diff --git a/apis/management.cattle.io/v3/backup_types.go b/apis/management.cattle.io/v3/backup_types.go index c7137161..35bcc26d 100644 --- a/apis/management.cattle.io/v3/backup_types.go +++ b/apis/management.cattle.io/v3/backup_types.go @@ -66,6 +66,10 @@ type EtcdBackupSpec struct { type EtcdBackupStatus struct { Conditions []EtcdBackupCondition `json:"conditions"` + // version of k8s in the backup pulled from rke config + KubernetesVersion string `yaml:"kubernetesVersion" json:"kubernetesVersion,omitempty" norman:"noupdate"` + // json + gzipped + base64 backup of the cluster object when the backup was created + ClusterObject string `yaml:"clusterObject" json:"clusterObject,omitempty" norman:"type=password,noupdate"` } type EtcdBackupCondition struct { diff --git a/apis/management.cattle.io/v3/cluster_types.go b/apis/management.cattle.io/v3/cluster_types.go index c315f475..3e3dde6a 100644 --- a/apis/management.cattle.io/v3/cluster_types.go +++ b/apis/management.cattle.io/v3/cluster_types.go @@ -276,7 +276,8 @@ type MonitoringOutput struct { } type RestoreFromEtcdBackupInput struct { - EtcdBackupName string `json:"etcdBackupName,omitempty" norman:"type=reference[etcdBackup]"` + EtcdBackupName string `json:"etcdBackupName,omitempty" norman:"type=reference[etcdBackup]"` + RestoreRkeConfig string `json:"restoreRkeConfig,omitempty"` } type RotateCertificateInput struct {