From a240065b45b7d2d973b6a00cf9e1ac7f473f50a4 Mon Sep 17 00:00:00 2001 From: xWink <45508693+xWink@users.noreply.github.com> Date: Wed, 4 Oct 2023 13:04:17 -0700 Subject: [PATCH] Create AccessLogPolicy CRD (#420) * Added AccessLogPolicy CRD --------- Co-authored-by: Shawn Kaplan --- ...-networking.k8s.aws_accesslogpolicies.yaml | 196 ++++++++++++++++++ config/crds/kustomization.yaml | 1 + config/rbac/cluster-role-controller.yaml | 28 ++- docs/developer.md | 1 + ...-networking.k8s.aws_accesslogpolicies.yaml | 196 ++++++++++++++++++ helm/templates/cluster-role-controller.yaml | 18 ++ .../v1alpha1/accesslogpolicy_types.go | 94 +++++++++ .../v1alpha1/zz_generated.deepcopy.go | 107 ++++++++++ .../v1alpha1/zz_generated.register.go | 2 + 9 files changed, 642 insertions(+), 1 deletion(-) create mode 100644 config/crds/bases/application-networking.k8s.aws_accesslogpolicies.yaml create mode 100644 helm/crds/application-networking.k8s.aws_accesslogpolicies.yaml create mode 100644 pkg/apis/applicationnetworking/v1alpha1/accesslogpolicy_types.go diff --git a/config/crds/bases/application-networking.k8s.aws_accesslogpolicies.yaml b/config/crds/bases/application-networking.k8s.aws_accesslogpolicies.yaml new file mode 100644 index 00000000..75f57f25 --- /dev/null +++ b/config/crds/bases/application-networking.k8s.aws_accesslogpolicies.yaml @@ -0,0 +1,196 @@ +--- +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.13.0 + name: accesslogpolicies.application-networking.k8s.aws +spec: + group: application-networking.k8s.aws + names: + categories: + - gateway-api + kind: AccessLogPolicy + listKind: AccessLogPolicyList + plural: accesslogpolicies + shortNames: + - alp + singular: accesslogpolicy + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1alpha1 + schema: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: AccessLogPolicySpec defines the desired state of AccessLogPolicy. + properties: + destinationArn: + description: "The Amazon Resource Name (ARN) of the destination that + will store access logs. Supported values are S3 Bucket, CloudWatch + Log Group, and Firehose Delivery Stream ARNs. \n Changes to this + value results in replacement of the VPC Lattice Access Log Subscription." + pattern: ^arn(:[a-z0-9]+([.-][a-z0-9]+)*){2}(:([a-z0-9]+([.-][a-z0-9]+)*)?){2}:([^/].*)? + type: string + targetRef: + description: "TargetRef points to the Kubernetes Gateway, HTTPRoute, + or GRPCRoute resource that will have this policy attached. \n This + field is following the guidelines of Kubernetes Gateway API policy + attachment." + properties: + group: + description: Group is the group of the target resource. + maxLength: 253 + pattern: ^$|^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + kind: + description: Kind is kind of the target resource. + maxLength: 63 + minLength: 1 + pattern: ^[a-zA-Z]([-a-zA-Z0-9]*[a-zA-Z0-9])?$ + type: string + name: + description: Name is the name of the target resource. + maxLength: 253 + minLength: 1 + type: string + namespace: + description: Namespace is the namespace of the referent. When + unspecified, the local namespace is inferred. Even when policy + targets a resource in a different namespace, it MUST only apply + to traffic originating from the same namespace as the policy. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + required: + - group + - kind + - name + type: object + required: + - targetRef + type: object + status: + default: + conditions: + - lastTransitionTime: "1970-01-01T00:00:00Z" + message: Waiting for controller + reason: NotReconciled + status: Unknown + type: Accepted + description: Status defines the current state of AccessLogPolicy. + properties: + conditions: + default: + - lastTransitionTime: "1970-01-01T00:00:00Z" + message: Waiting for controller + reason: Pending + status: Unknown + type: Accepted + - lastTransitionTime: "1970-01-01T00:00:00Z" + message: Waiting for controller + reason: Pending + status: Unknown + type: Programmed + description: "Conditions describe the current conditions of the AccessLogPolicy. + \n Implementations should prefer to express Policy conditions using + the `PolicyConditionType` and `PolicyConditionReason` constants + so that operators and tools can converge on a common vocabulary + to describe AccessLogPolicy state. \n Known condition types are: + \n * \"Accepted\" * \"Ready\"" + items: + description: "Condition contains details for one aspect of the current + state of this API Resource. --- This struct is intended for direct + use as an array at the field path .status.conditions. For example, + \n type FooStatus struct{ // Represents the observations of a + foo's current state. // Known .status.conditions.type are: \"Available\", + \"Progressing\", and \"Degraded\" // +patchMergeKey=type // +patchStrategy=merge + // +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" patchMergeKey:\"type\" + protobuf:\"bytes,1,rep,name=conditions\"` \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time the condition + transitioned from one status to another. This should be when + the underlying condition changed. If that is not known, then + using the time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message indicating + details about the transition. This may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, if .metadata.generation + is currently 12, but the .status.conditions[x].observedGeneration + is 9, the condition is out of date with respect to the current + state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier indicating + the reason for the condition's last transition. Producers + of specific condition types may define expected values and + meanings for this field, and whether the values are considered + a guaranteed API. The value should be a CamelCase string. + This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + --- Many .condition.type values are consistent across resources + like Available, but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to deconflict is + important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + maxItems: 8 + type: array + x-kubernetes-list-map-keys: + - type + x-kubernetes-list-type: map + type: object + required: + - spec + type: object + served: true + storage: true + subresources: + status: {} diff --git a/config/crds/kustomization.yaml b/config/crds/kustomization.yaml index 3065722c..f1d66224 100644 --- a/config/crds/kustomization.yaml +++ b/config/crds/kustomization.yaml @@ -7,3 +7,4 @@ resources: - bases/externaldns.k8s.io_dnsendpoints.yaml - bases/application-networking.k8s.aws_targetgrouppolicies.yaml - bases/application-networking.k8s.aws_vpcassociationpolicies.yaml + - bases/application-networking.k8s.aws_accesslogpolicies.yaml diff --git a/config/rbac/cluster-role-controller.yaml b/config/rbac/cluster-role-controller.yaml index e728b747..f25eb4cf 100644 --- a/config/rbac/cluster-role-controller.yaml +++ b/config/rbac/cluster-role-controller.yaml @@ -311,4 +311,30 @@ rules: resources: - vpcassociationpolicies/finalizers verbs: - - update \ No newline at end of file + - update +- apiGroups: + - application-networking.k8s.aws + resources: + - accesslogpolicies + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - application-networking.k8s.aws + resources: + - accesslogpolicies/finalizers + verbs: + - update +- apiGroups: + - application-networking.k8s.aws + resources: + - accesslogpolicies/status + verbs: + - get + - patch + - update diff --git a/docs/developer.md b/docs/developer.md index 42edaeea..2bab07a1 100644 --- a/docs/developer.md +++ b/docs/developer.md @@ -71,6 +71,7 @@ kubectl apply -f config/crds/bases/multicluster.x-k8s.io_serviceimports.yaml kubectl apply -f config/crds/bases/externaldns.k8s.io_dnsendpoints.yaml kubectl apply -f config/crds/bases/application-networking.k8s.aws_targetgrouppolicies.yaml kubectl apply -f config/crds/bases/application-networking.k8s.aws_vpcassociationpolicies.yaml +kubectl apply -f config/crds/bases/application-networking.k8s.aws_accesslogpolicies.yaml kubectl apply -f examples/gatewayclass.yaml ``` diff --git a/helm/crds/application-networking.k8s.aws_accesslogpolicies.yaml b/helm/crds/application-networking.k8s.aws_accesslogpolicies.yaml new file mode 100644 index 00000000..75f57f25 --- /dev/null +++ b/helm/crds/application-networking.k8s.aws_accesslogpolicies.yaml @@ -0,0 +1,196 @@ +--- +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.13.0 + name: accesslogpolicies.application-networking.k8s.aws +spec: + group: application-networking.k8s.aws + names: + categories: + - gateway-api + kind: AccessLogPolicy + listKind: AccessLogPolicyList + plural: accesslogpolicies + shortNames: + - alp + singular: accesslogpolicy + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1alpha1 + schema: + openAPIV3Schema: + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: AccessLogPolicySpec defines the desired state of AccessLogPolicy. + properties: + destinationArn: + description: "The Amazon Resource Name (ARN) of the destination that + will store access logs. Supported values are S3 Bucket, CloudWatch + Log Group, and Firehose Delivery Stream ARNs. \n Changes to this + value results in replacement of the VPC Lattice Access Log Subscription." + pattern: ^arn(:[a-z0-9]+([.-][a-z0-9]+)*){2}(:([a-z0-9]+([.-][a-z0-9]+)*)?){2}:([^/].*)? + type: string + targetRef: + description: "TargetRef points to the Kubernetes Gateway, HTTPRoute, + or GRPCRoute resource that will have this policy attached. \n This + field is following the guidelines of Kubernetes Gateway API policy + attachment." + properties: + group: + description: Group is the group of the target resource. + maxLength: 253 + pattern: ^$|^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + kind: + description: Kind is kind of the target resource. + maxLength: 63 + minLength: 1 + pattern: ^[a-zA-Z]([-a-zA-Z0-9]*[a-zA-Z0-9])?$ + type: string + name: + description: Name is the name of the target resource. + maxLength: 253 + minLength: 1 + type: string + namespace: + description: Namespace is the namespace of the referent. When + unspecified, the local namespace is inferred. Even when policy + targets a resource in a different namespace, it MUST only apply + to traffic originating from the same namespace as the policy. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + required: + - group + - kind + - name + type: object + required: + - targetRef + type: object + status: + default: + conditions: + - lastTransitionTime: "1970-01-01T00:00:00Z" + message: Waiting for controller + reason: NotReconciled + status: Unknown + type: Accepted + description: Status defines the current state of AccessLogPolicy. + properties: + conditions: + default: + - lastTransitionTime: "1970-01-01T00:00:00Z" + message: Waiting for controller + reason: Pending + status: Unknown + type: Accepted + - lastTransitionTime: "1970-01-01T00:00:00Z" + message: Waiting for controller + reason: Pending + status: Unknown + type: Programmed + description: "Conditions describe the current conditions of the AccessLogPolicy. + \n Implementations should prefer to express Policy conditions using + the `PolicyConditionType` and `PolicyConditionReason` constants + so that operators and tools can converge on a common vocabulary + to describe AccessLogPolicy state. \n Known condition types are: + \n * \"Accepted\" * \"Ready\"" + items: + description: "Condition contains details for one aspect of the current + state of this API Resource. --- This struct is intended for direct + use as an array at the field path .status.conditions. For example, + \n type FooStatus struct{ // Represents the observations of a + foo's current state. // Known .status.conditions.type are: \"Available\", + \"Progressing\", and \"Degraded\" // +patchMergeKey=type // +patchStrategy=merge + // +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" patchMergeKey:\"type\" + protobuf:\"bytes,1,rep,name=conditions\"` \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time the condition + transitioned from one status to another. This should be when + the underlying condition changed. If that is not known, then + using the time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message indicating + details about the transition. This may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, if .metadata.generation + is currently 12, but the .status.conditions[x].observedGeneration + is 9, the condition is out of date with respect to the current + state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier indicating + the reason for the condition's last transition. Producers + of specific condition types may define expected values and + meanings for this field, and whether the values are considered + a guaranteed API. The value should be a CamelCase string. + This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + --- Many .condition.type values are consistent across resources + like Available, but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to deconflict is + important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + maxItems: 8 + type: array + x-kubernetes-list-map-keys: + - type + x-kubernetes-list-type: map + type: object + required: + - spec + type: object + served: true + storage: true + subresources: + status: {} diff --git a/helm/templates/cluster-role-controller.yaml b/helm/templates/cluster-role-controller.yaml index 695f28bb..8336d0e0 100644 --- a/helm/templates/cluster-role-controller.yaml +++ b/helm/templates/cluster-role-controller.yaml @@ -327,3 +327,21 @@ rules: - vpcassociationpolicies/finalizers verbs: - update +- apiGroups: + - application-networking.k8s.aws + resources: + - accesslogpolicies + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - application-networking.k8s.aws + resources: + - accesslogpolicies/finalizers + verbs: + - update \ No newline at end of file diff --git a/pkg/apis/applicationnetworking/v1alpha1/accesslogpolicy_types.go b/pkg/apis/applicationnetworking/v1alpha1/accesslogpolicy_types.go new file mode 100644 index 00000000..5fd7fa2a --- /dev/null +++ b/pkg/apis/applicationnetworking/v1alpha1/accesslogpolicy_types.go @@ -0,0 +1,94 @@ +package v1alpha1 + +import ( + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" + "k8s.io/apimachinery/pkg/types" + "sigs.k8s.io/gateway-api/apis/v1alpha2" + + "github.com/aws/aws-application-networking-k8s/pkg/k8s" + "github.com/aws/aws-application-networking-k8s/pkg/model/core" +) + +const ( + AccessLogPolicyKind = "AccessLogPolicy" +) + +// +genclient +// +kubebuilder:object:root=true +// +kubebuilder:resource:categories=gateway-api,shortName=alp +// +kubebuilder:storageversion +// +kubebuilder:printcolumn:name="Age",type=date,JSONPath=`.metadata.creationTimestamp` +// +kubebuilder:subresource:status +type AccessLogPolicy struct { + metav1.TypeMeta `json:",inline"` + metav1.ObjectMeta `json:"metadata,omitempty"` + + Spec AccessLogPolicySpec `json:"spec"` + + // Status defines the current state of AccessLogPolicy. + // + // +kubebuilder:default={conditions: {{type: "Accepted", status: "Unknown", reason:"NotReconciled", message:"Waiting for controller", lastTransitionTime: "1970-01-01T00:00:00Z"}}} + Status AccessLogPolicyStatus `json:"status,omitempty"` +} + +// +kubebuilder:object:root=true +// AccessLogPolicyList contains a list of AccessLogPolicies. +type AccessLogPolicyList struct { + metav1.TypeMeta `json:",inline"` + metav1.ListMeta `json:"metadata,omitempty"` + Items []AccessLogPolicy `json:"items"` +} + +// AccessLogPolicySpec defines the desired state of AccessLogPolicy. +type AccessLogPolicySpec struct { + // The Amazon Resource Name (ARN) of the destination that will store access logs. + // Supported values are S3 Bucket, CloudWatch Log Group, and Firehose Delivery Stream ARNs. + // + // Changes to this value results in replacement of the VPC Lattice Access Log Subscription. + // +optional + // +kubebuilder:validation:Pattern=`^arn(:[a-z0-9]+([.-][a-z0-9]+)*){2}(:([a-z0-9]+([.-][a-z0-9]+)*)?){2}:([^/].*)?` + DestinationArn *string `json:"destinationArn,omitempty"` + + // TargetRef points to the Kubernetes Gateway, HTTPRoute, or GRPCRoute resource that will have this policy attached. + // + // This field is following the guidelines of Kubernetes Gateway API policy attachment. + TargetRef *v1alpha2.PolicyTargetReference `json:"targetRef"` +} + +// AccessLogPolicyStatus defines the observed state of AccessLogPolicy. +type AccessLogPolicyStatus struct { + // Conditions describe the current conditions of the AccessLogPolicy. + // + // Implementations should prefer to express Policy conditions + // using the `PolicyConditionType` and `PolicyConditionReason` + // constants so that operators and tools can converge on a common + // vocabulary to describe AccessLogPolicy state. + // + // Known condition types are: + // + // * "Accepted" + // * "Ready" + // + // +optional + // +listType=map + // +listMapKey=type + // +kubebuilder:validation:MaxItems=8 + // +kubebuilder:default={{type: "Accepted", status: "Unknown", reason:"Pending", message:"Waiting for controller", lastTransitionTime: "1970-01-01T00:00:00Z"},{type: "Programmed", status: "Unknown", reason:"Pending", message:"Waiting for controller", lastTransitionTime: "1970-01-01T00:00:00Z"}} + Conditions []metav1.Condition `json:"conditions,omitempty"` +} + +func (p *AccessLogPolicy) GetTargetRef() *v1alpha2.PolicyTargetReference { + return p.Spec.TargetRef +} + +func (p *AccessLogPolicy) GetNamespacedName() types.NamespacedName { + return k8s.NamespacedName(p) +} + +func (pl *AccessLogPolicyList) GetItems() []core.Policy { + items := make([]core.Policy, len(pl.Items)) + for i, item := range pl.Items { + items[i] = &item + } + return items +} diff --git a/pkg/apis/applicationnetworking/v1alpha1/zz_generated.deepcopy.go b/pkg/apis/applicationnetworking/v1alpha1/zz_generated.deepcopy.go index 9d83c8d0..d09d8f91 100644 --- a/pkg/apis/applicationnetworking/v1alpha1/zz_generated.deepcopy.go +++ b/pkg/apis/applicationnetworking/v1alpha1/zz_generated.deepcopy.go @@ -5,10 +5,117 @@ package v1alpha1 import ( + "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" "sigs.k8s.io/gateway-api/apis/v1alpha2" ) +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *AccessLogPolicy) DeepCopyInto(out *AccessLogPolicy) { + *out = *in + out.TypeMeta = in.TypeMeta + in.ObjectMeta.DeepCopyInto(&out.ObjectMeta) + in.Spec.DeepCopyInto(&out.Spec) + in.Status.DeepCopyInto(&out.Status) +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AccessLogPolicy. +func (in *AccessLogPolicy) DeepCopy() *AccessLogPolicy { + if in == nil { + return nil + } + out := new(AccessLogPolicy) + in.DeepCopyInto(out) + return out +} + +// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object. +func (in *AccessLogPolicy) DeepCopyObject() runtime.Object { + if c := in.DeepCopy(); c != nil { + return c + } + return nil +} + +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *AccessLogPolicyList) DeepCopyInto(out *AccessLogPolicyList) { + *out = *in + out.TypeMeta = in.TypeMeta + in.ListMeta.DeepCopyInto(&out.ListMeta) + if in.Items != nil { + in, out := &in.Items, &out.Items + *out = make([]AccessLogPolicy, len(*in)) + for i := range *in { + (*in)[i].DeepCopyInto(&(*out)[i]) + } + } +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AccessLogPolicyList. +func (in *AccessLogPolicyList) DeepCopy() *AccessLogPolicyList { + if in == nil { + return nil + } + out := new(AccessLogPolicyList) + in.DeepCopyInto(out) + return out +} + +// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object. +func (in *AccessLogPolicyList) DeepCopyObject() runtime.Object { + if c := in.DeepCopy(); c != nil { + return c + } + return nil +} + +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *AccessLogPolicySpec) DeepCopyInto(out *AccessLogPolicySpec) { + *out = *in + if in.DestinationArn != nil { + in, out := &in.DestinationArn, &out.DestinationArn + *out = new(string) + **out = **in + } + if in.TargetRef != nil { + in, out := &in.TargetRef, &out.TargetRef + *out = new(v1alpha2.PolicyTargetReference) + (*in).DeepCopyInto(*out) + } +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AccessLogPolicySpec. +func (in *AccessLogPolicySpec) DeepCopy() *AccessLogPolicySpec { + if in == nil { + return nil + } + out := new(AccessLogPolicySpec) + in.DeepCopyInto(out) + return out +} + +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *AccessLogPolicyStatus) DeepCopyInto(out *AccessLogPolicyStatus) { + *out = *in + if in.Conditions != nil { + in, out := &in.Conditions, &out.Conditions + *out = make([]v1.Condition, len(*in)) + for i := range *in { + (*in)[i].DeepCopyInto(&(*out)[i]) + } + } +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AccessLogPolicyStatus. +func (in *AccessLogPolicyStatus) DeepCopy() *AccessLogPolicyStatus { + if in == nil { + return nil + } + out := new(AccessLogPolicyStatus) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *HealthCheckConfig) DeepCopyInto(out *HealthCheckConfig) { *out = *in diff --git a/pkg/apis/applicationnetworking/v1alpha1/zz_generated.register.go b/pkg/apis/applicationnetworking/v1alpha1/zz_generated.register.go index 3ee000e2..f1f91b55 100644 --- a/pkg/apis/applicationnetworking/v1alpha1/zz_generated.register.go +++ b/pkg/apis/applicationnetworking/v1alpha1/zz_generated.register.go @@ -57,6 +57,8 @@ func init() { // Adds the list of known types to Scheme. func addKnownTypes(scheme *runtime.Scheme) error { scheme.AddKnownTypes(SchemeGroupVersion, + &AccessLogPolicy{}, + &AccessLogPolicyList{}, &TargetGroupPolicy{}, &TargetGroupPolicyList{}, &VpcAssociationPolicy{},