cmd/k8s-operator, k8s-operator: fix outdated kb links (#13585)
updates #13583 Signed-off-by: Cameron Stokes <cameron@tailscale.com>
This commit is contained in:
@ -29,7 +29,7 @@ var ConnectorKind = "Connector"
|
||||
// exit node.
|
||||
// Connector is a cluster-scoped resource.
|
||||
// More info:
|
||||
// https://tailscale.com/kb/1236/kubernetes-operator#deploying-exit-nodes-and-subnet-routers-on-kubernetes-using-connector-custom-resource
|
||||
// https://tailscale.com/kb/1441/kubernetes-operator-connector
|
||||
type Connector struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||
@ -62,7 +62,7 @@ type ConnectorSpec struct {
|
||||
// To autoapprove the subnet routes or exit node defined by a Connector,
|
||||
// you can configure Tailscale ACLs to give these tags the necessary
|
||||
// permissions.
|
||||
// See https://tailscale.com/kb/1018/acls/#auto-approvers-for-routes-and-exit-nodes.
|
||||
// See https://tailscale.com/kb/1337/acl-syntax#autoapprovers.
|
||||
// If you specify custom tags here, you must also make the operator an owner of these tags.
|
||||
// See https://tailscale.com/kb/1236/kubernetes-operator/#setting-up-the-kubernetes-operator.
|
||||
// Tags cannot be changed once a Connector node has been created.
|
||||
|
@ -25,7 +25,7 @@ var ProxyClassKind = "ProxyClass"
|
||||
// connector.spec.proxyClass field.
|
||||
// ProxyClass is a cluster scoped resource.
|
||||
// More info:
|
||||
// https://tailscale.com/kb/1236/kubernetes-operator#cluster-resource-customization-using-proxyclass-custom-resource.
|
||||
// https://tailscale.com/kb/1445/kubernetes-operator-customization#cluster-resource-customization-using-proxyclass-custom-resource
|
||||
type ProxyClass struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
metav1.ObjectMeta `json:"metadata,omitempty"`
|
||||
@ -73,7 +73,7 @@ type TailscaleConfig struct {
|
||||
// routes advertized by other nodes on the tailnet, such as subnet
|
||||
// routes.
|
||||
// This is equivalent of passing --accept-routes flag to a tailscale Linux client.
|
||||
// https://tailscale.com/kb/1019/subnets#use-your-subnet-routes-from-other-machines
|
||||
// https://tailscale.com/kb/1019/subnets#use-your-subnet-routes-from-other-devices
|
||||
// Defaults to false.
|
||||
AcceptRoutes bool `json:"acceptRoutes,omitempty"`
|
||||
}
|
||||
|
Reference in New Issue
Block a user