewayConfig holds the configuration paramaters for IPV4 connections in the GatewayConfig for OVN-Kubernetes",
25468-
"type": "object",
25469-
"properties": {
25470-
"internalMasqueradeSubnet": {
25471-
"description": "internalMasqueradeSubnet contains the masquerade addresses in IPV4 CIDR format used internally by ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these addresses, as well as the shared gateway bridge interface. The values can be changed after installation. The subnet chosen should not overlap with other networks specified for OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must be large enough to accommodate 6 IPs (maximum prefix length /29). When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time. The current default subnet is 169.254.169.0/29 The value must be in proper IPV4 CIDR format",
25472-
"type": "string"
25473-
}
25474-
}
25475-
},
25476-
"com.github.openshift.api.operator.v1.IPv6GatewayConfig": {
25477-
"description": "IPV6GatewayConfig holds the configuration paramaters for IPV6 connections in the GatewayConfig for OVN-Kubernetes",
25478-
"type": "object",
25479-
"properties": {
25480-
"internalMasqueradeSubnet": {
25481-
"description": "internalMasqueradeSubnet contains the masquerade addresses in IPV6 CIDR format used internally by ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these addresses, as well as the shared gateway bridge interface. The values can be changed after installation. The subnet chosen should not overlap with other networks specified for OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must be large enough to accommodate 6 IPs (maximum prefix length /125). When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time. The current default subnet is fd69::/125 Note that IPV6 dual addresses are not permitted",
25482-
"type": "string"
25483-
}
25484-
}
25485-
},
2548625456
"com.github.openshift.api.operator.v1.IngressController": {
2548725457
"description": "IngressController describes a managed ingress controller for the cluster. The controller can service OpenShift Route and Kubernetes Ingress resources.\n\nWhen an IngressController is created, a new ingress controller deployment is created to allow external traffic to reach the services that expose Ingress or Route resources. Updating this resource may lead to disruption for public facing network connections as a new ingress controller revision may be rolled out.\n\nhttps://kubernetes.io/docs/concepts/services-networking/ingress-controllers\n\nWhenever possible, sensible defaults for the platform are used. See each field for more details.\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
2548825458
"type": "object",

operator/v1/0000_70_cluster-network-operator_01.crd.yaml

Lines changed: 0 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -219,59 +219,6 @@ spec:
219219
ipForwarding:
220220
description: IPForwarding controls IP forwarding for all traffic on OVN-Kubernetes managed interfaces (such as br-ex). By default this is set to Restricted, and Kubernetes related traffic is still forwarded appropriately, but other IP traffic will not be routed by the OCP node. If there is a desire to allow the host to forward traffic across OVN-Kubernetes managed interfaces, then set this field to "Global". The supported values are "Restricted" and "Global".
221221
type: string
222-
ipv4:
223-
description: ipv4 allows users to configure IP settings for IPv4 connections. When omitted, this means no opinion and the default configuration is used. Check individual members fields within ipv4 for details of default values.
224-
type: object
225-
properties:
226-
internalMasqueradeSubnet:
227-
description: internalMasqueradeSubnet contains the masquerade addresses in IPV4 CIDR format used internally by ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these addresses, as well as the shared gateway bridge interface. The values can be changed after installation. The subnet chosen should not overlap with other networks specified for OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must be large enough to accommodate 6 IPs (maximum prefix length /29). When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time. The current default subnet is 169.254.169.0/29 The value must be in proper IPV4 CIDR format
228-
type: string
229-
maxLength: 18
230-
x-kubernetes-validations:
231-
- rule: self.indexOf('/') == self.lastIndexOf('/')
232-
message: CIDR format must contain exactly one '/'
233-
- rule: '[int(self.split(''/'')[1])].all(x, x <= 29 && x >= 0)'
234-
message: subnet must be in the range /0 to /29 inclusive
235-
- rule: self.split('/')[0].split('.').size() == 4
236-
message: a valid IPv4 address must contain 4 octets
237-
- rule: '[self.findAll(''[0-9]+'')[0]].all(x, x != ''0'' && int(x) <= 255 && !x.startsWith(''0''))'
238-
message: first IP address octet must not contain leading zeros, must be greater than 0 and less or equal to 255
239-
- rule: '[self.findAll(''[0-9]+'')[1], self.findAll(''[0-9]+'')[2], self.findAll(''[0-9]+'')[3]].all(x, int(x) <= 255 && (x == ''0'' || !x.startsWith(''0'')))'
240-
message: IP address octets must not contain leading zeros, and must be less or equal to 255
241-
ipv6:
242-
description: ipv6 allows users to configure IP settings for IPv6 connections. When omitted, this means no opinion and the default configuration is used. Check individual members fields within ipv6 for details of default values.
243-
type: object
244-
properties:
245-
internalMasqueradeSubnet:
246-
description: internalMasqueradeSubnet contains the masquerade addresses in IPV6 CIDR format used internally by ovn-kubernetes to enable host to service traffic. Each host in the cluster is configured with these addresses, as well as the shared gateway bridge interface. The values can be changed after installation. The subnet chosen should not overlap with other networks specified for OVN-Kubernetes as well as other networks used on the host. Additionally the subnet must be large enough to accommodate 6 IPs (maximum prefix length /125). When omitted, this means no opinion and the platform is left to choose a reasonable default which is subject to change over time. The current default subnet is fd69::/125 Note that IPV6 dual addresses are not permitted
247-
type: string
248-
x-kubernetes-validations:
249-
- rule: self.indexOf('/') == self.lastIndexOf('/')
250-
message: CIDR format must contain exactly one '/'
251-
- rule: self.split('/').size() == 2 && [int(self.split('/')[1])].all(x, x <= 125 && x >= 0)
252-
message: subnet must be in the range /0 to /125 inclusive
253-
- rule: self.indexOf('::') == self.lastIndexOf('::')
254-
message: IPv6 addresses must contain at most one '::' and may only be shortened once
255-
- rule: 'self.contains(''::'') ? self.split(''/'')[0].split('':'').size() <= 8 : self.split(''/'')[0].split('':'').size() == 8'
256-
message: a valid IPv6 address must contain 8 segments unless elided (::), in which case it must contain at most 6 non-empty segments
257-
- rule: 'self.split(''/'')[0].split('':'').size() >=1 ? [self.split(''/'')[0].split('':'', 8)[0]].all(x, x == '''' || x.matches(''[0-9A-Fa-f]{1,4}'')) : true'
258-
message: each segment of an IPv6 address must be a hexadecimal number between 0 and FFFF, failed on segment 1
259-
- rule: 'self.split(''/'')[0].split('':'').size() >=2 ? [self.split(''/'')[0].split('':'', 8)[1]].all(x, x == '''' || x.matches(''[0-9A-Fa-f]{1,4}'')) : true'
260-
message: each segment of an IPv6 address must be a hexadecimal number between 0 and FFFF, failed on segment 2
261-
- rule: 'self.split(''/'')[0].split('':'').size() >=3 ? [self.split(''/'')[0].split('':'', 8)[2]].all(x, x == '''' || x.matches(''[0-9A-Fa-f]{1,4}'')) : true'
262-
message: each segment of an IPv6 address must be a hexadecimal number between 0 and FFFF, failed on segment 3
263-
- rule: 'self.split(''/'')[0].split('':'').size() >=4 ? [self.split(''/'')[0].split('':'', 8)[3]].all(x, x == '''' || x.matches(''[0-9A-Fa-f]{1,4}'')) : true'
264-
message: each segment of an IPv6 address must be a hexadecimal number between 0 and FFFF, failed on segment 4
265-
- rule: 'self.split(''/'')[0].split('':'').size() >=5 ? [self.split(''/'')[0].split('':'', 8)[4]].all(x, x == '''' || x.matches(''[0-9A-Fa-f]{1,4}'')) : true'
266-
message: each segment of an IPv6 address must be a hexadecimal number between 0 and FFFF, failed on segment 5
267-
- rule: 'self.split(''/'')[0].split('':'').size() >=6 ? [self.split(''/'')[0].split('':'', 8)[5]].all(x, x == '''' || x.matches(''[0-9A-Fa-f]{1,4}'')) : true'
268-
message: each segment of an IPv6 address must be a hexadecimal number between 0 and FFFF, failed on segment 6
269-
- rule: 'self.split(''/'')[0].split('':'').size() >=7 ? [self.split(''/'')[0].split('':'', 8)[6]].all(x, x == '''' || x.matches(''[0-9A-Fa-f]{1,4}'')) : true'
270-
message: each segment of an IPv6 address must be a hexadecimal number between 0 and FFFF, failed on segment 7
271-
- rule: 'self.split(''/'')[0].split('':'').size() >=8 ? [self.split(''/'')[0].split('':'', 8)[7]].all(x, x == '''' || x.matches(''[0-9A-Fa-f]{1,4}'')) : true'
272-
message: each segment of an IPv6 address must be a hexadecimal number between 0 and FFFF, failed on segment 8
273-
- rule: '!self.contains(''.'')'
274-
message: IPv6 dual addresses are not permitted, value should not contain `.` characters
275222
routingViaHost:
276223
description: RoutingViaHost allows pod egress traffic to exit via the ovn-k8s-mp0 management port into the host before sending it out. If this is not set, traffic will always egress directly from OVN to outside without touching the host stack. Setting this to true means hardware offload will not be supported. Default is false if GatewayConfig is specified.
277224
type: boolean

0 commit comments

Comments
 (0)