From 6d45c3811b81f45635bad2f83411caa0a2fbdf1f Mon Sep 17 00:00:00 2001 From: Adrien Reslinger Date: Tue, 9 Nov 2021 08:32:14 +0100 Subject: [PATCH] Update to version v3.21.0 --- ...ctcalico.org-CustomResourceDefinition.yaml | 4 +- .../calico-kube-controllers-ClusterRole.yaml | 1 + .../calico-kube-controllers-Deployment.yaml | 2 +- templates/calico-node-ClusterRole.yaml | 8 + templates/calico-node-DaemonSet.yaml | 14 +- templates/calicoctl-ClusterRole.yaml | 1 + templates/calicoctl-Pod.yaml | 2 +- templates/calicoctl-ServiceAccount.yaml | 6 +- ...ctcalico.org-CustomResourceDefinition.yaml | 262 ++++++++++++++++++ ...ctcalico.org-CustomResourceDefinition.yaml | 27 +- ...ctcalico.org-CustomResourceDefinition.yaml | 16 +- ...ctcalico.org-CustomResourceDefinition.yaml | 10 + ...ctcalico.org-CustomResourceDefinition.yaml | 50 ++++ ...ctcalico.org-CustomResourceDefinition.yaml | 16 +- vars/calico-files.yaml | 2 + 15 files changed, 385 insertions(+), 36 deletions(-) create mode 100644 templates/caliconodestatuses.crd.projectcalico.org-CustomResourceDefinition.yaml create mode 100644 templates/ipreservations.crd.projectcalico.org-CustomResourceDefinition.yaml diff --git a/templates/bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml b/templates/bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml index be25ff3..0932ddd 100644 --- a/templates/bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml +++ b/templates/bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml @@ -41,8 +41,8 @@ spec: in the specific branch of the Node on "bird.cfg". type: boolean maxRestartTime: - description: Time to allow for software restart. When specified, this - is configured as the graceful restart timeout. When not specified, + description: Time to allow for software restart. When specified, + this is configured as the graceful restart timeout. When not specified, the BIRD default of 120s is used. type: string node: diff --git a/templates/calico-kube-controllers-ClusterRole.yaml b/templates/calico-kube-controllers-ClusterRole.yaml index 47c469d..912f4c1 100644 --- a/templates/calico-kube-controllers-ClusterRole.yaml +++ b/templates/calico-kube-controllers-ClusterRole.yaml @@ -27,6 +27,7 @@ rules: - apiGroups: ["crd.projectcalico.org"] resources: - ippools + - ipreservations verbs: - list - apiGroups: ["crd.projectcalico.org"] diff --git a/templates/calico-kube-controllers-Deployment.yaml b/templates/calico-kube-controllers-Deployment.yaml index d0ef431..f4264d0 100644 --- a/templates/calico-kube-controllers-Deployment.yaml +++ b/templates/calico-kube-controllers-Deployment.yaml @@ -34,7 +34,7 @@ spec: priorityClassName: system-cluster-critical containers: - name: calico-kube-controllers - image: docker.io/calico/kube-controllers:v3.20.2 + image: docker.io/calico/kube-controllers:v3.21.0 env: # Choose which controllers to run. - name: ENABLED_CONTROLLERS diff --git a/templates/calico-node-ClusterRole.yaml b/templates/calico-node-ClusterRole.yaml index 1f2249d..14cd28b 100644 --- a/templates/calico-node-ClusterRole.yaml +++ b/templates/calico-node-ClusterRole.yaml @@ -77,6 +77,7 @@ rules: - globalbgpconfigs - bgpconfigurations - ippools + - ipreservations - ipamblocks - globalnetworkpolicies - globalnetworksets @@ -85,6 +86,7 @@ rules: - clusterinformations - hostendpoints - blockaffinities + - caliconodestatuses verbs: - get - list @@ -98,6 +100,12 @@ rules: verbs: - create - update + # Calico must update some CRDs. + - apiGroups: [ "crd.projectcalico.org" ] + resources: + - caliconodestatuses + verbs: + - update # Calico stores some configuration information on the node. - apiGroups: [""] resources: diff --git a/templates/calico-node-DaemonSet.yaml b/templates/calico-node-DaemonSet.yaml index 0669ba4..81deb1c 100644 --- a/templates/calico-node-DaemonSet.yaml +++ b/templates/calico-node-DaemonSet.yaml @@ -44,7 +44,7 @@ spec: # It can be deleted if this is a fresh installation, or if you have already # upgraded to use calico-ipam. - name: upgrade-ipam - image: docker.io/calico/cni:v3.20.2 + image: docker.io/calico/cni:v3.21.0 command: ["/opt/cni/bin/calico-ipam", "-upgrade"] envFrom: - configMapRef: @@ -71,7 +71,7 @@ spec: # This container installs the CNI binaries # and CNI network config file on each node. - name: install-cni - image: docker.io/calico/cni:v3.20.2 + image: docker.io/calico/cni:v3.21.0 command: ["/opt/cni/bin/install"] envFrom: - configMapRef: @@ -112,7 +112,7 @@ spec: # Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes # to communicate with Felix over the Policy Sync API. - name: flexvol-driver - image: docker.io/calico/pod2daemon-flexvol:v3.20.2 + image: docker.io/calico/pod2daemon-flexvol:v3.21.0 volumeMounts: - name: flexvol-driver-host mountPath: /host/driver @@ -123,7 +123,7 @@ spec: # container programs network policy and routes on each # host. - name: calico-node - image: docker.io/calico/node:v3.20.2 + image: docker.io/calico/node:v3.21.0 envFrom: - configMapRef: # Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode. @@ -204,6 +204,12 @@ spec: resources: requests: cpu: 250m + lifecycle: + preStop: + exec: + command: + - /bin/calico-node + - -shutdown livenessProbe: exec: command: diff --git a/templates/calicoctl-ClusterRole.yaml b/templates/calicoctl-ClusterRole.yaml index 71469d5..a412e9b 100644 --- a/templates/calicoctl-ClusterRole.yaml +++ b/templates/calicoctl-ClusterRole.yaml @@ -38,6 +38,7 @@ rules: - globalnetworkpolicies - globalnetworksets - ippools + - ipreservations - kubecontrollersconfigurations - networkpolicies - networksets diff --git a/templates/calicoctl-Pod.yaml b/templates/calicoctl-Pod.yaml index f67e4bd..82a60c3 100644 --- a/templates/calicoctl-Pod.yaml +++ b/templates/calicoctl-Pod.yaml @@ -11,7 +11,7 @@ spec: serviceAccountName: calicoctl containers: - name: calicoctl - image: calico/ctl:v3.20.2 + image: calico/ctl:v3.21.0 command: - /calicoctl args: diff --git a/templates/calicoctl-ServiceAccount.yaml b/templates/calicoctl-ServiceAccount.yaml index b4235bb..5f63412 100644 --- a/templates/calicoctl-ServiceAccount.yaml +++ b/templates/calicoctl-ServiceAccount.yaml @@ -1,7 +1,7 @@ -# Calico Version v3.20.2 -# https://docs.projectcalico.org/releases#v3.20.2 +# Calico Version v3.21.0 +# https://docs.projectcalico.org/releases#v3.21.0 # This manifest includes the following component versions: -# calico/ctl:v3.20.2 +# calico/ctl:v3.21.0 apiVersion: v1 kind: ServiceAccount diff --git a/templates/caliconodestatuses.crd.projectcalico.org-CustomResourceDefinition.yaml b/templates/caliconodestatuses.crd.projectcalico.org-CustomResourceDefinition.yaml new file mode 100644 index 0000000..3d21b16 --- /dev/null +++ b/templates/caliconodestatuses.crd.projectcalico.org-CustomResourceDefinition.yaml @@ -0,0 +1,262 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: (devel) + creationTimestamp: null + name: caliconodestatuses.crd.projectcalico.org +spec: + group: crd.projectcalico.org + names: + kind: CalicoNodeStatus + listKind: CalicoNodeStatusList + plural: caliconodestatuses + singular: caliconodestatus + scope: Cluster + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: CalicoNodeStatusSpec contains the specification for a CalicoNodeStatus + resource. + properties: + classes: + description: Classes declares the types of information to monitor + for this calico/node, and allows for selective status reporting + about certain subsets of information. + items: + type: string + type: array + node: + description: The node name identifies the Calico node instance for + node status. + type: string + updatePeriodSeconds: + description: UpdatePeriodSeconds is the period at which CalicoNodeStatus + should be updated. Set to 0 to disable CalicoNodeStatus refresh. + Maximum update period is one day. + format: int32 + type: integer + type: object + status: + description: CalicoNodeStatusStatus defines the observed state of CalicoNodeStatus. + No validation needed for status since it is updated by Calico. + properties: + agent: + description: Agent holds agent status on the node. + properties: + birdV4: + description: BIRDV4 represents the latest observed status of bird4. + properties: + lastBootTime: + description: LastBootTime holds the value of lastBootTime + from bird.ctl output. + type: string + lastReconfigurationTime: + description: LastReconfigurationTime holds the value of lastReconfigTime + from bird.ctl output. + type: string + routerID: + description: Router ID used by bird. + type: string + state: + description: The state of the BGP Daemon. + type: string + version: + description: Version of the BGP daemon + type: string + type: object + birdV6: + description: BIRDV6 represents the latest observed status of bird6. + properties: + lastBootTime: + description: LastBootTime holds the value of lastBootTime + from bird.ctl output. + type: string + lastReconfigurationTime: + description: LastReconfigurationTime holds the value of lastReconfigTime + from bird.ctl output. + type: string + routerID: + description: Router ID used by bird. + type: string + state: + description: The state of the BGP Daemon. + type: string + version: + description: Version of the BGP daemon + type: string + type: object + type: object + bgp: + description: BGP holds node BGP status. + properties: + numberEstablishedV4: + description: The total number of IPv4 established bgp sessions. + type: integer + numberEstablishedV6: + description: The total number of IPv6 established bgp sessions. + type: integer + numberNotEstablishedV4: + description: The total number of IPv4 non-established bgp sessions. + type: integer + numberNotEstablishedV6: + description: The total number of IPv6 non-established bgp sessions. + type: integer + peersV4: + description: PeersV4 represents IPv4 BGP peers status on the node. + items: + description: CalicoNodePeer contains the status of BGP peers + on the node. + properties: + peerIP: + description: IP address of the peer whose condition we are + reporting. + type: string + since: + description: Since the state or reason last changed. + type: string + state: + description: State is the BGP session state. + type: string + type: + description: Type indicates whether this peer is configured + via the node-to-node mesh, or via en explicit global or + per-node BGPPeer object. + type: string + type: object + type: array + peersV6: + description: PeersV6 represents IPv6 BGP peers status on the node. + items: + description: CalicoNodePeer contains the status of BGP peers + on the node. + properties: + peerIP: + description: IP address of the peer whose condition we are + reporting. + type: string + since: + description: Since the state or reason last changed. + type: string + state: + description: State is the BGP session state. + type: string + type: + description: Type indicates whether this peer is configured + via the node-to-node mesh, or via en explicit global or + per-node BGPPeer object. + type: string + type: object + type: array + required: + - numberEstablishedV4 + - numberEstablishedV6 + - numberNotEstablishedV4 + - numberNotEstablishedV6 + type: object + lastUpdated: + description: LastUpdated is a timestamp representing the server time + when CalicoNodeStatus object last updated. It is represented in + RFC3339 form and is in UTC. + format: date-time + nullable: true + type: string + routes: + description: Routes reports routes known to the Calico BGP daemon + on the node. + properties: + routesV4: + description: RoutesV4 represents IPv4 routes on the node. + items: + description: CalicoNodeRoute contains the status of BGP routes + on the node. + properties: + destination: + description: Destination of the route. + type: string + gateway: + description: Gateway for the destination. + type: string + interface: + description: Interface for the destination + type: string + learnedFrom: + description: LearnedFrom contains information regarding + where this route originated. + properties: + peerIP: + description: If sourceType is NodeMesh or BGPPeer, IP + address of the router that sent us this route. + type: string + sourceType: + description: Type of the source where a route is learned + from. + type: string + type: object + type: + description: Type indicates if the route is being used for + forwarding or not. + type: string + type: object + type: array + routesV6: + description: RoutesV6 represents IPv6 routes on the node. + items: + description: CalicoNodeRoute contains the status of BGP routes + on the node. + properties: + destination: + description: Destination of the route. + type: string + gateway: + description: Gateway for the destination. + type: string + interface: + description: Interface for the destination + type: string + learnedFrom: + description: LearnedFrom contains information regarding + where this route originated. + properties: + peerIP: + description: If sourceType is NodeMesh or BGPPeer, IP + address of the router that sent us this route. + type: string + sourceType: + description: Type of the source where a route is learned + from. + type: string + type: object + type: + description: Type indicates if the route is being used for + forwarding or not. + type: string + type: object + type: array + type: object + type: object + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] + diff --git a/templates/felixconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml b/templates/felixconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml index 03cf91c..186148a 100644 --- a/templates/felixconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml +++ b/templates/felixconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml @@ -43,7 +43,7 @@ spec: type: boolean awsSrcDstCheck: description: 'Set source-destination-check on AWS EC2 instances. Accepted - value must be one of "DoNothing", "Enabled" or "Disabled". [Default: + value must be one of "DoNothing", "Enable" or "Disable". [Default: DoNothing]' enum: - DoNothing @@ -77,6 +77,13 @@ spec: description: 'BPFEnabled, if enabled Felix will use the BPF dataplane. [Default: false]' type: boolean + bpfExtToServiceConnmark: + description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit + mark that is set on connections from an external client to a local + service. This mark allows us to control how packets of that connection + are routed within the host and how is routing intepreted by RPF + check. [Default: 0]' + type: integer bpfExternalServiceMode: description: 'BPFExternalServiceMode in BPF mode, controls how connections from outside the cluster to services (node ports and cluster IPs) @@ -87,14 +94,6 @@ spec: node appears to use the IP of the ingress node; this requires a permissive L2 network. [Default: Tunnel]' type: string - bpfExtToServiceConnmark: - description: 'BPFExtToServiceConnmark in BPF mode, controls a - 32bit mark that is set on connections from an external client to - a local service. This mark allows us to control how packets of - that connection are routed within the host and how is routing - intepreted by RPF check. [Default: 0]' - type: integer - bpfKubeProxyEndpointSlicesEnabled: description: BPFKubeProxyEndpointSlicesEnabled in BPF mode, controls whether Felix's embedded kube-proxy accepts EndpointSlices or not. @@ -443,6 +442,12 @@ spec: to false. This reduces the number of metrics reported, reducing Prometheus load. [Default: true]' type: boolean + prometheusWireGuardMetricsEnabled: + description: 'PrometheusWireGuardMetricsEnabled disables wireguard + metrics collection, which the Prometheus client does by default, + when set to false. This reduces the number of metrics reported, + reducing Prometheus load. [Default: true]' + type: boolean removeExternalRoutes: description: Whether or not to remove device routes that have not been programmed by Felix. Disabling this will allow external applications @@ -524,6 +529,10 @@ spec: description: 'WireguardEnabled controls whether Wireguard is enabled. [Default: false]' type: boolean + wireguardHostEncryptionEnabled: + description: 'WireguardHostEncryptionEnabled controls whether Wireguard + host-to-host encryption is enabled. [Default: false]' + type: boolean wireguardInterfaceName: description: 'WireguardInterfaceName specifies the name to use for the Wireguard interface. [Default: wg.calico]' diff --git a/templates/globalnetworkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml b/templates/globalnetworkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml index a847663..b4b1f2e 100644 --- a/templates/globalnetworkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml +++ b/templates/globalnetworkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml @@ -169,8 +169,8 @@ spec: within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, - Ports, NotPorts, Nets, NotNets or ServiceAccounts. \n - Only valid on egress rules." + Nets, NotNets or ServiceAccounts. \n Ports and NotPorts + can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes @@ -395,8 +395,8 @@ spec: within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, - Ports, NotPorts, Nets, NotNets or ServiceAccounts. \n - Only valid on egress rules." + Nets, NotNets or ServiceAccounts. \n Ports and NotPorts + can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes @@ -542,8 +542,8 @@ spec: within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, - Ports, NotPorts, Nets, NotNets or ServiceAccounts. \n - Only valid on egress rules." + Nets, NotNets or ServiceAccounts. \n Ports and NotPorts + can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes @@ -768,8 +768,8 @@ spec: within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, - Ports, NotPorts, Nets, NotNets or ServiceAccounts. \n - Only valid on egress rules." + Nets, NotNets or ServiceAccounts. \n Ports and NotPorts + can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes diff --git a/templates/ippools.crd.projectcalico.org-CustomResourceDefinition.yaml b/templates/ippools.crd.projectcalico.org-CustomResourceDefinition.yaml index 6e93b79..9856cbb 100644 --- a/templates/ippools.crd.projectcalico.org-CustomResourceDefinition.yaml +++ b/templates/ippools.crd.projectcalico.org-CustomResourceDefinition.yaml @@ -30,6 +30,12 @@ spec: spec: description: IPPoolSpec contains the specification for an IPPool resource. properties: + allowedUses: + description: AllowedUse controls what the IP pool will be used for. If + not specified or empty, defaults to ["Tunnel", "Workload"] for back-compatibility + items: + type: string + type: array blockSize: description: The block size to use for IP address assignments from this pool. Defaults to 26 for IPv4 and 112 for IPv6. @@ -41,6 +47,10 @@ spec: description: When disabled is true, Calico IPAM will not assign addresses from this pool. type: boolean + disableBGPExport: + description: 'Disable exporting routes from this IP Pool’s CIDR over + BGP. [Default: false]' + type: boolean ipip: description: 'Deprecated: this field is only used for APIv1 backwards compatibility. Setting this field is not allowed, this field is diff --git a/templates/ipreservations.crd.projectcalico.org-CustomResourceDefinition.yaml b/templates/ipreservations.crd.projectcalico.org-CustomResourceDefinition.yaml new file mode 100644 index 0000000..2abcb30 --- /dev/null +++ b/templates/ipreservations.crd.projectcalico.org-CustomResourceDefinition.yaml @@ -0,0 +1,50 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: ipreservations.crd.projectcalico.org +spec: + group: crd.projectcalico.org + names: + kind: IPReservation + listKind: IPReservationList + plural: ipreservations + singular: ipreservation + scope: Cluster + versions: + - name: v1 + schema: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: IPReservationSpec contains the specification for an IPReservation + resource. + properties: + reservedCIDRs: + description: ReservedCIDRs is a list of CIDRs and/or IP addresses + that Calico IPAM will exclude from new allocations. + items: + type: string + type: array + type: object + type: object + served: true + storage: true +status: + acceptedNames: + kind: "" + plural: "" + conditions: [] + storedVersions: [] + diff --git a/templates/networkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml b/templates/networkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml index fc6ff2f..2e79b63 100644 --- a/templates/networkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml +++ b/templates/networkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml @@ -158,8 +158,8 @@ spec: within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, - Ports, NotPorts, Nets, NotNets or ServiceAccounts. \n - Only valid on egress rules." + Nets, NotNets or ServiceAccounts. \n Ports and NotPorts + can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes @@ -384,8 +384,8 @@ spec: within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, - Ports, NotPorts, Nets, NotNets or ServiceAccounts. \n - Only valid on egress rules." + Nets, NotNets or ServiceAccounts. \n Ports and NotPorts + can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes @@ -531,8 +531,8 @@ spec: within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, - Ports, NotPorts, Nets, NotNets or ServiceAccounts. \n - Only valid on egress rules." + Nets, NotNets or ServiceAccounts. \n Ports and NotPorts + can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes @@ -757,8 +757,8 @@ spec: within the selected service(s) will be matched, and only to/from each endpoint's port. \n Services cannot be specified on the same rule as Selector, NotSelector, NamespaceSelector, - Ports, NotPorts, Nets, NotNets or ServiceAccounts. \n - Only valid on egress rules." + Nets, NotNets or ServiceAccounts. \n Ports and NotPorts + can only be specified with Services on ingress rules." properties: name: description: Name specifies the name of a Kubernetes diff --git a/vars/calico-files.yaml b/vars/calico-files.yaml index 403c053..e086d77 100644 --- a/vars/calico-files.yaml +++ b/vars/calico-files.yaml @@ -4,6 +4,7 @@ calico_files: - "bgpconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml" - "bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml" - "blockaffinities.crd.projectcalico.org-CustomResourceDefinition.yaml" + - "caliconodestatuses.crd.projectcalico.org-CustomResourceDefinition.yaml" - "clusterinformations.crd.projectcalico.org-CustomResourceDefinition.yaml" - "felixconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml" - "globalnetworkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml" @@ -13,6 +14,7 @@ calico_files: - "ipamconfigs.crd.projectcalico.org-CustomResourceDefinition.yaml" - "ipamhandles.crd.projectcalico.org-CustomResourceDefinition.yaml" - "ippools.crd.projectcalico.org-CustomResourceDefinition.yaml" + - "ipreservations.crd.projectcalico.org-CustomResourceDefinition.yaml" - "kubecontrollersconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml" - "networkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml" - "networksets.crd.projectcalico.org-CustomResourceDefinition.yaml"