@@ -1213,36 +1213,6 @@ func validateNetworkingFlannel(c *kops.Cluster, v *kops.FlannelNetworkingSpec, f
12131213 return allErrs
12141214}
12151215
1216- func validateNetworkingCanal (c * kops.Cluster , v * kops.CanalNetworkingSpec , fldPath * field.Path ) field.ErrorList {
1217- allErrs := field.ErrorList {}
1218-
1219- if c .Spec .IsIPv6Only () {
1220- allErrs = append (allErrs , field .Forbidden (fldPath , "Canal does not support IPv6" ))
1221- }
1222-
1223- if v .DefaultEndpointToHostAction != "" {
1224- valid := []string {"ACCEPT" , "DROP" , "RETURN" }
1225- allErrs = append (allErrs , IsValidValue (fldPath .Child ("defaultEndpointToHostAction" ), & v .DefaultEndpointToHostAction , valid )... )
1226- }
1227-
1228- if v .ChainInsertMode != "" {
1229- valid := []string {"insert" , "append" }
1230- allErrs = append (allErrs , IsValidValue (fldPath .Child ("chainInsertMode" ), & v .ChainInsertMode , valid )... )
1231- }
1232-
1233- if v .LogSeveritySys != "" {
1234- valid := []string {"INFO" , "DEBUG" , "WARNING" , "ERROR" , "CRITICAL" , "NONE" }
1235- allErrs = append (allErrs , IsValidValue (fldPath .Child ("logSeveritySys" ), & v .LogSeveritySys , valid )... )
1236- }
1237-
1238- if v .IptablesBackend != "" {
1239- valid := []string {"Auto" , "Legacy" , "NFT" }
1240- allErrs = append (allErrs , IsValidValue (fldPath .Child ("iptablesBackend" ), & v .IptablesBackend , valid )... )
1241- }
1242-
1243- return allErrs
1244- }
1245-
12461216func validateNetworkingCilium (cluster * kops.Cluster , v * kops.CiliumNetworkingSpec , fldPath * field.Path ) field.ErrorList {
12471217 c := & cluster .Spec
12481218 allErrs := field.ErrorList {}
0 commit comments