mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-21 02:41:25 +00:00
Merge pull request #95995 from serathius/datapolicy-legacy-cloud-providers
Add datapolicy tags to staging/src/k8s.io/legacy-cloud-providers
This commit is contained in:
commit
e9cfb34b8f
@ -316,7 +316,7 @@ func getOpenstackConfig() openstack.Config {
|
||||
AuthURL string `gcfg:"auth-url"`
|
||||
Username string
|
||||
UserID string `gcfg:"user-id"`
|
||||
Password string
|
||||
Password string `datapolicy:"password"`
|
||||
TenantID string `gcfg:"tenant-id"`
|
||||
TenantName string `gcfg:"tenant-name"`
|
||||
TrustID string `gcfg:"trust-id"`
|
||||
|
@ -49,11 +49,11 @@ type AzureAuthConfig struct {
|
||||
// The ClientID for an AAD application with RBAC access to talk to Azure RM APIs
|
||||
AADClientID string `json:"aadClientId,omitempty" yaml:"aadClientId,omitempty"`
|
||||
// The ClientSecret for an AAD application with RBAC access to talk to Azure RM APIs
|
||||
AADClientSecret string `json:"aadClientSecret,omitempty" yaml:"aadClientSecret,omitempty"`
|
||||
AADClientSecret string `json:"aadClientSecret,omitempty" yaml:"aadClientSecret,omitempty" datapolicy:"token"`
|
||||
// The path of a client certificate for an AAD application with RBAC access to talk to Azure RM APIs
|
||||
AADClientCertPath string `json:"aadClientCertPath,omitempty" yaml:"aadClientCertPath,omitempty"`
|
||||
// The password of the client certificate for an AAD application with RBAC access to talk to Azure RM APIs
|
||||
AADClientCertPassword string `json:"aadClientCertPassword,omitempty" yaml:"aadClientCertPassword,omitempty"`
|
||||
AADClientCertPassword string `json:"aadClientCertPassword,omitempty" yaml:"aadClientCertPassword,omitempty" datapolicy:"password"`
|
||||
// Use managed service identity for the virtual machine to access Azure ARM APIs
|
||||
UseManagedIdentityExtension bool `json:"useManagedIdentityExtension,omitempty" yaml:"useManagedIdentityExtension,omitempty"`
|
||||
// UserAssignedIdentityID contains the Client ID of the user assigned MSI which is assigned to the underlying VMs. If empty the user assigned identity is not used.
|
||||
|
@ -172,7 +172,7 @@ type Cloud struct {
|
||||
// TODO: replace gcfg with json
|
||||
type ConfigGlobal struct {
|
||||
TokenURL string `gcfg:"token-url"`
|
||||
TokenBody string `gcfg:"token-body"`
|
||||
TokenBody string `gcfg:"token-body" datapolicy:"token"`
|
||||
// ProjectID and NetworkProjectID can either be the numeric or string-based
|
||||
// unique identifier that starts with [a-z].
|
||||
ProjectID string `gcfg:"project-id"`
|
||||
|
@ -75,7 +75,7 @@ func init() {
|
||||
type AltTokenSource struct {
|
||||
oauthClient *http.Client
|
||||
tokenURL string
|
||||
tokenBody string
|
||||
tokenBody string `datapolicy:"token"`
|
||||
throttle flowcontrol.RateLimiter
|
||||
}
|
||||
|
||||
@ -104,7 +104,7 @@ func (a *AltTokenSource) token() (*oauth2.Token, error) {
|
||||
return nil, err
|
||||
}
|
||||
var tok struct {
|
||||
AccessToken string `json:"accessToken"`
|
||||
AccessToken string `json:"accessToken" datapolicy:"token"`
|
||||
ExpireTime time.Time `json:"expireTime"`
|
||||
}
|
||||
if err := json.NewDecoder(res.Body).Decode(&tok); err != nil {
|
||||
|
@ -158,7 +158,7 @@ type Config struct {
|
||||
AuthURL string `gcfg:"auth-url"`
|
||||
Username string
|
||||
UserID string `gcfg:"user-id"`
|
||||
Password string
|
||||
Password string `datapolicy:"password"`
|
||||
TenantID string `gcfg:"tenant-id"`
|
||||
TenantName string `gcfg:"tenant-name"`
|
||||
TrustID string `gcfg:"trust-id"`
|
||||
|
@ -53,7 +53,7 @@ type SecretCache struct {
|
||||
|
||||
type Credential struct {
|
||||
User string `gcfg:"user"`
|
||||
Password string `gcfg:"password"`
|
||||
Password string `gcfg:"password" datapolicy:"password"`
|
||||
}
|
||||
|
||||
type SecretCredentialManager struct {
|
||||
|
@ -37,7 +37,7 @@ import (
|
||||
type VSphereConnection struct {
|
||||
Client *vim25.Client
|
||||
Username string
|
||||
Password string
|
||||
Password string `datapolicy:"password"`
|
||||
Hostname string
|
||||
Port string
|
||||
CACert string
|
||||
|
@ -113,7 +113,7 @@ type VirtualCenterConfig struct {
|
||||
// vCenter username.
|
||||
User string `gcfg:"user"`
|
||||
// vCenter password in clear text.
|
||||
Password string `gcfg:"password"`
|
||||
Password string `gcfg:"password" datapolicy:"password"`
|
||||
// vCenter port.
|
||||
VCenterPort string `gcfg:"port"`
|
||||
// Datacenter in which VMs are located.
|
||||
@ -137,7 +137,7 @@ type VSphereConfig struct {
|
||||
// vCenter username.
|
||||
User string `gcfg:"user"`
|
||||
// vCenter password in clear text.
|
||||
Password string `gcfg:"password"`
|
||||
Password string `gcfg:"password" datapolicy:"password"`
|
||||
// Deprecated. Use VirtualCenter to specify multiple vCenter Servers.
|
||||
// vCenter IP.
|
||||
VCenterIP string `gcfg:"server"`
|
||||
|
Loading…
Reference in New Issue
Block a user