From e8a527823a8738fcaea0e439cab08257ec5a8115 Mon Sep 17 00:00:00 2001 From: sujeet01 Date: Mon, 11 Nov 2024 14:22:03 +0530 Subject: [PATCH] Upgrade k8s to `v0.30.4` and `controller-runtime` to `v0.18.5` - Refactor code to handle breaking changes - Run make generate to regenerate code - Update import paths for compatibility --- api/core/v1alpha1/zz_generated.defaults.go | 20 + .../controllers/controllers_suite_test.go | 2 +- apinetlet/controllers/conversion.go | 12 +- .../controllers/loadbalancer_controller.go | 11 +- .../controllers/natgateway_controller.go | 16 +- apinetlet/controllers/network_controller.go | 7 +- .../networkinterface_controller.go | 7 +- .../controllers/networkpolicy_controller.go | 25 +- apinetlet/controllers/virtualip_controller.go | 9 +- .../core/v1alpha1/daemonset.go | 2 +- .../core/v1alpha1/daemonsetspec.go | 2 +- .../core/v1alpha1/instance.go | 2 +- .../core/v1alpha1/instanceaffinityterm.go | 2 +- .../core/v1alpha1/instancetemplate.go | 2 +- .../applyconfigurations/core/v1alpha1/ip.go | 2 +- .../core/v1alpha1/ipaddress.go | 2 +- .../core/v1alpha1/loadbalancer.go | 2 +- .../core/v1alpha1/loadbalancerrouting.go | 2 +- .../core/v1alpha1/loadbalancerspec.go | 2 +- .../core/v1alpha1/natgateway.go | 2 +- .../core/v1alpha1/natgatewayautoscaler.go | 2 +- .../core/v1alpha1/nattable.go | 2 +- .../core/v1alpha1/network.go | 2 +- .../core/v1alpha1/networkid.go | 2 +- .../core/v1alpha1/networkinterface.go | 2 +- .../core/v1alpha1/networkpolicy.go | 2 +- .../core/v1alpha1/networkpolicyrule.go | 2 +- .../core/v1alpha1/networkpolicyspec.go | 2 +- .../core/v1alpha1/networkpolicytargetref.go | 39 - .../applyconfigurations/core/v1alpha1/node.go | 2 +- .../core/v1alpha1/objectselector.go | 2 +- .../core/v1alpha1/topologyspreadconstraint.go | 2 +- .../applyconfigurations/internal/internal.go | 1 + .../meta/v1/labelselector.go | 46 - .../meta/v1/labelselectorrequirement.go | 50 - .../meta/v1/managedfieldsentry.go | 84 -- .../applyconfigurations/meta/v1/objectmeta.go | 158 ---- .../meta/v1/ownerreference.go | 75 -- .../applyconfigurations/meta/v1/typemeta.go | 35 - client-go/applyconfigurations/utils.go | 16 - .../{ => externalversions}/core/interface.go | 4 +- .../core/v1alpha1/daemonset.go | 10 +- .../core/v1alpha1/instance.go | 10 +- .../core/v1alpha1/interface.go | 2 +- .../core/v1alpha1/ip.go | 10 +- .../core/v1alpha1/ipaddress.go | 10 +- .../core/v1alpha1/loadbalancer.go | 10 +- .../core/v1alpha1/loadbalancerrouting.go | 10 +- .../core/v1alpha1/natgateway.go | 10 +- .../core/v1alpha1/natgatewayautoscaler.go | 10 +- .../core/v1alpha1/nattable.go | 10 +- .../core/v1alpha1/network.go | 10 +- .../core/v1alpha1/networkid.go | 10 +- .../core/v1alpha1/networkinterface.go | 10 +- .../core/v1alpha1/networkpolicy.go | 10 +- .../core/v1alpha1/networkpolicyrule.go | 10 +- .../core/v1alpha1/node.go | 10 +- .../{ => externalversions}/factory.go | 16 +- .../{ => externalversions}/generic.go | 2 +- .../internalinterfaces/factory_interfaces.go | 6 +- .../ironcorenet/{ => versioned}/clientset.go | 4 +- .../fake/clientset_generated.go | 6 +- .../ironcorenet/{ => versioned}/fake/doc.go | 0 .../{ => versioned}/fake/register.go | 0 .../ironcorenet/{ => versioned}/scheme/doc.go | 0 .../{ => versioned}/scheme/register.go | 0 .../typed/core/v1alpha1/core_client.go | 2 +- .../typed/core/v1alpha1/daemonset.go | 2 +- .../typed/core/v1alpha1/doc.go | 0 .../typed/core/v1alpha1/fake/doc.go | 0 .../core/v1alpha1/fake/fake_core_client.go | 2 +- .../core/v1alpha1/fake/fake_daemonset.go | 0 .../typed/core/v1alpha1/fake/fake_instance.go | 0 .../typed/core/v1alpha1/fake/fake_ip.go | 0 .../core/v1alpha1/fake/fake_ipaddress.go | 0 .../core/v1alpha1/fake/fake_loadbalancer.go | 0 .../v1alpha1/fake/fake_loadbalancerrouting.go | 0 .../core/v1alpha1/fake/fake_natgateway.go | 0 .../fake/fake_natgatewayautoscaler.go | 0 .../typed/core/v1alpha1/fake/fake_nattable.go | 0 .../typed/core/v1alpha1/fake/fake_network.go | 0 .../core/v1alpha1/fake/fake_networkid.go | 0 .../v1alpha1/fake/fake_networkinterface.go | 0 .../core/v1alpha1/fake/fake_networkpolicy.go | 0 .../v1alpha1/fake/fake_networkpolicyrule.go | 0 .../typed/core/v1alpha1/fake/fake_node.go | 0 .../core/v1alpha1/generated_expansion.go | 0 .../typed/core/v1alpha1/instance.go | 2 +- .../{ => versioned}/typed/core/v1alpha1/ip.go | 2 +- .../typed/core/v1alpha1/ipaddress.go | 2 +- .../typed/core/v1alpha1/loadbalancer.go | 2 +- .../core/v1alpha1/loadbalancerrouting.go | 2 +- .../typed/core/v1alpha1/natgateway.go | 2 +- .../core/v1alpha1/natgatewayautoscaler.go | 2 +- .../typed/core/v1alpha1/nattable.go | 2 +- .../typed/core/v1alpha1/network.go | 2 +- .../typed/core/v1alpha1/networkid.go | 2 +- .../typed/core/v1alpha1/networkinterface.go | 2 +- .../typed/core/v1alpha1/networkpolicy.go | 2 +- .../typed/core/v1alpha1/networkpolicyrule.go | 2 +- .../typed/core/v1alpha1/node.go | 2 +- client-go/openapi/api_violations.report | 124 --- client-go/openapi/zz_generated.openapi.go | 889 +++++++++++++++++- cmd/apinetlet/main.go | 2 +- go.mod | 29 +- go.sum | 56 +- hack/tools.go | 13 + internal/apis/core/zz_generated.defaults.go | 20 + internal/apiserver/apiserver.go | 4 +- internal/app/apiserver/apiserver.go | 4 +- .../ipaddressallocator/ipaddressallocator.go | 4 +- internal/registry/ipallocator/ipallocator.go | 4 +- .../networkidallocator/networkidallocator.go | 4 +- .../controllers/instance_controller.go | 7 +- .../controllers/metalnetnode_controller.go | 7 +- metalnetlet/controllers/network_controller.go | 7 +- .../networkinterface_controller.go | 14 +- 117 files changed, 1171 insertions(+), 898 deletions(-) create mode 100644 api/core/v1alpha1/zz_generated.defaults.go delete mode 100644 client-go/applyconfigurations/core/v1alpha1/networkpolicytargetref.go delete mode 100644 client-go/applyconfigurations/meta/v1/labelselector.go delete mode 100644 client-go/applyconfigurations/meta/v1/labelselectorrequirement.go delete mode 100644 client-go/applyconfigurations/meta/v1/managedfieldsentry.go delete mode 100644 client-go/applyconfigurations/meta/v1/objectmeta.go delete mode 100644 client-go/applyconfigurations/meta/v1/ownerreference.go delete mode 100644 client-go/applyconfigurations/meta/v1/typemeta.go rename client-go/informers/{ => externalversions}/core/interface.go (92%) rename client-go/informers/{ => externalversions}/core/v1alpha1/daemonset.go (81%) rename client-go/informers/{ => externalversions}/core/v1alpha1/instance.go (81%) rename client-go/informers/{ => externalversions}/core/v1alpha1/interface.go (99%) rename client-go/informers/{ => externalversions}/core/v1alpha1/ip.go (80%) rename client-go/informers/{ => externalversions}/core/v1alpha1/ipaddress.go (81%) rename client-go/informers/{ => externalversions}/core/v1alpha1/loadbalancer.go (81%) rename client-go/informers/{ => externalversions}/core/v1alpha1/loadbalancerrouting.go (80%) rename client-go/informers/{ => externalversions}/core/v1alpha1/natgateway.go (81%) rename client-go/informers/{ => externalversions}/core/v1alpha1/natgatewayautoscaler.go (80%) rename client-go/informers/{ => externalversions}/core/v1alpha1/nattable.go (81%) rename client-go/informers/{ => externalversions}/core/v1alpha1/network.go (81%) rename client-go/informers/{ => externalversions}/core/v1alpha1/networkid.go (81%) rename client-go/informers/{ => externalversions}/core/v1alpha1/networkinterface.go (80%) rename client-go/informers/{ => externalversions}/core/v1alpha1/networkpolicy.go (80%) rename client-go/informers/{ => externalversions}/core/v1alpha1/networkpolicyrule.go (80%) rename client-go/informers/{ => externalversions}/core/v1alpha1/node.go (80%) rename client-go/informers/{ => externalversions}/factory.go (92%) rename client-go/informers/{ => externalversions}/generic.go (99%) rename client-go/informers/{ => externalversions}/internalinterfaces/factory_interfaces.go (73%) rename client-go/ironcorenet/{ => versioned}/clientset.go (98%) rename client-go/ironcorenet/{ => versioned}/fake/clientset_generated.go (95%) rename client-go/ironcorenet/{ => versioned}/fake/doc.go (100%) rename client-go/ironcorenet/{ => versioned}/fake/register.go (100%) rename client-go/ironcorenet/{ => versioned}/scheme/doc.go (100%) rename client-go/ironcorenet/{ => versioned}/scheme/register.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/core_client.go (98%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/daemonset.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/doc.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/doc.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_core_client.go (98%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_daemonset.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_instance.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_ip.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_ipaddress.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_loadbalancer.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_loadbalancerrouting.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_natgateway.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_natgatewayautoscaler.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_nattable.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_network.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_networkid.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_networkinterface.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_networkpolicy.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_networkpolicyrule.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/fake/fake_node.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/generated_expansion.go (100%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/instance.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/ip.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/ipaddress.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/loadbalancer.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/loadbalancerrouting.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/natgateway.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/natgatewayautoscaler.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/nattable.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/network.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/networkid.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/networkinterface.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/networkpolicy.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/networkpolicyrule.go (99%) rename client-go/ironcorenet/{ => versioned}/typed/core/v1alpha1/node.go (99%) create mode 100644 hack/tools.go create mode 100644 internal/apis/core/zz_generated.defaults.go diff --git a/api/core/v1alpha1/zz_generated.defaults.go b/api/core/v1alpha1/zz_generated.defaults.go new file mode 100644 index 00000000..d1bc6c99 --- /dev/null +++ b/api/core/v1alpha1/zz_generated.defaults.go @@ -0,0 +1,20 @@ +//go:build !ignore_autogenerated +// +build !ignore_autogenerated + +// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors +// SPDX-License-Identifier: Apache-2.0 + +// Code generated by defaulter-gen. DO NOT EDIT. + +package v1alpha1 + +import ( + runtime "k8s.io/apimachinery/pkg/runtime" +) + +// RegisterDefaults adds defaulters functions to the given scheme. +// Public to allow building arbitrary schemes. +// All generated defaulters are covering - they call all nested defaulters. +func RegisterDefaults(scheme *runtime.Scheme) error { + return nil +} diff --git a/apinetlet/controllers/controllers_suite_test.go b/apinetlet/controllers/controllers_suite_test.go index 70827994..4a170f54 100644 --- a/apinetlet/controllers/controllers_suite_test.go +++ b/apinetlet/controllers/controllers_suite_test.go @@ -17,7 +17,7 @@ import ( apinetclient "github.com/ironcore-dev/ironcore-net/internal/client" apinetv1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" ipamv1alpha1 "github.com/ironcore-dev/ironcore/api/ipam/v1alpha1" networkingv1alpha1 "github.com/ironcore-dev/ironcore/api/networking/v1alpha1" envtestutils "github.com/ironcore-dev/ironcore/utils/envtest" diff --git a/apinetlet/controllers/conversion.go b/apinetlet/controllers/conversion.go index b14c717b..34100287 100644 --- a/apinetlet/controllers/conversion.go +++ b/apinetlet/controllers/conversion.go @@ -11,7 +11,7 @@ import ( apinetv1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" "github.com/ironcore-dev/ironcore-net/apimachinery/api/net" apinetv1alpha1ac "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - apinetmetav1ac "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" + metav1ac "k8s.io/client-go/applyconfigurations/meta/v1" commonv1alpha1 "github.com/ironcore-dev/ironcore/api/common/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore/api/core/v1alpha1" @@ -163,10 +163,10 @@ func translateObjectSelector(objSel *corev1alpha1.ObjectSelector) *apinetv1alpha WithMatchExpressions(translateLabelSelectorRequirements(objSel.MatchExpressions)...) } -func translateLabelSelectorRequirements(reqs []metav1.LabelSelectorRequirement) []*apinetmetav1ac.LabelSelectorRequirementApplyConfiguration { - var translated []*apinetmetav1ac.LabelSelectorRequirementApplyConfiguration +func translateLabelSelectorRequirements(reqs []metav1.LabelSelectorRequirement) []*metav1ac.LabelSelectorRequirementApplyConfiguration { + var translated []*metav1ac.LabelSelectorRequirementApplyConfiguration for _, req := range reqs { - translated = append(translated, apinetmetav1ac.LabelSelectorRequirement(). + translated = append(translated, metav1ac.LabelSelectorRequirement(). WithKey(req.Key). WithOperator(req.Operator). WithValues(req.Values...)) @@ -174,8 +174,8 @@ func translateLabelSelectorRequirements(reqs []metav1.LabelSelectorRequirement) return translated } -func translateLabelSelector(labelSelector metav1.LabelSelector) *apinetmetav1ac.LabelSelectorApplyConfiguration { - return apinetmetav1ac.LabelSelector(). +func translateLabelSelector(labelSelector metav1.LabelSelector) *metav1ac.LabelSelectorApplyConfiguration { + return metav1ac.LabelSelector(). WithMatchLabels(labelSelector.MatchLabels). WithMatchExpressions(translateLabelSelectorRequirements(labelSelector.MatchExpressions)...) } diff --git a/apinetlet/controllers/loadbalancer_controller.go b/apinetlet/controllers/loadbalancer_controller.go index 2d835df3..a98f6291 100644 --- a/apinetlet/controllers/loadbalancer_controller.go +++ b/apinetlet/controllers/loadbalancer_controller.go @@ -17,8 +17,8 @@ import ( apinetlethandler "github.com/ironcore-dev/ironcore-net/apinetlet/handler" "github.com/ironcore-dev/ironcore-net/apinetlet/provider" apinetv1alpha1ac "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - metav1ac "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" - "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" + metav1ac "k8s.io/client-go/applyconfigurations/meta/v1" "github.com/ironcore-dev/controller-utils/clientutils" commonv1alpha1 "github.com/ironcore-dev/ironcore/api/common/v1alpha1" @@ -342,8 +342,11 @@ func (r *LoadBalancerReconciler) SetupWithManager(mgr ctrl.Manager, apiNetCache ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.LoadBalancer{}), - apinetlethandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &networkingv1alpha1.LoadBalancer{}), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.LoadBalancer{}, + apinetlethandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &networkingv1alpha1.LoadBalancer{}), + ), ). Owns(&ipamv1alpha1.Prefix{}). Watches( diff --git a/apinetlet/controllers/natgateway_controller.go b/apinetlet/controllers/natgateway_controller.go index e0bec271..5c3c3c5d 100644 --- a/apinetlet/controllers/natgateway_controller.go +++ b/apinetlet/controllers/natgateway_controller.go @@ -14,7 +14,7 @@ import ( apinetletclient "github.com/ironcore-dev/ironcore-net/apinetlet/client" "github.com/ironcore-dev/ironcore-net/apinetlet/handler" apinetv1alpha1ac "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" "github.com/ironcore-dev/controller-utils/clientutils" commonv1alpha1 "github.com/ironcore-dev/ironcore/api/common/v1alpha1" @@ -215,12 +215,18 @@ func (r *NATGatewayReconciler) SetupWithManager(mgr ctrl.Manager, apiNetCache ca ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.NATGateway{}), - handler.EnqueueRequestForSource(mgr.GetScheme(), mgr.GetRESTMapper(), &networkingv1alpha1.NATGateway{}), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.NATGateway{}, + handler.EnqueueRequestForSource(mgr.GetScheme(), mgr.GetRESTMapper(), &networkingv1alpha1.NATGateway{}), + ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.NATGatewayAutoscaler{}), - handler.EnqueueRequestForSource(mgr.GetScheme(), mgr.GetRESTMapper(), &networkingv1alpha1.NATGateway{}), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.NATGatewayAutoscaler{}, + handler.EnqueueRequestForSource(mgr.GetScheme(), mgr.GetRESTMapper(), &networkingv1alpha1.NATGateway{}), + ), ). Complete(r) } diff --git a/apinetlet/controllers/network_controller.go b/apinetlet/controllers/network_controller.go index ad16afe9..694adc21 100644 --- a/apinetlet/controllers/network_controller.go +++ b/apinetlet/controllers/network_controller.go @@ -307,8 +307,11 @@ func (r *NetworkReconciler) SetupWithManager(mgr ctrl.Manager, apiNetCache cache ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.Network{}), - handler.EnqueueRequestForSource(mgr.GetScheme(), mgr.GetRESTMapper(), &networkingv1alpha1.Network{}), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.Network{}, + handler.EnqueueRequestForSource(mgr.GetScheme(), mgr.GetRESTMapper(), &networkingv1alpha1.Network{}), + ), ). Complete(r) } diff --git a/apinetlet/controllers/networkinterface_controller.go b/apinetlet/controllers/networkinterface_controller.go index 462c8f82..a3e1c17c 100644 --- a/apinetlet/controllers/networkinterface_controller.go +++ b/apinetlet/controllers/networkinterface_controller.go @@ -581,8 +581,11 @@ func (r *NetworkInterfaceReconciler) SetupWithManager(mgr ctrl.Manager, apiNetCa ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.NetworkInterface{}), - apinetlethandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &networkingv1alpha1.NetworkInterface{}), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.NetworkInterface{}, + apinetlethandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &networkingv1alpha1.NetworkInterface{}), + ), ). Owns(&ipamv1alpha1.Prefix{}). Watches( diff --git a/apinetlet/controllers/networkpolicy_controller.go b/apinetlet/controllers/networkpolicy_controller.go index a0704107..588c0275 100644 --- a/apinetlet/controllers/networkpolicy_controller.go +++ b/apinetlet/controllers/networkpolicy_controller.go @@ -15,7 +15,7 @@ import ( apinetletclient "github.com/ironcore-dev/ironcore-net/apinetlet/client" apinetlethandler "github.com/ironcore-dev/ironcore-net/apinetlet/handler" apinetv1alpha1ac "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" apinetclient "github.com/ironcore-dev/ironcore-net/internal/client" "github.com/ironcore-dev/controller-utils/clientutils" @@ -576,17 +576,26 @@ func (r *NetworkPolicyReconciler) SetupWithManager(mgr ctrl.Manager, apiNetCache ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.NetworkPolicy{}), - apinetlethandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &networkingv1alpha1.NetworkPolicy{}), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.NetworkPolicy{}, + apinetlethandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &networkingv1alpha1.NetworkPolicy{}), + ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.Network{}), - r.enqueueByNetwork(), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.Network{}, + r.enqueueByNetwork(), + ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.NetworkInterface{}), - r.enqueueByNetworkInterface(), - builder.WithPredicates(r.networkInterfaceReadyPredicate()), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.NetworkInterface{}, + r.enqueueByNetworkInterface(), + r.networkInterfaceReadyPredicate(), + ), ). Complete(r) } diff --git a/apinetlet/controllers/virtualip_controller.go b/apinetlet/controllers/virtualip_controller.go index 562af82f..714a69a0 100644 --- a/apinetlet/controllers/virtualip_controller.go +++ b/apinetlet/controllers/virtualip_controller.go @@ -14,7 +14,7 @@ import ( apinetletclient "github.com/ironcore-dev/ironcore-net/apinetlet/client" "github.com/ironcore-dev/ironcore-net/apinetlet/handler" apinetv1alpha1ac "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" "github.com/ironcore-dev/controller-utils/clientutils" commonv1alpha1 "github.com/ironcore-dev/ironcore/api/common/v1alpha1" @@ -204,8 +204,11 @@ func (r *VirtualIPReconciler) SetupWithManager(mgr ctrl.Manager, apiNetCache cac ), ). WatchesRawSource( - source.Kind(apiNetCache, &apinetv1alpha1.IP{}), - handler.EnqueueRequestForSource(r.Scheme(), mgr.GetRESTMapper(), &networkingv1alpha1.VirtualIP{}), + source.Kind[client.Object]( + apiNetCache, + &apinetv1alpha1.IP{}, + handler.EnqueueRequestForSource(r.Scheme(), mgr.GetRESTMapper(), &networkingv1alpha1.VirtualIP{}), + ), ). Complete(r) } diff --git a/client-go/applyconfigurations/core/v1alpha1/daemonset.go b/client-go/applyconfigurations/core/v1alpha1/daemonset.go index 8629d269..cce8f4d8 100644 --- a/client-go/applyconfigurations/core/v1alpha1/daemonset.go +++ b/client-go/applyconfigurations/core/v1alpha1/daemonset.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // DaemonSetApplyConfiguration represents an declarative configuration of the DaemonSet type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/daemonsetspec.go b/client-go/applyconfigurations/core/v1alpha1/daemonsetspec.go index 45c2f45a..be41f725 100644 --- a/client-go/applyconfigurations/core/v1alpha1/daemonsetspec.go +++ b/client-go/applyconfigurations/core/v1alpha1/daemonsetspec.go @@ -6,7 +6,7 @@ package v1alpha1 import ( - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // DaemonSetSpecApplyConfiguration represents an declarative configuration of the DaemonSetSpec type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/instance.go b/client-go/applyconfigurations/core/v1alpha1/instance.go index 7b24d2b6..eafeeeb3 100644 --- a/client-go/applyconfigurations/core/v1alpha1/instance.go +++ b/client-go/applyconfigurations/core/v1alpha1/instance.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // InstanceApplyConfiguration represents an declarative configuration of the Instance type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/instanceaffinityterm.go b/client-go/applyconfigurations/core/v1alpha1/instanceaffinityterm.go index 3e1fe839..3d632f95 100644 --- a/client-go/applyconfigurations/core/v1alpha1/instanceaffinityterm.go +++ b/client-go/applyconfigurations/core/v1alpha1/instanceaffinityterm.go @@ -6,7 +6,7 @@ package v1alpha1 import ( - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // InstanceAffinityTermApplyConfiguration represents an declarative configuration of the InstanceAffinityTerm type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/instancetemplate.go b/client-go/applyconfigurations/core/v1alpha1/instancetemplate.go index 48b002b3..7ce77101 100644 --- a/client-go/applyconfigurations/core/v1alpha1/instancetemplate.go +++ b/client-go/applyconfigurations/core/v1alpha1/instancetemplate.go @@ -6,9 +6,9 @@ package v1alpha1 import ( - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // InstanceTemplateApplyConfiguration represents an declarative configuration of the InstanceTemplate type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/ip.go b/client-go/applyconfigurations/core/v1alpha1/ip.go index 115845ad..0d174a11 100644 --- a/client-go/applyconfigurations/core/v1alpha1/ip.go +++ b/client-go/applyconfigurations/core/v1alpha1/ip.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // IPApplyConfiguration represents an declarative configuration of the IP type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/ipaddress.go b/client-go/applyconfigurations/core/v1alpha1/ipaddress.go index dbf2af37..2955ea27 100644 --- a/client-go/applyconfigurations/core/v1alpha1/ipaddress.go +++ b/client-go/applyconfigurations/core/v1alpha1/ipaddress.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // IPAddressApplyConfiguration represents an declarative configuration of the IPAddress type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/loadbalancer.go b/client-go/applyconfigurations/core/v1alpha1/loadbalancer.go index c2a2aeec..293fc5ec 100644 --- a/client-go/applyconfigurations/core/v1alpha1/loadbalancer.go +++ b/client-go/applyconfigurations/core/v1alpha1/loadbalancer.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // LoadBalancerApplyConfiguration represents an declarative configuration of the LoadBalancer type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/loadbalancerrouting.go b/client-go/applyconfigurations/core/v1alpha1/loadbalancerrouting.go index f3d23077..f051b1ed 100644 --- a/client-go/applyconfigurations/core/v1alpha1/loadbalancerrouting.go +++ b/client-go/applyconfigurations/core/v1alpha1/loadbalancerrouting.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // LoadBalancerRoutingApplyConfiguration represents an declarative configuration of the LoadBalancerRouting type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/loadbalancerspec.go b/client-go/applyconfigurations/core/v1alpha1/loadbalancerspec.go index 91139413..8c7e45d6 100644 --- a/client-go/applyconfigurations/core/v1alpha1/loadbalancerspec.go +++ b/client-go/applyconfigurations/core/v1alpha1/loadbalancerspec.go @@ -7,8 +7,8 @@ package v1alpha1 import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - metav1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" v1 "k8s.io/api/core/v1" + metav1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // LoadBalancerSpecApplyConfiguration represents an declarative configuration of the LoadBalancerSpec type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/natgateway.go b/client-go/applyconfigurations/core/v1alpha1/natgateway.go index e7f33684..a6ecc568 100644 --- a/client-go/applyconfigurations/core/v1alpha1/natgateway.go +++ b/client-go/applyconfigurations/core/v1alpha1/natgateway.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NATGatewayApplyConfiguration represents an declarative configuration of the NATGateway type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/natgatewayautoscaler.go b/client-go/applyconfigurations/core/v1alpha1/natgatewayautoscaler.go index 47addb03..d230d6f0 100644 --- a/client-go/applyconfigurations/core/v1alpha1/natgatewayautoscaler.go +++ b/client-go/applyconfigurations/core/v1alpha1/natgatewayautoscaler.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NATGatewayAutoscalerApplyConfiguration represents an declarative configuration of the NATGatewayAutoscaler type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/nattable.go b/client-go/applyconfigurations/core/v1alpha1/nattable.go index 7b3c0549..49996ac8 100644 --- a/client-go/applyconfigurations/core/v1alpha1/nattable.go +++ b/client-go/applyconfigurations/core/v1alpha1/nattable.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NATTableApplyConfiguration represents an declarative configuration of the NATTable type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/network.go b/client-go/applyconfigurations/core/v1alpha1/network.go index 154b6383..7e6501b5 100644 --- a/client-go/applyconfigurations/core/v1alpha1/network.go +++ b/client-go/applyconfigurations/core/v1alpha1/network.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NetworkApplyConfiguration represents an declarative configuration of the Network type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/networkid.go b/client-go/applyconfigurations/core/v1alpha1/networkid.go index 87739e01..f50bdd53 100644 --- a/client-go/applyconfigurations/core/v1alpha1/networkid.go +++ b/client-go/applyconfigurations/core/v1alpha1/networkid.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NetworkIDApplyConfiguration represents an declarative configuration of the NetworkID type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/networkinterface.go b/client-go/applyconfigurations/core/v1alpha1/networkinterface.go index db6253f6..44d9ae00 100644 --- a/client-go/applyconfigurations/core/v1alpha1/networkinterface.go +++ b/client-go/applyconfigurations/core/v1alpha1/networkinterface.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NetworkInterfaceApplyConfiguration represents an declarative configuration of the NetworkInterface type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/networkpolicy.go b/client-go/applyconfigurations/core/v1alpha1/networkpolicy.go index 0c3e3f4f..6faa6d24 100644 --- a/client-go/applyconfigurations/core/v1alpha1/networkpolicy.go +++ b/client-go/applyconfigurations/core/v1alpha1/networkpolicy.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NetworkPolicyApplyConfiguration represents an declarative configuration of the NetworkPolicy type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/networkpolicyrule.go b/client-go/applyconfigurations/core/v1alpha1/networkpolicyrule.go index f63bd8c7..d58ae236 100644 --- a/client-go/applyconfigurations/core/v1alpha1/networkpolicyrule.go +++ b/client-go/applyconfigurations/core/v1alpha1/networkpolicyrule.go @@ -8,10 +8,10 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NetworkPolicyRuleApplyConfiguration represents an declarative configuration of the NetworkPolicyRule type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/networkpolicyspec.go b/client-go/applyconfigurations/core/v1alpha1/networkpolicyspec.go index 6cf44489..61cf5c3e 100644 --- a/client-go/applyconfigurations/core/v1alpha1/networkpolicyspec.go +++ b/client-go/applyconfigurations/core/v1alpha1/networkpolicyspec.go @@ -7,8 +7,8 @@ package v1alpha1 import ( corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - metav1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" v1 "k8s.io/api/core/v1" + metav1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NetworkPolicySpecApplyConfiguration represents an declarative configuration of the NetworkPolicySpec type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/networkpolicytargetref.go b/client-go/applyconfigurations/core/v1alpha1/networkpolicytargetref.go deleted file mode 100644 index 8d60a2f5..00000000 --- a/client-go/applyconfigurations/core/v1alpha1/networkpolicytargetref.go +++ /dev/null @@ -1,39 +0,0 @@ -// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors -// SPDX-License-Identifier: Apache-2.0 - -// Code generated by applyconfiguration-gen. DO NOT EDIT. - -package v1alpha1 - -import ( - types "k8s.io/apimachinery/pkg/types" -) - -// NetworkPolicyTargetRefApplyConfiguration represents an declarative configuration of the NetworkPolicyTargetRef type for use -// with apply. -type NetworkPolicyTargetRefApplyConfiguration struct { - UID *types.UID `json:"uid,omitempty"` - Name *string `json:"name,omitempty"` -} - -// NetworkPolicyTargetRefApplyConfiguration constructs an declarative configuration of the NetworkPolicyTargetRef type for use with -// apply. -func NetworkPolicyTargetRef() *NetworkPolicyTargetRefApplyConfiguration { - return &NetworkPolicyTargetRefApplyConfiguration{} -} - -// WithUID sets the UID field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the UID field is set to the value of the last call. -func (b *NetworkPolicyTargetRefApplyConfiguration) WithUID(value types.UID) *NetworkPolicyTargetRefApplyConfiguration { - b.UID = &value - return b -} - -// WithName sets the Name field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Name field is set to the value of the last call. -func (b *NetworkPolicyTargetRefApplyConfiguration) WithName(value string) *NetworkPolicyTargetRefApplyConfiguration { - b.Name = &value - return b -} diff --git a/client-go/applyconfigurations/core/v1alpha1/node.go b/client-go/applyconfigurations/core/v1alpha1/node.go index d82d38b3..9afce131 100644 --- a/client-go/applyconfigurations/core/v1alpha1/node.go +++ b/client-go/applyconfigurations/core/v1alpha1/node.go @@ -8,10 +8,10 @@ package v1alpha1 import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" internal "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/internal" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" managedfields "k8s.io/apimachinery/pkg/util/managedfields" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // NodeApplyConfiguration represents an declarative configuration of the Node type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/objectselector.go b/client-go/applyconfigurations/core/v1alpha1/objectselector.go index 7b6ecb7f..7f9c4f79 100644 --- a/client-go/applyconfigurations/core/v1alpha1/objectselector.go +++ b/client-go/applyconfigurations/core/v1alpha1/objectselector.go @@ -6,7 +6,7 @@ package v1alpha1 import ( - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // ObjectSelectorApplyConfiguration represents an declarative configuration of the ObjectSelector type for use diff --git a/client-go/applyconfigurations/core/v1alpha1/topologyspreadconstraint.go b/client-go/applyconfigurations/core/v1alpha1/topologyspreadconstraint.go index 07150af7..620eeb57 100644 --- a/client-go/applyconfigurations/core/v1alpha1/topologyspreadconstraint.go +++ b/client-go/applyconfigurations/core/v1alpha1/topologyspreadconstraint.go @@ -7,7 +7,7 @@ package v1alpha1 import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - v1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" + v1 "k8s.io/client-go/applyconfigurations/meta/v1" ) // TopologySpreadConstraintApplyConfiguration represents an declarative configuration of the TopologySpreadConstraint type for use diff --git a/client-go/applyconfigurations/internal/internal.go b/client-go/applyconfigurations/internal/internal.go index c56e4dee..73f92e3f 100644 --- a/client-go/applyconfigurations/internal/internal.go +++ b/client-go/applyconfigurations/internal/internal.go @@ -1180,6 +1180,7 @@ var schemaYAML = typed.YAMLObject(`types: - name: name type: scalar: string + default: "" elementRelationship: atomic - name: io.k8s.apimachinery.pkg.apis.meta.v1.FieldsV1 map: diff --git a/client-go/applyconfigurations/meta/v1/labelselector.go b/client-go/applyconfigurations/meta/v1/labelselector.go deleted file mode 100644 index 34b78730..00000000 --- a/client-go/applyconfigurations/meta/v1/labelselector.go +++ /dev/null @@ -1,46 +0,0 @@ -// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors -// SPDX-License-Identifier: Apache-2.0 - -// Code generated by applyconfiguration-gen. DO NOT EDIT. - -package v1 - -// LabelSelectorApplyConfiguration represents an declarative configuration of the LabelSelector type for use -// with apply. -type LabelSelectorApplyConfiguration struct { - MatchLabels map[string]string `json:"matchLabels,omitempty"` - MatchExpressions []LabelSelectorRequirementApplyConfiguration `json:"matchExpressions,omitempty"` -} - -// LabelSelectorApplyConfiguration constructs an declarative configuration of the LabelSelector type for use with -// apply. -func LabelSelector() *LabelSelectorApplyConfiguration { - return &LabelSelectorApplyConfiguration{} -} - -// WithMatchLabels puts the entries into the MatchLabels field in the declarative configuration -// and returns the receiver, so that objects can be build by chaining "With" function invocations. -// If called multiple times, the entries provided by each call will be put on the MatchLabels field, -// overwriting an existing map entries in MatchLabels field with the same key. -func (b *LabelSelectorApplyConfiguration) WithMatchLabels(entries map[string]string) *LabelSelectorApplyConfiguration { - if b.MatchLabels == nil && len(entries) > 0 { - b.MatchLabels = make(map[string]string, len(entries)) - } - for k, v := range entries { - b.MatchLabels[k] = v - } - return b -} - -// WithMatchExpressions adds the given value to the MatchExpressions field in the declarative configuration -// and returns the receiver, so that objects can be build by chaining "With" function invocations. -// If called multiple times, values provided by each call will be appended to the MatchExpressions field. -func (b *LabelSelectorApplyConfiguration) WithMatchExpressions(values ...*LabelSelectorRequirementApplyConfiguration) *LabelSelectorApplyConfiguration { - for i := range values { - if values[i] == nil { - panic("nil value passed to WithMatchExpressions") - } - b.MatchExpressions = append(b.MatchExpressions, *values[i]) - } - return b -} diff --git a/client-go/applyconfigurations/meta/v1/labelselectorrequirement.go b/client-go/applyconfigurations/meta/v1/labelselectorrequirement.go deleted file mode 100644 index c633af8f..00000000 --- a/client-go/applyconfigurations/meta/v1/labelselectorrequirement.go +++ /dev/null @@ -1,50 +0,0 @@ -// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors -// SPDX-License-Identifier: Apache-2.0 - -// Code generated by applyconfiguration-gen. DO NOT EDIT. - -package v1 - -import ( - v1 "k8s.io/apimachinery/pkg/apis/meta/v1" -) - -// LabelSelectorRequirementApplyConfiguration represents an declarative configuration of the LabelSelectorRequirement type for use -// with apply. -type LabelSelectorRequirementApplyConfiguration struct { - Key *string `json:"key,omitempty"` - Operator *v1.LabelSelectorOperator `json:"operator,omitempty"` - Values []string `json:"values,omitempty"` -} - -// LabelSelectorRequirementApplyConfiguration constructs an declarative configuration of the LabelSelectorRequirement type for use with -// apply. -func LabelSelectorRequirement() *LabelSelectorRequirementApplyConfiguration { - return &LabelSelectorRequirementApplyConfiguration{} -} - -// WithKey sets the Key field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Key field is set to the value of the last call. -func (b *LabelSelectorRequirementApplyConfiguration) WithKey(value string) *LabelSelectorRequirementApplyConfiguration { - b.Key = &value - return b -} - -// WithOperator sets the Operator field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Operator field is set to the value of the last call. -func (b *LabelSelectorRequirementApplyConfiguration) WithOperator(value v1.LabelSelectorOperator) *LabelSelectorRequirementApplyConfiguration { - b.Operator = &value - return b -} - -// WithValues adds the given value to the Values field in the declarative configuration -// and returns the receiver, so that objects can be build by chaining "With" function invocations. -// If called multiple times, values provided by each call will be appended to the Values field. -func (b *LabelSelectorRequirementApplyConfiguration) WithValues(values ...string) *LabelSelectorRequirementApplyConfiguration { - for i := range values { - b.Values = append(b.Values, values[i]) - } - return b -} diff --git a/client-go/applyconfigurations/meta/v1/managedfieldsentry.go b/client-go/applyconfigurations/meta/v1/managedfieldsentry.go deleted file mode 100644 index de8571bb..00000000 --- a/client-go/applyconfigurations/meta/v1/managedfieldsentry.go +++ /dev/null @@ -1,84 +0,0 @@ -// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors -// SPDX-License-Identifier: Apache-2.0 - -// Code generated by applyconfiguration-gen. DO NOT EDIT. - -package v1 - -import ( - v1 "k8s.io/apimachinery/pkg/apis/meta/v1" -) - -// ManagedFieldsEntryApplyConfiguration represents an declarative configuration of the ManagedFieldsEntry type for use -// with apply. -type ManagedFieldsEntryApplyConfiguration struct { - Manager *string `json:"manager,omitempty"` - Operation *v1.ManagedFieldsOperationType `json:"operation,omitempty"` - APIVersion *string `json:"apiVersion,omitempty"` - Time *v1.Time `json:"time,omitempty"` - FieldsType *string `json:"fieldsType,omitempty"` - FieldsV1 *v1.FieldsV1 `json:"fieldsV1,omitempty"` - Subresource *string `json:"subresource,omitempty"` -} - -// ManagedFieldsEntryApplyConfiguration constructs an declarative configuration of the ManagedFieldsEntry type for use with -// apply. -func ManagedFieldsEntry() *ManagedFieldsEntryApplyConfiguration { - return &ManagedFieldsEntryApplyConfiguration{} -} - -// WithManager sets the Manager field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Manager field is set to the value of the last call. -func (b *ManagedFieldsEntryApplyConfiguration) WithManager(value string) *ManagedFieldsEntryApplyConfiguration { - b.Manager = &value - return b -} - -// WithOperation sets the Operation field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Operation field is set to the value of the last call. -func (b *ManagedFieldsEntryApplyConfiguration) WithOperation(value v1.ManagedFieldsOperationType) *ManagedFieldsEntryApplyConfiguration { - b.Operation = &value - return b -} - -// WithAPIVersion sets the APIVersion field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the APIVersion field is set to the value of the last call. -func (b *ManagedFieldsEntryApplyConfiguration) WithAPIVersion(value string) *ManagedFieldsEntryApplyConfiguration { - b.APIVersion = &value - return b -} - -// WithTime sets the Time field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Time field is set to the value of the last call. -func (b *ManagedFieldsEntryApplyConfiguration) WithTime(value v1.Time) *ManagedFieldsEntryApplyConfiguration { - b.Time = &value - return b -} - -// WithFieldsType sets the FieldsType field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the FieldsType field is set to the value of the last call. -func (b *ManagedFieldsEntryApplyConfiguration) WithFieldsType(value string) *ManagedFieldsEntryApplyConfiguration { - b.FieldsType = &value - return b -} - -// WithFieldsV1 sets the FieldsV1 field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the FieldsV1 field is set to the value of the last call. -func (b *ManagedFieldsEntryApplyConfiguration) WithFieldsV1(value v1.FieldsV1) *ManagedFieldsEntryApplyConfiguration { - b.FieldsV1 = &value - return b -} - -// WithSubresource sets the Subresource field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Subresource field is set to the value of the last call. -func (b *ManagedFieldsEntryApplyConfiguration) WithSubresource(value string) *ManagedFieldsEntryApplyConfiguration { - b.Subresource = &value - return b -} diff --git a/client-go/applyconfigurations/meta/v1/objectmeta.go b/client-go/applyconfigurations/meta/v1/objectmeta.go deleted file mode 100644 index 2c9e2e76..00000000 --- a/client-go/applyconfigurations/meta/v1/objectmeta.go +++ /dev/null @@ -1,158 +0,0 @@ -// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors -// SPDX-License-Identifier: Apache-2.0 - -// Code generated by applyconfiguration-gen. DO NOT EDIT. - -package v1 - -import ( - v1 "k8s.io/apimachinery/pkg/apis/meta/v1" - types "k8s.io/apimachinery/pkg/types" -) - -// ObjectMetaApplyConfiguration represents an declarative configuration of the ObjectMeta type for use -// with apply. -type ObjectMetaApplyConfiguration struct { - Name *string `json:"name,omitempty"` - GenerateName *string `json:"generateName,omitempty"` - Namespace *string `json:"namespace,omitempty"` - UID *types.UID `json:"uid,omitempty"` - ResourceVersion *string `json:"resourceVersion,omitempty"` - Generation *int64 `json:"generation,omitempty"` - CreationTimestamp *v1.Time `json:"creationTimestamp,omitempty"` - DeletionTimestamp *v1.Time `json:"deletionTimestamp,omitempty"` - DeletionGracePeriodSeconds *int64 `json:"deletionGracePeriodSeconds,omitempty"` - Labels map[string]string `json:"labels,omitempty"` - Annotations map[string]string `json:"annotations,omitempty"` - OwnerReferences []OwnerReferenceApplyConfiguration `json:"ownerReferences,omitempty"` - Finalizers []string `json:"finalizers,omitempty"` -} - -// ObjectMetaApplyConfiguration constructs an declarative configuration of the ObjectMeta type for use with -// apply. -func ObjectMeta() *ObjectMetaApplyConfiguration { - return &ObjectMetaApplyConfiguration{} -} - -// WithName sets the Name field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Name field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithName(value string) *ObjectMetaApplyConfiguration { - b.Name = &value - return b -} - -// WithGenerateName sets the GenerateName field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the GenerateName field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithGenerateName(value string) *ObjectMetaApplyConfiguration { - b.GenerateName = &value - return b -} - -// WithNamespace sets the Namespace field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Namespace field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithNamespace(value string) *ObjectMetaApplyConfiguration { - b.Namespace = &value - return b -} - -// WithUID sets the UID field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the UID field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithUID(value types.UID) *ObjectMetaApplyConfiguration { - b.UID = &value - return b -} - -// WithResourceVersion sets the ResourceVersion field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the ResourceVersion field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithResourceVersion(value string) *ObjectMetaApplyConfiguration { - b.ResourceVersion = &value - return b -} - -// WithGeneration sets the Generation field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Generation field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithGeneration(value int64) *ObjectMetaApplyConfiguration { - b.Generation = &value - return b -} - -// WithCreationTimestamp sets the CreationTimestamp field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the CreationTimestamp field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithCreationTimestamp(value v1.Time) *ObjectMetaApplyConfiguration { - b.CreationTimestamp = &value - return b -} - -// WithDeletionTimestamp sets the DeletionTimestamp field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the DeletionTimestamp field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithDeletionTimestamp(value v1.Time) *ObjectMetaApplyConfiguration { - b.DeletionTimestamp = &value - return b -} - -// WithDeletionGracePeriodSeconds sets the DeletionGracePeriodSeconds field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the DeletionGracePeriodSeconds field is set to the value of the last call. -func (b *ObjectMetaApplyConfiguration) WithDeletionGracePeriodSeconds(value int64) *ObjectMetaApplyConfiguration { - b.DeletionGracePeriodSeconds = &value - return b -} - -// WithLabels puts the entries into the Labels field in the declarative configuration -// and returns the receiver, so that objects can be build by chaining "With" function invocations. -// If called multiple times, the entries provided by each call will be put on the Labels field, -// overwriting an existing map entries in Labels field with the same key. -func (b *ObjectMetaApplyConfiguration) WithLabels(entries map[string]string) *ObjectMetaApplyConfiguration { - if b.Labels == nil && len(entries) > 0 { - b.Labels = make(map[string]string, len(entries)) - } - for k, v := range entries { - b.Labels[k] = v - } - return b -} - -// WithAnnotations puts the entries into the Annotations field in the declarative configuration -// and returns the receiver, so that objects can be build by chaining "With" function invocations. -// If called multiple times, the entries provided by each call will be put on the Annotations field, -// overwriting an existing map entries in Annotations field with the same key. -func (b *ObjectMetaApplyConfiguration) WithAnnotations(entries map[string]string) *ObjectMetaApplyConfiguration { - if b.Annotations == nil && len(entries) > 0 { - b.Annotations = make(map[string]string, len(entries)) - } - for k, v := range entries { - b.Annotations[k] = v - } - return b -} - -// WithOwnerReferences adds the given value to the OwnerReferences field in the declarative configuration -// and returns the receiver, so that objects can be build by chaining "With" function invocations. -// If called multiple times, values provided by each call will be appended to the OwnerReferences field. -func (b *ObjectMetaApplyConfiguration) WithOwnerReferences(values ...*OwnerReferenceApplyConfiguration) *ObjectMetaApplyConfiguration { - for i := range values { - if values[i] == nil { - panic("nil value passed to WithOwnerReferences") - } - b.OwnerReferences = append(b.OwnerReferences, *values[i]) - } - return b -} - -// WithFinalizers adds the given value to the Finalizers field in the declarative configuration -// and returns the receiver, so that objects can be build by chaining "With" function invocations. -// If called multiple times, values provided by each call will be appended to the Finalizers field. -func (b *ObjectMetaApplyConfiguration) WithFinalizers(values ...string) *ObjectMetaApplyConfiguration { - for i := range values { - b.Finalizers = append(b.Finalizers, values[i]) - } - return b -} diff --git a/client-go/applyconfigurations/meta/v1/ownerreference.go b/client-go/applyconfigurations/meta/v1/ownerreference.go deleted file mode 100644 index b8d87fdd..00000000 --- a/client-go/applyconfigurations/meta/v1/ownerreference.go +++ /dev/null @@ -1,75 +0,0 @@ -// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors -// SPDX-License-Identifier: Apache-2.0 - -// Code generated by applyconfiguration-gen. DO NOT EDIT. - -package v1 - -import ( - types "k8s.io/apimachinery/pkg/types" -) - -// OwnerReferenceApplyConfiguration represents an declarative configuration of the OwnerReference type for use -// with apply. -type OwnerReferenceApplyConfiguration struct { - APIVersion *string `json:"apiVersion,omitempty"` - Kind *string `json:"kind,omitempty"` - Name *string `json:"name,omitempty"` - UID *types.UID `json:"uid,omitempty"` - Controller *bool `json:"controller,omitempty"` - BlockOwnerDeletion *bool `json:"blockOwnerDeletion,omitempty"` -} - -// OwnerReferenceApplyConfiguration constructs an declarative configuration of the OwnerReference type for use with -// apply. -func OwnerReference() *OwnerReferenceApplyConfiguration { - return &OwnerReferenceApplyConfiguration{} -} - -// WithAPIVersion sets the APIVersion field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the APIVersion field is set to the value of the last call. -func (b *OwnerReferenceApplyConfiguration) WithAPIVersion(value string) *OwnerReferenceApplyConfiguration { - b.APIVersion = &value - return b -} - -// WithKind sets the Kind field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Kind field is set to the value of the last call. -func (b *OwnerReferenceApplyConfiguration) WithKind(value string) *OwnerReferenceApplyConfiguration { - b.Kind = &value - return b -} - -// WithName sets the Name field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Name field is set to the value of the last call. -func (b *OwnerReferenceApplyConfiguration) WithName(value string) *OwnerReferenceApplyConfiguration { - b.Name = &value - return b -} - -// WithUID sets the UID field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the UID field is set to the value of the last call. -func (b *OwnerReferenceApplyConfiguration) WithUID(value types.UID) *OwnerReferenceApplyConfiguration { - b.UID = &value - return b -} - -// WithController sets the Controller field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Controller field is set to the value of the last call. -func (b *OwnerReferenceApplyConfiguration) WithController(value bool) *OwnerReferenceApplyConfiguration { - b.Controller = &value - return b -} - -// WithBlockOwnerDeletion sets the BlockOwnerDeletion field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the BlockOwnerDeletion field is set to the value of the last call. -func (b *OwnerReferenceApplyConfiguration) WithBlockOwnerDeletion(value bool) *OwnerReferenceApplyConfiguration { - b.BlockOwnerDeletion = &value - return b -} diff --git a/client-go/applyconfigurations/meta/v1/typemeta.go b/client-go/applyconfigurations/meta/v1/typemeta.go deleted file mode 100644 index 98f0138d..00000000 --- a/client-go/applyconfigurations/meta/v1/typemeta.go +++ /dev/null @@ -1,35 +0,0 @@ -// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors -// SPDX-License-Identifier: Apache-2.0 - -// Code generated by applyconfiguration-gen. DO NOT EDIT. - -package v1 - -// TypeMetaApplyConfiguration represents an declarative configuration of the TypeMeta type for use -// with apply. -type TypeMetaApplyConfiguration struct { - Kind *string `json:"kind,omitempty"` - APIVersion *string `json:"apiVersion,omitempty"` -} - -// TypeMetaApplyConfiguration constructs an declarative configuration of the TypeMeta type for use with -// apply. -func TypeMeta() *TypeMetaApplyConfiguration { - return &TypeMetaApplyConfiguration{} -} - -// WithKind sets the Kind field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the Kind field is set to the value of the last call. -func (b *TypeMetaApplyConfiguration) WithKind(value string) *TypeMetaApplyConfiguration { - b.Kind = &value - return b -} - -// WithAPIVersion sets the APIVersion field in the declarative configuration to the given value -// and returns the receiver, so that objects can be built by chaining "With" function invocations. -// If called multiple times, the APIVersion field is set to the value of the last call. -func (b *TypeMetaApplyConfiguration) WithAPIVersion(value string) *TypeMetaApplyConfiguration { - b.APIVersion = &value - return b -} diff --git a/client-go/applyconfigurations/utils.go b/client-go/applyconfigurations/utils.go index fea32c88..45490441 100644 --- a/client-go/applyconfigurations/utils.go +++ b/client-go/applyconfigurations/utils.go @@ -8,8 +8,6 @@ package applyconfigurations import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - metav1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/meta/v1" - v1 "k8s.io/apimachinery/pkg/apis/meta/v1" schema "k8s.io/apimachinery/pkg/runtime/schema" ) @@ -157,20 +155,6 @@ func ForKind(kind schema.GroupVersionKind) interface{} { case v1alpha1.SchemeGroupVersion.WithKind("TopologySpreadConstraint"): return &corev1alpha1.TopologySpreadConstraintApplyConfiguration{} - // Group=meta.k8s.io, Version=v1 - case v1.SchemeGroupVersion.WithKind("LabelSelector"): - return &metav1.LabelSelectorApplyConfiguration{} - case v1.SchemeGroupVersion.WithKind("LabelSelectorRequirement"): - return &metav1.LabelSelectorRequirementApplyConfiguration{} - case v1.SchemeGroupVersion.WithKind("ManagedFieldsEntry"): - return &metav1.ManagedFieldsEntryApplyConfiguration{} - case v1.SchemeGroupVersion.WithKind("ObjectMeta"): - return &metav1.ObjectMetaApplyConfiguration{} - case v1.SchemeGroupVersion.WithKind("OwnerReference"): - return &metav1.OwnerReferenceApplyConfiguration{} - case v1.SchemeGroupVersion.WithKind("TypeMeta"): - return &metav1.TypeMetaApplyConfiguration{} - } return nil } diff --git a/client-go/informers/core/interface.go b/client-go/informers/externalversions/core/interface.go similarity index 92% rename from client-go/informers/core/interface.go rename to client-go/informers/externalversions/core/interface.go index e9ad3a02..9b254762 100644 --- a/client-go/informers/core/interface.go +++ b/client-go/informers/externalversions/core/interface.go @@ -6,8 +6,8 @@ package core import ( - v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/informers/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" + v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/core/v1alpha1" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" ) // Interface provides access to each of this group's versions. diff --git a/client-go/informers/core/v1alpha1/daemonset.go b/client-go/informers/externalversions/core/v1alpha1/daemonset.go similarity index 81% rename from client-go/informers/core/v1alpha1/daemonset.go rename to client-go/informers/externalversions/core/v1alpha1/daemonset.go index be7e4fef..8491b955 100644 --- a/client-go/informers/core/v1alpha1/daemonset.go +++ b/client-go/informers/externalversions/core/v1alpha1/daemonset.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type daemonSetInformer struct { // NewDaemonSetInformer constructs a new informer for DaemonSet type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewDaemonSetInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewDaemonSetInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredDaemonSetInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredDaemonSetInformer constructs a new informer for DaemonSet type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredDaemonSetInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredDaemonSetInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredDaemonSetInformer(client ironcorenet.Interface, namespace string ) } -func (f *daemonSetInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *daemonSetInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredDaemonSetInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/instance.go b/client-go/informers/externalversions/core/v1alpha1/instance.go similarity index 81% rename from client-go/informers/core/v1alpha1/instance.go rename to client-go/informers/externalversions/core/v1alpha1/instance.go index b4097532..034ae7ee 100644 --- a/client-go/informers/core/v1alpha1/instance.go +++ b/client-go/informers/externalversions/core/v1alpha1/instance.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type instanceInformer struct { // NewInstanceInformer constructs a new informer for Instance type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewInstanceInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewInstanceInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredInstanceInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredInstanceInformer constructs a new informer for Instance type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredInstanceInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredInstanceInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredInstanceInformer(client ironcorenet.Interface, namespace string, ) } -func (f *instanceInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *instanceInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredInstanceInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/interface.go b/client-go/informers/externalversions/core/v1alpha1/interface.go similarity index 99% rename from client-go/informers/core/v1alpha1/interface.go rename to client-go/informers/externalversions/core/v1alpha1/interface.go index 618df28a..b0e0674e 100644 --- a/client-go/informers/core/v1alpha1/interface.go +++ b/client-go/informers/externalversions/core/v1alpha1/interface.go @@ -6,7 +6,7 @@ package v1alpha1 import ( - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" ) // Interface provides access to all the informers in this group version. diff --git a/client-go/informers/core/v1alpha1/ip.go b/client-go/informers/externalversions/core/v1alpha1/ip.go similarity index 80% rename from client-go/informers/core/v1alpha1/ip.go rename to client-go/informers/externalversions/core/v1alpha1/ip.go index 27821d1b..3ddfddc1 100644 --- a/client-go/informers/core/v1alpha1/ip.go +++ b/client-go/informers/externalversions/core/v1alpha1/ip.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type iPInformer struct { // NewIPInformer constructs a new informer for IP type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewIPInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewIPInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredIPInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredIPInformer constructs a new informer for IP type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredIPInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredIPInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredIPInformer(client ironcorenet.Interface, namespace string, resyn ) } -func (f *iPInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *iPInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredIPInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/ipaddress.go b/client-go/informers/externalversions/core/v1alpha1/ipaddress.go similarity index 81% rename from client-go/informers/core/v1alpha1/ipaddress.go rename to client-go/informers/externalversions/core/v1alpha1/ipaddress.go index 656af8bd..5e39918e 100644 --- a/client-go/informers/core/v1alpha1/ipaddress.go +++ b/client-go/informers/externalversions/core/v1alpha1/ipaddress.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -34,14 +34,14 @@ type iPAddressInformer struct { // NewIPAddressInformer constructs a new informer for IPAddress type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewIPAddressInformer(client ironcorenet.Interface, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewIPAddressInformer(client versioned.Interface, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredIPAddressInformer(client, resyncPeriod, indexers, nil) } // NewFilteredIPAddressInformer constructs a new informer for IPAddress type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredIPAddressInformer(client ironcorenet.Interface, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredIPAddressInformer(client versioned.Interface, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -63,7 +63,7 @@ func NewFilteredIPAddressInformer(client ironcorenet.Interface, resyncPeriod tim ) } -func (f *iPAddressInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *iPAddressInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredIPAddressInformer(client, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/loadbalancer.go b/client-go/informers/externalversions/core/v1alpha1/loadbalancer.go similarity index 81% rename from client-go/informers/core/v1alpha1/loadbalancer.go rename to client-go/informers/externalversions/core/v1alpha1/loadbalancer.go index 8a23daed..f7e8c83d 100644 --- a/client-go/informers/core/v1alpha1/loadbalancer.go +++ b/client-go/informers/externalversions/core/v1alpha1/loadbalancer.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type loadBalancerInformer struct { // NewLoadBalancerInformer constructs a new informer for LoadBalancer type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewLoadBalancerInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewLoadBalancerInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredLoadBalancerInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredLoadBalancerInformer constructs a new informer for LoadBalancer type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredLoadBalancerInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredLoadBalancerInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredLoadBalancerInformer(client ironcorenet.Interface, namespace str ) } -func (f *loadBalancerInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *loadBalancerInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredLoadBalancerInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/loadbalancerrouting.go b/client-go/informers/externalversions/core/v1alpha1/loadbalancerrouting.go similarity index 80% rename from client-go/informers/core/v1alpha1/loadbalancerrouting.go rename to client-go/informers/externalversions/core/v1alpha1/loadbalancerrouting.go index 657caa24..e94bf547 100644 --- a/client-go/informers/core/v1alpha1/loadbalancerrouting.go +++ b/client-go/informers/externalversions/core/v1alpha1/loadbalancerrouting.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type loadBalancerRoutingInformer struct { // NewLoadBalancerRoutingInformer constructs a new informer for LoadBalancerRouting type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewLoadBalancerRoutingInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewLoadBalancerRoutingInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredLoadBalancerRoutingInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredLoadBalancerRoutingInformer constructs a new informer for LoadBalancerRouting type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredLoadBalancerRoutingInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredLoadBalancerRoutingInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredLoadBalancerRoutingInformer(client ironcorenet.Interface, namesp ) } -func (f *loadBalancerRoutingInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *loadBalancerRoutingInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredLoadBalancerRoutingInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/natgateway.go b/client-go/informers/externalversions/core/v1alpha1/natgateway.go similarity index 81% rename from client-go/informers/core/v1alpha1/natgateway.go rename to client-go/informers/externalversions/core/v1alpha1/natgateway.go index 900c0a31..b218d2fc 100644 --- a/client-go/informers/core/v1alpha1/natgateway.go +++ b/client-go/informers/externalversions/core/v1alpha1/natgateway.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type nATGatewayInformer struct { // NewNATGatewayInformer constructs a new informer for NATGateway type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNATGatewayInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNATGatewayInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNATGatewayInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredNATGatewayInformer constructs a new informer for NATGateway type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNATGatewayInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNATGatewayInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredNATGatewayInformer(client ironcorenet.Interface, namespace strin ) } -func (f *nATGatewayInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *nATGatewayInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNATGatewayInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/natgatewayautoscaler.go b/client-go/informers/externalversions/core/v1alpha1/natgatewayautoscaler.go similarity index 80% rename from client-go/informers/core/v1alpha1/natgatewayautoscaler.go rename to client-go/informers/externalversions/core/v1alpha1/natgatewayautoscaler.go index de669217..2f6a6fe9 100644 --- a/client-go/informers/core/v1alpha1/natgatewayautoscaler.go +++ b/client-go/informers/externalversions/core/v1alpha1/natgatewayautoscaler.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type nATGatewayAutoscalerInformer struct { // NewNATGatewayAutoscalerInformer constructs a new informer for NATGatewayAutoscaler type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNATGatewayAutoscalerInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNATGatewayAutoscalerInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNATGatewayAutoscalerInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredNATGatewayAutoscalerInformer constructs a new informer for NATGatewayAutoscaler type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNATGatewayAutoscalerInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNATGatewayAutoscalerInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredNATGatewayAutoscalerInformer(client ironcorenet.Interface, names ) } -func (f *nATGatewayAutoscalerInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *nATGatewayAutoscalerInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNATGatewayAutoscalerInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/nattable.go b/client-go/informers/externalversions/core/v1alpha1/nattable.go similarity index 81% rename from client-go/informers/core/v1alpha1/nattable.go rename to client-go/informers/externalversions/core/v1alpha1/nattable.go index 7c0b4337..d290692b 100644 --- a/client-go/informers/core/v1alpha1/nattable.go +++ b/client-go/informers/externalversions/core/v1alpha1/nattable.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type nATTableInformer struct { // NewNATTableInformer constructs a new informer for NATTable type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNATTableInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNATTableInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNATTableInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredNATTableInformer constructs a new informer for NATTable type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNATTableInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNATTableInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredNATTableInformer(client ironcorenet.Interface, namespace string, ) } -func (f *nATTableInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *nATTableInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNATTableInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/network.go b/client-go/informers/externalversions/core/v1alpha1/network.go similarity index 81% rename from client-go/informers/core/v1alpha1/network.go rename to client-go/informers/externalversions/core/v1alpha1/network.go index 076b0758..36ce7fdb 100644 --- a/client-go/informers/core/v1alpha1/network.go +++ b/client-go/informers/externalversions/core/v1alpha1/network.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type networkInformer struct { // NewNetworkInformer constructs a new informer for Network type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNetworkInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNetworkInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNetworkInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredNetworkInformer constructs a new informer for Network type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNetworkInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNetworkInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredNetworkInformer(client ironcorenet.Interface, namespace string, ) } -func (f *networkInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *networkInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNetworkInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/networkid.go b/client-go/informers/externalversions/core/v1alpha1/networkid.go similarity index 81% rename from client-go/informers/core/v1alpha1/networkid.go rename to client-go/informers/externalversions/core/v1alpha1/networkid.go index 031959cb..3d3e015c 100644 --- a/client-go/informers/core/v1alpha1/networkid.go +++ b/client-go/informers/externalversions/core/v1alpha1/networkid.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -34,14 +34,14 @@ type networkIDInformer struct { // NewNetworkIDInformer constructs a new informer for NetworkID type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNetworkIDInformer(client ironcorenet.Interface, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNetworkIDInformer(client versioned.Interface, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNetworkIDInformer(client, resyncPeriod, indexers, nil) } // NewFilteredNetworkIDInformer constructs a new informer for NetworkID type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNetworkIDInformer(client ironcorenet.Interface, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNetworkIDInformer(client versioned.Interface, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -63,7 +63,7 @@ func NewFilteredNetworkIDInformer(client ironcorenet.Interface, resyncPeriod tim ) } -func (f *networkIDInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *networkIDInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNetworkIDInformer(client, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/networkinterface.go b/client-go/informers/externalversions/core/v1alpha1/networkinterface.go similarity index 80% rename from client-go/informers/core/v1alpha1/networkinterface.go rename to client-go/informers/externalversions/core/v1alpha1/networkinterface.go index ecc727d2..85ce1d26 100644 --- a/client-go/informers/core/v1alpha1/networkinterface.go +++ b/client-go/informers/externalversions/core/v1alpha1/networkinterface.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type networkInterfaceInformer struct { // NewNetworkInterfaceInformer constructs a new informer for NetworkInterface type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNetworkInterfaceInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNetworkInterfaceInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNetworkInterfaceInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredNetworkInterfaceInformer constructs a new informer for NetworkInterface type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNetworkInterfaceInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNetworkInterfaceInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredNetworkInterfaceInformer(client ironcorenet.Interface, namespace ) } -func (f *networkInterfaceInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *networkInterfaceInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNetworkInterfaceInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/networkpolicy.go b/client-go/informers/externalversions/core/v1alpha1/networkpolicy.go similarity index 80% rename from client-go/informers/core/v1alpha1/networkpolicy.go rename to client-go/informers/externalversions/core/v1alpha1/networkpolicy.go index 9b3dc84a..abec02c1 100644 --- a/client-go/informers/core/v1alpha1/networkpolicy.go +++ b/client-go/informers/externalversions/core/v1alpha1/networkpolicy.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type networkPolicyInformer struct { // NewNetworkPolicyInformer constructs a new informer for NetworkPolicy type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNetworkPolicyInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNetworkPolicyInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNetworkPolicyInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredNetworkPolicyInformer constructs a new informer for NetworkPolicy type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNetworkPolicyInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNetworkPolicyInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredNetworkPolicyInformer(client ironcorenet.Interface, namespace st ) } -func (f *networkPolicyInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *networkPolicyInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNetworkPolicyInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/networkpolicyrule.go b/client-go/informers/externalversions/core/v1alpha1/networkpolicyrule.go similarity index 80% rename from client-go/informers/core/v1alpha1/networkpolicyrule.go rename to client-go/informers/externalversions/core/v1alpha1/networkpolicyrule.go index 5f5fcedb..09d925dd 100644 --- a/client-go/informers/core/v1alpha1/networkpolicyrule.go +++ b/client-go/informers/externalversions/core/v1alpha1/networkpolicyrule.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -35,14 +35,14 @@ type networkPolicyRuleInformer struct { // NewNetworkPolicyRuleInformer constructs a new informer for NetworkPolicyRule type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNetworkPolicyRuleInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNetworkPolicyRuleInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNetworkPolicyRuleInformer(client, namespace, resyncPeriod, indexers, nil) } // NewFilteredNetworkPolicyRuleInformer constructs a new informer for NetworkPolicyRule type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNetworkPolicyRuleInformer(client ironcorenet.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNetworkPolicyRuleInformer(client versioned.Interface, namespace string, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -64,7 +64,7 @@ func NewFilteredNetworkPolicyRuleInformer(client ironcorenet.Interface, namespac ) } -func (f *networkPolicyRuleInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *networkPolicyRuleInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNetworkPolicyRuleInformer(client, f.namespace, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/core/v1alpha1/node.go b/client-go/informers/externalversions/core/v1alpha1/node.go similarity index 80% rename from client-go/informers/core/v1alpha1/node.go rename to client-go/informers/externalversions/core/v1alpha1/node.go index 23d2be9a..a9ebbac6 100644 --- a/client-go/informers/core/v1alpha1/node.go +++ b/client-go/informers/externalversions/core/v1alpha1/node.go @@ -10,8 +10,8 @@ import ( time "time" corev1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" @@ -34,14 +34,14 @@ type nodeInformer struct { // NewNodeInformer constructs a new informer for Node type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewNodeInformer(client ironcorenet.Interface, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { +func NewNodeInformer(client versioned.Interface, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer { return NewFilteredNodeInformer(client, resyncPeriod, indexers, nil) } // NewFilteredNodeInformer constructs a new informer for Node type. // Always prefer using an informer factory to get a shared informer instead of getting an independent // one. This reduces memory footprint and number of connections to the server. -func NewFilteredNodeInformer(client ironcorenet.Interface, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { +func NewFilteredNodeInformer(client versioned.Interface, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer { return cache.NewSharedIndexInformer( &cache.ListWatch{ ListFunc: func(options v1.ListOptions) (runtime.Object, error) { @@ -63,7 +63,7 @@ func NewFilteredNodeInformer(client ironcorenet.Interface, resyncPeriod time.Dur ) } -func (f *nodeInformer) defaultInformer(client ironcorenet.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { +func (f *nodeInformer) defaultInformer(client versioned.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer { return NewFilteredNodeInformer(client, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions) } diff --git a/client-go/informers/factory.go b/client-go/informers/externalversions/factory.go similarity index 92% rename from client-go/informers/factory.go rename to client-go/informers/externalversions/factory.go index 1e7af808..09a6a4f7 100644 --- a/client-go/informers/factory.go +++ b/client-go/informers/externalversions/factory.go @@ -3,16 +3,16 @@ // Code generated by informer-gen. DO NOT EDIT. -package informers +package externalversions import ( reflect "reflect" sync "sync" time "time" - core "github.com/ironcore-dev/ironcore-net/client-go/informers/core" - internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/internalinterfaces" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + core "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/core" + internalinterfaces "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/internalinterfaces" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" schema "k8s.io/apimachinery/pkg/runtime/schema" @@ -23,7 +23,7 @@ import ( type SharedInformerOption func(*sharedInformerFactory) *sharedInformerFactory type sharedInformerFactory struct { - client ironcorenet.Interface + client versioned.Interface namespace string tweakListOptions internalinterfaces.TweakListOptionsFunc lock sync.Mutex @@ -77,7 +77,7 @@ func WithTransform(transform cache.TransformFunc) SharedInformerOption { } // NewSharedInformerFactory constructs a new instance of sharedInformerFactory for all namespaces. -func NewSharedInformerFactory(client ironcorenet.Interface, defaultResync time.Duration) SharedInformerFactory { +func NewSharedInformerFactory(client versioned.Interface, defaultResync time.Duration) SharedInformerFactory { return NewSharedInformerFactoryWithOptions(client, defaultResync) } @@ -85,12 +85,12 @@ func NewSharedInformerFactory(client ironcorenet.Interface, defaultResync time.D // Listers obtained via this SharedInformerFactory will be subject to the same filters // as specified here. // Deprecated: Please use NewSharedInformerFactoryWithOptions instead -func NewFilteredSharedInformerFactory(client ironcorenet.Interface, defaultResync time.Duration, namespace string, tweakListOptions internalinterfaces.TweakListOptionsFunc) SharedInformerFactory { +func NewFilteredSharedInformerFactory(client versioned.Interface, defaultResync time.Duration, namespace string, tweakListOptions internalinterfaces.TweakListOptionsFunc) SharedInformerFactory { return NewSharedInformerFactoryWithOptions(client, defaultResync, WithNamespace(namespace), WithTweakListOptions(tweakListOptions)) } // NewSharedInformerFactoryWithOptions constructs a new instance of a SharedInformerFactory with additional options. -func NewSharedInformerFactoryWithOptions(client ironcorenet.Interface, defaultResync time.Duration, options ...SharedInformerOption) SharedInformerFactory { +func NewSharedInformerFactoryWithOptions(client versioned.Interface, defaultResync time.Duration, options ...SharedInformerOption) SharedInformerFactory { factory := &sharedInformerFactory{ client: client, namespace: v1.NamespaceAll, diff --git a/client-go/informers/generic.go b/client-go/informers/externalversions/generic.go similarity index 99% rename from client-go/informers/generic.go rename to client-go/informers/externalversions/generic.go index c404cd14..37e32d0a 100644 --- a/client-go/informers/generic.go +++ b/client-go/informers/externalversions/generic.go @@ -3,7 +3,7 @@ // Code generated by informer-gen. DO NOT EDIT. -package informers +package externalversions import ( "fmt" diff --git a/client-go/informers/internalinterfaces/factory_interfaces.go b/client-go/informers/externalversions/internalinterfaces/factory_interfaces.go similarity index 73% rename from client-go/informers/internalinterfaces/factory_interfaces.go rename to client-go/informers/externalversions/internalinterfaces/factory_interfaces.go index e40c9c35..4a3c2c01 100644 --- a/client-go/informers/internalinterfaces/factory_interfaces.go +++ b/client-go/informers/externalversions/internalinterfaces/factory_interfaces.go @@ -8,14 +8,14 @@ package internalinterfaces import ( time "time" - ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + versioned "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" cache "k8s.io/client-go/tools/cache" ) -// NewInformerFunc takes ironcorenet.Interface and time.Duration to return a SharedIndexInformer. -type NewInformerFunc func(ironcorenet.Interface, time.Duration) cache.SharedIndexInformer +// NewInformerFunc takes versioned.Interface and time.Duration to return a SharedIndexInformer. +type NewInformerFunc func(versioned.Interface, time.Duration) cache.SharedIndexInformer // SharedInformerFactory a small interface to allow for adding an informer without an import cycle type SharedInformerFactory interface { diff --git a/client-go/ironcorenet/clientset.go b/client-go/ironcorenet/versioned/clientset.go similarity index 98% rename from client-go/ironcorenet/clientset.go rename to client-go/ironcorenet/versioned/clientset.go index e177c18a..cd5de2da 100644 --- a/client-go/ironcorenet/clientset.go +++ b/client-go/ironcorenet/versioned/clientset.go @@ -3,13 +3,13 @@ // Code generated by client-gen. DO NOT EDIT. -package ironcorenet +package versioned import ( "fmt" "net/http" - corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/typed/core/v1alpha1" + corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/typed/core/v1alpha1" discovery "k8s.io/client-go/discovery" rest "k8s.io/client-go/rest" flowcontrol "k8s.io/client-go/util/flowcontrol" diff --git a/client-go/ironcorenet/fake/clientset_generated.go b/client-go/ironcorenet/versioned/fake/clientset_generated.go similarity index 95% rename from client-go/ironcorenet/fake/clientset_generated.go rename to client-go/ironcorenet/versioned/fake/clientset_generated.go index 457ed68b..e34b2a53 100644 --- a/client-go/ironcorenet/fake/clientset_generated.go +++ b/client-go/ironcorenet/versioned/fake/clientset_generated.go @@ -6,9 +6,9 @@ package fake import ( - clientset "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" - corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/typed/core/v1alpha1" - fakecorev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/typed/core/v1alpha1/fake" + clientset "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" + corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/typed/core/v1alpha1" + fakecorev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/watch" "k8s.io/client-go/discovery" diff --git a/client-go/ironcorenet/fake/doc.go b/client-go/ironcorenet/versioned/fake/doc.go similarity index 100% rename from client-go/ironcorenet/fake/doc.go rename to client-go/ironcorenet/versioned/fake/doc.go diff --git a/client-go/ironcorenet/fake/register.go b/client-go/ironcorenet/versioned/fake/register.go similarity index 100% rename from client-go/ironcorenet/fake/register.go rename to client-go/ironcorenet/versioned/fake/register.go diff --git a/client-go/ironcorenet/scheme/doc.go b/client-go/ironcorenet/versioned/scheme/doc.go similarity index 100% rename from client-go/ironcorenet/scheme/doc.go rename to client-go/ironcorenet/versioned/scheme/doc.go diff --git a/client-go/ironcorenet/scheme/register.go b/client-go/ironcorenet/versioned/scheme/register.go similarity index 100% rename from client-go/ironcorenet/scheme/register.go rename to client-go/ironcorenet/versioned/scheme/register.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/core_client.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/core_client.go similarity index 98% rename from client-go/ironcorenet/typed/core/v1alpha1/core_client.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/core_client.go index 0c4e37ac..a136dcb7 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/core_client.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/core_client.go @@ -9,7 +9,7 @@ import ( "net/http" v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" rest "k8s.io/client-go/rest" ) diff --git a/client-go/ironcorenet/typed/core/v1alpha1/daemonset.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/daemonset.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/daemonset.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/daemonset.go index fb792975..2ca28d6b 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/daemonset.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/daemonset.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/doc.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/doc.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/doc.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/doc.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/doc.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/doc.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/doc.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/doc.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_core_client.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_core_client.go similarity index 98% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_core_client.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_core_client.go index 5d3db055..b0692164 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_core_client.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_core_client.go @@ -6,7 +6,7 @@ package fake import ( - v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/typed/core/v1alpha1" + v1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/typed/core/v1alpha1" rest "k8s.io/client-go/rest" testing "k8s.io/client-go/testing" ) diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_daemonset.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_daemonset.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_daemonset.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_daemonset.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_instance.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_instance.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_instance.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_instance.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_ip.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_ip.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_ip.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_ip.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_ipaddress.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_ipaddress.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_ipaddress.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_ipaddress.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_loadbalancer.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_loadbalancer.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_loadbalancer.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_loadbalancer.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_loadbalancerrouting.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_loadbalancerrouting.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_loadbalancerrouting.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_loadbalancerrouting.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_natgateway.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_natgateway.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_natgateway.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_natgateway.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_natgatewayautoscaler.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_natgatewayautoscaler.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_natgatewayautoscaler.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_natgatewayautoscaler.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_nattable.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_nattable.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_nattable.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_nattable.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_network.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_network.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_network.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_network.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_networkid.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_networkid.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_networkid.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_networkid.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_networkinterface.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_networkinterface.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_networkinterface.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_networkinterface.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_networkpolicy.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_networkpolicy.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_networkpolicy.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_networkpolicy.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_networkpolicyrule.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_networkpolicyrule.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_networkpolicyrule.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_networkpolicyrule.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/fake/fake_node.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_node.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/fake/fake_node.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/fake/fake_node.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/generated_expansion.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/generated_expansion.go similarity index 100% rename from client-go/ironcorenet/typed/core/v1alpha1/generated_expansion.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/generated_expansion.go diff --git a/client-go/ironcorenet/typed/core/v1alpha1/instance.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/instance.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/instance.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/instance.go index 3d64a801..e9fcc47a 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/instance.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/instance.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/ip.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/ip.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/ip.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/ip.go index 05977ec7..7031c438 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/ip.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/ip.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/ipaddress.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/ipaddress.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/ipaddress.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/ipaddress.go index da312155..214fe1d2 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/ipaddress.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/ipaddress.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/loadbalancer.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/loadbalancer.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/loadbalancer.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/loadbalancer.go index d11a8a54..b16fe9a1 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/loadbalancer.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/loadbalancer.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/loadbalancerrouting.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/loadbalancerrouting.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/loadbalancerrouting.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/loadbalancerrouting.go index 444f8ba6..83975a91 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/loadbalancerrouting.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/loadbalancerrouting.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/natgateway.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/natgateway.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/natgateway.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/natgateway.go index fde2747d..64baf05a 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/natgateway.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/natgateway.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/natgatewayautoscaler.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/natgatewayautoscaler.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/natgatewayautoscaler.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/natgatewayautoscaler.go index 5e069aae..54357b8a 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/natgatewayautoscaler.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/natgatewayautoscaler.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/nattable.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/nattable.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/nattable.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/nattable.go index 6ade3c61..a7ce62e7 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/nattable.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/nattable.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/network.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/network.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/network.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/network.go index 41ea81e8..0b9db270 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/network.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/network.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/networkid.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/networkid.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/networkid.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/networkid.go index 2cabaea2..e2ef2065 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/networkid.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/networkid.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/networkinterface.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/networkinterface.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/networkinterface.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/networkinterface.go index 55966fac..33b56b5b 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/networkinterface.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/networkinterface.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/networkpolicy.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/networkpolicy.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/networkpolicy.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/networkpolicy.go index 1de7d117..7a1ac1cb 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/networkpolicy.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/networkpolicy.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/networkpolicyrule.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/networkpolicyrule.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/networkpolicyrule.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/networkpolicyrule.go index 7200e79b..83658b5a 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/networkpolicyrule.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/networkpolicyrule.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/ironcorenet/typed/core/v1alpha1/node.go b/client-go/ironcorenet/versioned/typed/core/v1alpha1/node.go similarity index 99% rename from client-go/ironcorenet/typed/core/v1alpha1/node.go rename to client-go/ironcorenet/versioned/typed/core/v1alpha1/node.go index 90f347b5..b1ce533c 100644 --- a/client-go/ironcorenet/typed/core/v1alpha1/node.go +++ b/client-go/ironcorenet/versioned/typed/core/v1alpha1/node.go @@ -13,7 +13,7 @@ import ( v1alpha1 "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" corev1alpha1 "github.com/ironcore-dev/ironcore-net/client-go/applyconfigurations/core/v1alpha1" - scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/scheme" + scheme "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/client-go/openapi/api_violations.report b/client-go/openapi/api_violations.report index 2be1b68a..57245c48 100644 --- a/client-go/openapi/api_violations.report +++ b/client-go/openapi/api_violations.report @@ -36,129 +36,6 @@ API rule violation: list_type_missing,github.com/ironcore-dev/ironcore-net/api/c API rule violation: list_type_missing,github.com/ironcore-dev/ironcore-net/api/core/v1alpha1,Rule,CIDRBlock API rule violation: list_type_missing,github.com/ironcore-dev/ironcore-net/api/core/v1alpha1,Rule,NetworkPolicyPorts API rule violation: list_type_missing,github.com/ironcore-dev/ironcore-net/api/core/v1alpha1,Rule,ObjectIPs -API rule violation: list_type_missing,k8s.io/api/core/v1,AvoidPods,PreferAvoidPods -API rule violation: list_type_missing,k8s.io/api/core/v1,Capabilities,Add -API rule violation: list_type_missing,k8s.io/api/core/v1,Capabilities,Drop -API rule violation: list_type_missing,k8s.io/api/core/v1,CephFSPersistentVolumeSource,Monitors -API rule violation: list_type_missing,k8s.io/api/core/v1,CephFSVolumeSource,Monitors -API rule violation: list_type_missing,k8s.io/api/core/v1,ComponentStatus,Conditions -API rule violation: list_type_missing,k8s.io/api/core/v1,ConfigMapProjection,Items -API rule violation: list_type_missing,k8s.io/api/core/v1,ConfigMapVolumeSource,Items -API rule violation: list_type_missing,k8s.io/api/core/v1,Container,Args -API rule violation: list_type_missing,k8s.io/api/core/v1,Container,Command -API rule violation: list_type_missing,k8s.io/api/core/v1,Container,Env -API rule violation: list_type_missing,k8s.io/api/core/v1,Container,EnvFrom -API rule violation: list_type_missing,k8s.io/api/core/v1,Container,VolumeDevices -API rule violation: list_type_missing,k8s.io/api/core/v1,Container,VolumeMounts -API rule violation: list_type_missing,k8s.io/api/core/v1,ContainerImage,Names -API rule violation: list_type_missing,k8s.io/api/core/v1,DownwardAPIProjection,Items -API rule violation: list_type_missing,k8s.io/api/core/v1,DownwardAPIVolumeSource,Items -API rule violation: list_type_missing,k8s.io/api/core/v1,EndpointSubset,Addresses -API rule violation: list_type_missing,k8s.io/api/core/v1,EndpointSubset,NotReadyAddresses -API rule violation: list_type_missing,k8s.io/api/core/v1,EndpointSubset,Ports -API rule violation: list_type_missing,k8s.io/api/core/v1,Endpoints,Subsets -API rule violation: list_type_missing,k8s.io/api/core/v1,EphemeralContainerCommon,Args -API rule violation: list_type_missing,k8s.io/api/core/v1,EphemeralContainerCommon,Command -API rule violation: list_type_missing,k8s.io/api/core/v1,EphemeralContainerCommon,Env -API rule violation: list_type_missing,k8s.io/api/core/v1,EphemeralContainerCommon,EnvFrom -API rule violation: list_type_missing,k8s.io/api/core/v1,EphemeralContainerCommon,VolumeDevices -API rule violation: list_type_missing,k8s.io/api/core/v1,EphemeralContainerCommon,VolumeMounts -API rule violation: list_type_missing,k8s.io/api/core/v1,ExecAction,Command -API rule violation: list_type_missing,k8s.io/api/core/v1,FCVolumeSource,TargetWWNs -API rule violation: list_type_missing,k8s.io/api/core/v1,FCVolumeSource,WWIDs -API rule violation: list_type_missing,k8s.io/api/core/v1,HTTPGetAction,HTTPHeaders -API rule violation: list_type_missing,k8s.io/api/core/v1,HostAlias,Hostnames -API rule violation: list_type_missing,k8s.io/api/core/v1,ISCSIPersistentVolumeSource,Portals -API rule violation: list_type_missing,k8s.io/api/core/v1,ISCSIVolumeSource,Portals -API rule violation: list_type_missing,k8s.io/api/core/v1,LimitRangeSpec,Limits -API rule violation: list_type_missing,k8s.io/api/core/v1,LoadBalancerStatus,Ingress -API rule violation: list_type_missing,k8s.io/api/core/v1,NamespaceSpec,Finalizers -API rule violation: list_type_missing,k8s.io/api/core/v1,NamespaceStatus,Conditions -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeAffinity,PreferredDuringSchedulingIgnoredDuringExecution -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeSelector,NodeSelectorTerms -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeSelectorRequirement,Values -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeSelectorTerm,MatchExpressions -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeSelectorTerm,MatchFields -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeSpec,PodCIDRs -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeSpec,Taints -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeStatus,Addresses -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeStatus,Conditions -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeStatus,Images -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeStatus,VolumesAttached -API rule violation: list_type_missing,k8s.io/api/core/v1,NodeStatus,VolumesInUse -API rule violation: list_type_missing,k8s.io/api/core/v1,PersistentVolumeClaimSpec,AccessModes -API rule violation: list_type_missing,k8s.io/api/core/v1,PersistentVolumeClaimStatus,AccessModes -API rule violation: list_type_missing,k8s.io/api/core/v1,PersistentVolumeClaimStatus,Conditions -API rule violation: list_type_missing,k8s.io/api/core/v1,PersistentVolumeSpec,AccessModes -API rule violation: list_type_missing,k8s.io/api/core/v1,PersistentVolumeSpec,MountOptions -API rule violation: list_type_missing,k8s.io/api/core/v1,PodAffinity,PreferredDuringSchedulingIgnoredDuringExecution -API rule violation: list_type_missing,k8s.io/api/core/v1,PodAffinity,RequiredDuringSchedulingIgnoredDuringExecution -API rule violation: list_type_missing,k8s.io/api/core/v1,PodAffinityTerm,Namespaces -API rule violation: list_type_missing,k8s.io/api/core/v1,PodAntiAffinity,PreferredDuringSchedulingIgnoredDuringExecution -API rule violation: list_type_missing,k8s.io/api/core/v1,PodAntiAffinity,RequiredDuringSchedulingIgnoredDuringExecution -API rule violation: list_type_missing,k8s.io/api/core/v1,PodDNSConfig,Nameservers -API rule violation: list_type_missing,k8s.io/api/core/v1,PodDNSConfig,Options -API rule violation: list_type_missing,k8s.io/api/core/v1,PodDNSConfig,Searches -API rule violation: list_type_missing,k8s.io/api/core/v1,PodExecOptions,Command -API rule violation: list_type_missing,k8s.io/api/core/v1,PodPortForwardOptions,Ports -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSecurityContext,SupplementalGroups -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSecurityContext,Sysctls -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSpec,Containers -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSpec,EphemeralContainers -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSpec,HostAliases -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSpec,ImagePullSecrets -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSpec,InitContainers -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSpec,ReadinessGates -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSpec,Tolerations -API rule violation: list_type_missing,k8s.io/api/core/v1,PodSpec,Volumes -API rule violation: list_type_missing,k8s.io/api/core/v1,PodStatus,Conditions -API rule violation: list_type_missing,k8s.io/api/core/v1,PodStatus,ContainerStatuses -API rule violation: list_type_missing,k8s.io/api/core/v1,PodStatus,EphemeralContainerStatuses -API rule violation: list_type_missing,k8s.io/api/core/v1,PodStatus,InitContainerStatuses -API rule violation: list_type_missing,k8s.io/api/core/v1,PodStatus,PodIPs -API rule violation: list_type_missing,k8s.io/api/core/v1,ProjectedVolumeSource,Sources -API rule violation: list_type_missing,k8s.io/api/core/v1,RBDPersistentVolumeSource,CephMonitors -API rule violation: list_type_missing,k8s.io/api/core/v1,RBDVolumeSource,CephMonitors -API rule violation: list_type_missing,k8s.io/api/core/v1,RangeAllocation,Data -API rule violation: list_type_missing,k8s.io/api/core/v1,ReplicationControllerStatus,Conditions -API rule violation: list_type_missing,k8s.io/api/core/v1,ResourceQuotaSpec,Scopes -API rule violation: list_type_missing,k8s.io/api/core/v1,ScopeSelector,MatchExpressions -API rule violation: list_type_missing,k8s.io/api/core/v1,ScopedResourceSelectorRequirement,Values -API rule violation: list_type_missing,k8s.io/api/core/v1,SecretProjection,Items -API rule violation: list_type_missing,k8s.io/api/core/v1,SecretVolumeSource,Items -API rule violation: list_type_missing,k8s.io/api/core/v1,ServiceAccount,ImagePullSecrets -API rule violation: list_type_missing,k8s.io/api/core/v1,ServiceAccount,Secrets -API rule violation: list_type_missing,k8s.io/api/core/v1,ServiceSpec,ExternalIPs -API rule violation: list_type_missing,k8s.io/api/core/v1,ServiceSpec,LoadBalancerSourceRanges -API rule violation: list_type_missing,k8s.io/api/core/v1,TopologySelectorLabelRequirement,Values -API rule violation: list_type_missing,k8s.io/api/core/v1,TopologySelectorTerm,MatchLabelExpressions -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,APIGroup,ServerAddressByClientCIDRs -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,APIGroup,Versions -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,APIGroupList,Groups -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,APIResource,Categories -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,APIResource,ShortNames -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,APIResourceList,APIResources -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,APIVersions,ServerAddressByClientCIDRs -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,APIVersions,Versions -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,ApplyOptions,DryRun -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,CreateOptions,DryRun -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,DeleteOptions,DryRun -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,FieldsV1,Raw -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,LabelSelector,MatchExpressions -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,LabelSelectorRequirement,Values -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,ObjectMeta,Finalizers -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,ObjectMeta,ManagedFields -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,ObjectMeta,OwnerReferences -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,PatchOptions,DryRun -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,RootPaths,Paths -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,StatusDetails,Causes -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,Table,ColumnDefinitions -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,Table,Rows -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,TableRow,Cells -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,TableRow,Conditions -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/apis/meta/v1,UpdateOptions,DryRun -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/runtime,RawExtension,Raw -API rule violation: list_type_missing,k8s.io/apimachinery/pkg/runtime,Unknown,Raw API rule violation: names_match,github.com/ironcore-dev/ironcore-net/api/core/v1alpha1,DaemonSetSpec,Selector API rule violation: names_match,github.com/ironcore-dev/ironcore-net/api/core/v1alpha1,InstanceSpec,IPs API rule violation: names_match,github.com/ironcore-dev/ironcore-net/api/core/v1alpha1,InstanceStatus,IPs @@ -182,7 +59,6 @@ API rule violation: names_match,k8s.io/api/core/v1,ISCSIPersistentVolumeSource,D API rule violation: names_match,k8s.io/api/core/v1,ISCSIPersistentVolumeSource,SessionCHAPAuth API rule violation: names_match,k8s.io/api/core/v1,ISCSIVolumeSource,DiscoveryCHAPAuth API rule violation: names_match,k8s.io/api/core/v1,ISCSIVolumeSource,SessionCHAPAuth -API rule violation: names_match,k8s.io/api/core/v1,NodeResources,Capacity API rule violation: names_match,k8s.io/api/core/v1,NodeSpec,DoNotUseExternalID API rule violation: names_match,k8s.io/api/core/v1,PersistentVolumeSource,CephFS API rule violation: names_match,k8s.io/api/core/v1,PersistentVolumeSource,StorageOS diff --git a/client-go/openapi/zz_generated.openapi.go b/client-go/openapi/zz_generated.openapi.go index 24841bdd..8e895f92 100644 --- a/client-go/openapi/zz_generated.openapi.go +++ b/client-go/openapi/zz_generated.openapi.go @@ -6,8 +6,6 @@ // Code generated by openapi-gen. DO NOT EDIT. -// This file was autogenerated by openapi-gen. Do not edit it manually! - package openapi import ( @@ -112,6 +110,7 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA "github.com/ironcore-dev/ironcore-net/apimachinery/api/net.IPPrefix": schema_ironcore_net_apimachinery_api_net_IPPrefix(ref), "k8s.io/api/core/v1.AWSElasticBlockStoreVolumeSource": schema_k8sio_api_core_v1_AWSElasticBlockStoreVolumeSource(ref), "k8s.io/api/core/v1.Affinity": schema_k8sio_api_core_v1_Affinity(ref), + "k8s.io/api/core/v1.AppArmorProfile": schema_k8sio_api_core_v1_AppArmorProfile(ref), "k8s.io/api/core/v1.AttachedVolume": schema_k8sio_api_core_v1_AttachedVolume(ref), "k8s.io/api/core/v1.AvoidPods": schema_k8sio_api_core_v1_AvoidPods(ref), "k8s.io/api/core/v1.AzureDiskVolumeSource": schema_k8sio_api_core_v1_AzureDiskVolumeSource(ref), @@ -212,7 +211,8 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA "k8s.io/api/core/v1.NodeDaemonEndpoints": schema_k8sio_api_core_v1_NodeDaemonEndpoints(ref), "k8s.io/api/core/v1.NodeList": schema_k8sio_api_core_v1_NodeList(ref), "k8s.io/api/core/v1.NodeProxyOptions": schema_k8sio_api_core_v1_NodeProxyOptions(ref), - "k8s.io/api/core/v1.NodeResources": schema_k8sio_api_core_v1_NodeResources(ref), + "k8s.io/api/core/v1.NodeRuntimeHandler": schema_k8sio_api_core_v1_NodeRuntimeHandler(ref), + "k8s.io/api/core/v1.NodeRuntimeHandlerFeatures": schema_k8sio_api_core_v1_NodeRuntimeHandlerFeatures(ref), "k8s.io/api/core/v1.NodeSelector": schema_k8sio_api_core_v1_NodeSelector(ref), "k8s.io/api/core/v1.NodeSelectorRequirement": schema_k8sio_api_core_v1_NodeSelectorRequirement(ref), "k8s.io/api/core/v1.NodeSelectorTerm": schema_k8sio_api_core_v1_NodeSelectorTerm(ref), @@ -324,6 +324,7 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA "k8s.io/api/core/v1.Volume": schema_k8sio_api_core_v1_Volume(ref), "k8s.io/api/core/v1.VolumeDevice": schema_k8sio_api_core_v1_VolumeDevice(ref), "k8s.io/api/core/v1.VolumeMount": schema_k8sio_api_core_v1_VolumeMount(ref), + "k8s.io/api/core/v1.VolumeMountStatus": schema_k8sio_api_core_v1_VolumeMountStatus(ref), "k8s.io/api/core/v1.VolumeNodeAffinity": schema_k8sio_api_core_v1_VolumeNodeAffinity(ref), "k8s.io/api/core/v1.VolumeProjection": schema_k8sio_api_core_v1_VolumeProjection(ref), "k8s.io/api/core/v1.VolumeResourceRequirements": schema_k8sio_api_core_v1_VolumeResourceRequirements(ref), @@ -3770,6 +3771,11 @@ func schema_ironcore_net_api_core_v1alpha1_ObjectSelector(ref common.ReferenceCa }, }, "matchExpressions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "matchExpressions is a list of label selector requirements. The requirements are ANDed.", Type: []string{"array"}, @@ -4089,6 +4095,48 @@ func schema_k8sio_api_core_v1_Affinity(ref common.ReferenceCallback) common.Open } } +func schema_k8sio_api_core_v1_AppArmorProfile(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "AppArmorProfile defines a pod or container's AppArmor settings.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "type": { + SchemaProps: spec.SchemaProps{ + Description: "type indicates which kind of AppArmor profile will be applied. Valid options are:\n Localhost - a profile pre-loaded on the node.\n RuntimeDefault - the container runtime's default profile.\n Unconfined - no AppArmor enforcement.\n\nPossible enum values:\n - `\"Localhost\"` indicates that a profile pre-loaded on the node should be used.\n - `\"RuntimeDefault\"` indicates that the container runtime's default AppArmor profile should be used.\n - `\"Unconfined\"` indicates that no AppArmor profile should be enforced.", + Default: "", + Type: []string{"string"}, + Format: "", + Enum: []interface{}{"Localhost", "RuntimeDefault", "Unconfined"}, + }, + }, + "localhostProfile": { + SchemaProps: spec.SchemaProps{ + Description: "localhostProfile indicates a profile loaded on the node that should be used. The profile must be preconfigured on the node to work. Must match the loaded name of the profile. Must be set if and only if type is \"Localhost\".", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"type"}, + }, + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-unions": []interface{}{ + map[string]interface{}{ + "discriminator": "type", + "fields-to-discriminateBy": map[string]interface{}{ + "localhostProfile": "LocalhostProfile", + }, + }, + }, + }, + }, + }, + } +} + func schema_k8sio_api_core_v1_AttachedVolume(ref common.ReferenceCallback) common.OpenAPIDefinition { return common.OpenAPIDefinition{ Schema: spec.Schema{ @@ -4127,6 +4175,11 @@ func schema_k8sio_api_core_v1_AvoidPods(ref common.ReferenceCallback) common.Ope Type: []string{"object"}, Properties: map[string]spec.Schema{ "preferAvoidPods": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Bounded-sized list of signatures of pods that should avoid this node, sorted in timestamp order from oldest to newest. Size of the slice is unspecified.", Type: []string{"array"}, @@ -4493,6 +4546,11 @@ func schema_k8sio_api_core_v1_Capabilities(ref common.ReferenceCallback) common. Type: []string{"object"}, Properties: map[string]spec.Schema{ "add": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Added capabilities", Type: []string{"array"}, @@ -4508,6 +4566,11 @@ func schema_k8sio_api_core_v1_Capabilities(ref common.ReferenceCallback) common. }, }, "drop": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Removed capabilities", Type: []string{"array"}, @@ -4536,6 +4599,11 @@ func schema_k8sio_api_core_v1_CephFSPersistentVolumeSource(ref common.ReferenceC Type: []string{"object"}, Properties: map[string]spec.Schema{ "monitors": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "monitors is Required: Monitors is a collection of Ceph monitors More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", Type: []string{"array"}, @@ -4601,6 +4669,11 @@ func schema_k8sio_api_core_v1_CephFSVolumeSource(ref common.ReferenceCallback) c Type: []string{"object"}, Properties: map[string]spec.Schema{ "monitors": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "monitors is Required: Monitors is a collection of Ceph monitors More info: https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-it", Type: []string{"array"}, @@ -4919,6 +4992,10 @@ func schema_k8sio_api_core_v1_ComponentStatus(ref common.ReferenceCallback) comm "conditions": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "type", "x-kubernetes-patch-strategy": "merge", }, @@ -5078,7 +5155,8 @@ func schema_k8sio_api_core_v1_ConfigMapEnvSource(ref common.ReferenceCallback) c Properties: map[string]spec.Schema{ "name": { SchemaProps: spec.SchemaProps{ - Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Description: "Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", Type: []string{"string"}, Format: "", }, @@ -5105,7 +5183,8 @@ func schema_k8sio_api_core_v1_ConfigMapKeySelector(ref common.ReferenceCallback) Properties: map[string]spec.Schema{ "name": { SchemaProps: spec.SchemaProps{ - Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Description: "Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", Type: []string{"string"}, Format: "", }, @@ -5249,12 +5328,18 @@ func schema_k8sio_api_core_v1_ConfigMapProjection(ref common.ReferenceCallback) Properties: map[string]spec.Schema{ "name": { SchemaProps: spec.SchemaProps{ - Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Description: "Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", Type: []string{"string"}, Format: "", }, }, "items": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "items if unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'.", Type: []string{"array"}, @@ -5292,12 +5377,18 @@ func schema_k8sio_api_core_v1_ConfigMapVolumeSource(ref common.ReferenceCallback Properties: map[string]spec.Schema{ "name": { SchemaProps: spec.SchemaProps{ - Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Description: "Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", Type: []string{"string"}, Format: "", }, }, "items": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "items if unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'.", Type: []string{"array"}, @@ -5356,6 +5447,11 @@ func schema_k8sio_api_core_v1_Container(ref common.ReferenceCallback) common.Ope }, }, "command": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Entrypoint array. Not executed within a shell. The container image's ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. \"$$(VAR_NAME)\" will produce the string literal \"$(VAR_NAME)\". Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", Type: []string{"array"}, @@ -5371,6 +5467,11 @@ func schema_k8sio_api_core_v1_Container(ref common.ReferenceCallback) common.Ope }, }, "args": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Arguments to the entrypoint. The container image's CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. \"$$(VAR_NAME)\" will produce the string literal \"$(VAR_NAME)\". Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", Type: []string{"array"}, @@ -5418,6 +5519,11 @@ func schema_k8sio_api_core_v1_Container(ref common.ReferenceCallback) common.Ope }, }, "envFrom": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "List of sources to populate environment variables in the container. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.", Type: []string{"array"}, @@ -5434,6 +5540,10 @@ func schema_k8sio_api_core_v1_Container(ref common.ReferenceCallback) common.Ope "env": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge", }, @@ -5487,6 +5597,10 @@ func schema_k8sio_api_core_v1_Container(ref common.ReferenceCallback) common.Ope "volumeMounts": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "mountPath", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "mountPath", "x-kubernetes-patch-strategy": "merge", }, @@ -5507,6 +5621,10 @@ func schema_k8sio_api_core_v1_Container(ref common.ReferenceCallback) common.Ope "volumeDevices": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "devicePath", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "devicePath", "x-kubernetes-patch-strategy": "merge", }, @@ -5615,6 +5733,11 @@ func schema_k8sio_api_core_v1_ContainerImage(ref common.ReferenceCallback) commo Type: []string{"object"}, Properties: map[string]spec.Schema{ "names": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Names by which this image is known. e.g. [\"kubernetes.example/hyperkube:v1.0.7\", \"cloud-vendor.registry.example/cloud-vendor/hyperkube:v1.0.7\"]", Type: []string{"array"}, @@ -5964,12 +6087,36 @@ func schema_k8sio_api_core_v1_ContainerStatus(ref common.ReferenceCallback) comm Ref: ref("k8s.io/api/core/v1.ResourceRequirements"), }, }, + "volumeMounts": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "mountPath", + }, + "x-kubernetes-list-type": "map", + "x-kubernetes-patch-merge-key": "mountPath", + "x-kubernetes-patch-strategy": "merge", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "Status of volume mounts.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.VolumeMountStatus"), + }, + }, + }, + }, + }, }, Required: []string{"name", "ready", "restartCount", "image", "imageID"}, }, }, Dependencies: []string{ - "k8s.io/api/core/v1.ContainerState", "k8s.io/api/core/v1.ResourceRequirements", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + "k8s.io/api/core/v1.ContainerState", "k8s.io/api/core/v1.ResourceRequirements", "k8s.io/api/core/v1.VolumeMountStatus", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, } } @@ -6003,6 +6150,11 @@ func schema_k8sio_api_core_v1_DownwardAPIProjection(ref common.ReferenceCallback Type: []string{"object"}, Properties: map[string]spec.Schema{ "items": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Items is a list of DownwardAPIVolume file", Type: []string{"array"}, @@ -6041,7 +6193,7 @@ func schema_k8sio_api_core_v1_DownwardAPIVolumeFile(ref common.ReferenceCallback }, "fieldRef": { SchemaProps: spec.SchemaProps{ - Description: "Required: Selects a field of the pod: only annotations, labels, name and namespace are supported.", + Description: "Required: Selects a field of the pod: only annotations, labels, name, namespace and uid are supported.", Ref: ref("k8s.io/api/core/v1.ObjectFieldSelector"), }, }, @@ -6075,6 +6227,11 @@ func schema_k8sio_api_core_v1_DownwardAPIVolumeSource(ref common.ReferenceCallba Type: []string{"object"}, Properties: map[string]spec.Schema{ "items": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Items is a list of downward API volume file", Type: []string{"array"}, @@ -6237,6 +6394,11 @@ func schema_k8sio_api_core_v1_EndpointSubset(ref common.ReferenceCallback) commo Type: []string{"object"}, Properties: map[string]spec.Schema{ "addresses": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "IP addresses which offer the related ports that are marked as ready. These endpoints should be considered safe for load balancers and clients to utilize.", Type: []string{"array"}, @@ -6251,6 +6413,11 @@ func schema_k8sio_api_core_v1_EndpointSubset(ref common.ReferenceCallback) commo }, }, "notReadyAddresses": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "IP addresses which offer the related ports but are not currently marked as ready because they have not yet finished starting, have recently failed a readiness check, or have recently failed a liveness check.", Type: []string{"array"}, @@ -6265,6 +6432,11 @@ func schema_k8sio_api_core_v1_EndpointSubset(ref common.ReferenceCallback) commo }, }, "ports": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Port numbers available on the related IP addresses.", Type: []string{"array"}, @@ -6315,6 +6487,11 @@ func schema_k8sio_api_core_v1_Endpoints(ref common.ReferenceCallback) common.Ope }, }, "subsets": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "The set of all endpoints is the union of all subsets. Addresses are placed into subsets according to the IPs they share. A single address with multiple ports, some of which are ready and some of which are not (because they come from different containers) will result in the address being displayed in different subsets for the different ports. No address will appear in both Addresses and NotReadyAddresses in the same subset. Sets of addresses and ports that comprise a service.", Type: []string{"array"}, @@ -6520,6 +6697,11 @@ func schema_k8sio_api_core_v1_EphemeralContainer(ref common.ReferenceCallback) c }, }, "command": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Entrypoint array. Not executed within a shell. The image's ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. \"$$(VAR_NAME)\" will produce the string literal \"$(VAR_NAME)\". Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", Type: []string{"array"}, @@ -6535,6 +6717,11 @@ func schema_k8sio_api_core_v1_EphemeralContainer(ref common.ReferenceCallback) c }, }, "args": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Arguments to the entrypoint. The image's CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. \"$$(VAR_NAME)\" will produce the string literal \"$(VAR_NAME)\". Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", Type: []string{"array"}, @@ -6582,6 +6769,11 @@ func schema_k8sio_api_core_v1_EphemeralContainer(ref common.ReferenceCallback) c }, }, "envFrom": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "List of sources to populate environment variables in the container. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.", Type: []string{"array"}, @@ -6598,6 +6790,10 @@ func schema_k8sio_api_core_v1_EphemeralContainer(ref common.ReferenceCallback) c "env": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge", }, @@ -6651,6 +6847,10 @@ func schema_k8sio_api_core_v1_EphemeralContainer(ref common.ReferenceCallback) c "volumeMounts": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "mountPath", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "mountPath", "x-kubernetes-patch-strategy": "merge", }, @@ -6671,6 +6871,10 @@ func schema_k8sio_api_core_v1_EphemeralContainer(ref common.ReferenceCallback) c "volumeDevices": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "devicePath", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "devicePath", "x-kubernetes-patch-strategy": "merge", }, @@ -6801,6 +7005,11 @@ func schema_k8sio_api_core_v1_EphemeralContainerCommon(ref common.ReferenceCallb }, }, "command": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Entrypoint array. Not executed within a shell. The image's ENTRYPOINT is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. \"$$(VAR_NAME)\" will produce the string literal \"$(VAR_NAME)\". Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", Type: []string{"array"}, @@ -6816,6 +7025,11 @@ func schema_k8sio_api_core_v1_EphemeralContainerCommon(ref common.ReferenceCallb }, }, "args": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Arguments to the entrypoint. The image's CMD is used if this is not provided. Variable references $(VAR_NAME) are expanded using the container's environment. If a variable cannot be resolved, the reference in the input string will be unchanged. Double $$ are reduced to a single $, which allows for escaping the $(VAR_NAME) syntax: i.e. \"$$(VAR_NAME)\" will produce the string literal \"$(VAR_NAME)\". Escaped references will never be expanded, regardless of whether the variable exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell", Type: []string{"array"}, @@ -6863,6 +7077,11 @@ func schema_k8sio_api_core_v1_EphemeralContainerCommon(ref common.ReferenceCallb }, }, "envFrom": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "List of sources to populate environment variables in the container. The keys defined within a source must be a C_IDENTIFIER. All invalid keys will be reported as an event when the container is starting. When a key exists in multiple sources, the value associated with the last source will take precedence. Values defined by an Env with a duplicate key will take precedence. Cannot be updated.", Type: []string{"array"}, @@ -6879,6 +7098,10 @@ func schema_k8sio_api_core_v1_EphemeralContainerCommon(ref common.ReferenceCallb "env": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge", }, @@ -6932,6 +7155,10 @@ func schema_k8sio_api_core_v1_EphemeralContainerCommon(ref common.ReferenceCallb "volumeMounts": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "mountPath", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "mountPath", "x-kubernetes-patch-strategy": "merge", }, @@ -6952,6 +7179,10 @@ func schema_k8sio_api_core_v1_EphemeralContainerCommon(ref common.ReferenceCallb "volumeDevices": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "devicePath", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "devicePath", "x-kubernetes-patch-strategy": "merge", }, @@ -7319,6 +7550,11 @@ func schema_k8sio_api_core_v1_ExecAction(ref common.ReferenceCallback) common.Op Type: []string{"object"}, Properties: map[string]spec.Schema{ "command": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Command is the command line to execute inside the container, the working directory for the command is root ('/') in the container's filesystem. The command is simply exec'd, it is not run inside a shell, so traditional shell instructions ('|', etc) won't work. To use a shell, you need to explicitly call out to that shell. Exit status of 0 is treated as live/healthy and non-zero is unhealthy.", Type: []string{"array"}, @@ -7347,6 +7583,11 @@ func schema_k8sio_api_core_v1_FCVolumeSource(ref common.ReferenceCallback) commo Type: []string{"object"}, Properties: map[string]spec.Schema{ "targetWWNs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "targetWWNs is Optional: FC target worldwide names (WWNs)", Type: []string{"array"}, @@ -7383,6 +7624,11 @@ func schema_k8sio_api_core_v1_FCVolumeSource(ref common.ReferenceCallback) commo }, }, "wwids": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "wwids Optional: FC volume world wide identifiers (wwids) Either wwids or combination of targetWWNs and lun must be set, but not both simultaneously.", Type: []string{"array"}, @@ -7775,6 +8021,11 @@ func schema_k8sio_api_core_v1_HTTPGetAction(ref common.ReferenceCallback) common }, }, "httpHeaders": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Custom headers to set in the request. HTTP allows repeated headers.", Type: []string{"array"}, @@ -7837,11 +8088,17 @@ func schema_k8sio_api_core_v1_HostAlias(ref common.ReferenceCallback) common.Ope "ip": { SchemaProps: spec.SchemaProps{ Description: "IP address of the host file entry.", + Default: "", Type: []string{"string"}, Format: "", }, }, "hostnames": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Hostnames for the above IP address.", Type: []string{"array"}, @@ -7857,6 +8114,7 @@ func schema_k8sio_api_core_v1_HostAlias(ref common.ReferenceCallback) common.Ope }, }, }, + Required: []string{"ip"}, }, }, } @@ -7965,6 +8223,11 @@ func schema_k8sio_api_core_v1_ISCSIPersistentVolumeSource(ref common.ReferenceCa }, }, "portals": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "portals is the iSCSI Target Portal List. The Portal is either an IP or ip_addr:port if the port is other than default (typically TCP ports 860 and 3260).", Type: []string{"array"}, @@ -8068,8 +8331,13 @@ func schema_k8sio_api_core_v1_ISCSIVolumeSource(ref common.ReferenceCallback) co }, }, "portals": { - SchemaProps: spec.SchemaProps{ - Description: "portals is the iSCSI Target Portal List. The portal is either an IP or ip_addr:port if the port is other than default (typically TCP ports 860 and 3260).", + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "portals is the iSCSI Target Portal List. The portal is either an IP or ip_addr:port if the port is other than default (typically TCP ports 860 and 3260).", Type: []string{"array"}, Items: &spec.SchemaOrArray{ Schema: &spec.Schema{ @@ -8417,6 +8685,11 @@ func schema_k8sio_api_core_v1_LimitRangeSpec(ref common.ReferenceCallback) commo Type: []string{"object"}, Properties: map[string]spec.Schema{ "limits": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Limits is the list of LimitRangeItem objects that are enforced.", Type: []string{"array"}, @@ -8552,6 +8825,11 @@ func schema_k8sio_api_core_v1_LoadBalancerStatus(ref common.ReferenceCallback) c Type: []string{"object"}, Properties: map[string]spec.Schema{ "ingress": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Ingress is a list containing ingress points for the load-balancer. Traffic intended for the service should be sent to these ingress points.", Type: []string{"array"}, @@ -8582,7 +8860,8 @@ func schema_k8sio_api_core_v1_LocalObjectReference(ref common.ReferenceCallback) Properties: map[string]spec.Schema{ "name": { SchemaProps: spec.SchemaProps{ - Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Description: "Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", Type: []string{"string"}, Format: "", }, @@ -8852,6 +9131,11 @@ func schema_k8sio_api_core_v1_NamespaceSpec(ref common.ReferenceCallback) common Type: []string{"object"}, Properties: map[string]spec.Schema{ "finalizers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Finalizers is an opaque list of values that must be empty to permanently remove object from storage. More info: https://kubernetes.io/docs/tasks/administer-cluster/namespaces/", Type: []string{"array"}, @@ -8890,6 +9174,10 @@ func schema_k8sio_api_core_v1_NamespaceStatus(ref common.ReferenceCallback) comm "conditions": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "type", "x-kubernetes-patch-strategy": "merge", }, @@ -9009,6 +9297,11 @@ func schema_k8sio_api_core_v1_NodeAffinity(ref common.ReferenceCallback) common. }, }, "preferredDuringSchedulingIgnoredDuringExecution": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding \"weight\" to the sum if the node matches the corresponding matchExpressions; the node(s) with the highest sum are the most preferred.", Type: []string{"array"}, @@ -9256,33 +9549,52 @@ func schema_k8sio_api_core_v1_NodeProxyOptions(ref common.ReferenceCallback) com } } -func schema_k8sio_api_core_v1_NodeResources(ref common.ReferenceCallback) common.OpenAPIDefinition { +func schema_k8sio_api_core_v1_NodeRuntimeHandler(ref common.ReferenceCallback) common.OpenAPIDefinition { return common.OpenAPIDefinition{ Schema: spec.Schema{ SchemaProps: spec.SchemaProps{ - Description: "NodeResources is an object for conveying resource information about a node. see https://kubernetes.io/docs/concepts/architecture/nodes/#capacity for more details.", + Description: "NodeRuntimeHandler is a set of runtime handler information.", Type: []string{"object"}, Properties: map[string]spec.Schema{ - "Capacity": { + "name": { SchemaProps: spec.SchemaProps{ - Description: "Capacity represents the available resources of a node", - Type: []string{"object"}, - AdditionalProperties: &spec.SchemaOrBool{ - Allows: true, - Schema: &spec.Schema{ - SchemaProps: spec.SchemaProps{ - Ref: ref("k8s.io/apimachinery/pkg/api/resource.Quantity"), - }, - }, - }, + Description: "Runtime handler name. Empty for the default runtime handler.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "features": { + SchemaProps: spec.SchemaProps{ + Description: "Supported features.", + Ref: ref("k8s.io/api/core/v1.NodeRuntimeHandlerFeatures"), }, }, }, - Required: []string{"Capacity"}, }, }, Dependencies: []string{ - "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + "k8s.io/api/core/v1.NodeRuntimeHandlerFeatures"}, + } +} + +func schema_k8sio_api_core_v1_NodeRuntimeHandlerFeatures(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "NodeRuntimeHandlerFeatures is a set of runtime features.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "recursiveReadOnlyMounts": { + SchemaProps: spec.SchemaProps{ + Description: "RecursiveReadOnlyMounts is set to true if the runtime handler supports RecursiveReadOnlyMounts.", + Type: []string{"boolean"}, + Format: "", + }, + }, + }, + }, + }, } } @@ -9294,6 +9606,11 @@ func schema_k8sio_api_core_v1_NodeSelector(ref common.ReferenceCallback) common. Type: []string{"object"}, Properties: map[string]spec.Schema{ "nodeSelectorTerms": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Required. A list of node selector terms. The terms are ORed.", Type: []string{"array"}, @@ -9346,6 +9663,11 @@ func schema_k8sio_api_core_v1_NodeSelectorRequirement(ref common.ReferenceCallba }, }, "values": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch.", Type: []string{"array"}, @@ -9375,6 +9697,11 @@ func schema_k8sio_api_core_v1_NodeSelectorTerm(ref common.ReferenceCallback) com Type: []string{"object"}, Properties: map[string]spec.Schema{ "matchExpressions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A list of node selector requirements by node's labels.", Type: []string{"array"}, @@ -9389,6 +9716,11 @@ func schema_k8sio_api_core_v1_NodeSelectorTerm(ref common.ReferenceCallback) com }, }, "matchFields": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A list of node selector requirements by node's fields.", Type: []string{"array"}, @@ -9432,6 +9764,7 @@ func schema_k8sio_api_core_v1_NodeSpec(ref common.ReferenceCallback) common.Open "podCIDRs": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", "x-kubernetes-patch-strategy": "merge", }, }, @@ -9464,6 +9797,11 @@ func schema_k8sio_api_core_v1_NodeSpec(ref common.ReferenceCallback) common.Open }, }, "taints": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "If specified, the node's taints.", Type: []string{"array"}, @@ -9544,6 +9882,10 @@ func schema_k8sio_api_core_v1_NodeStatus(ref common.ReferenceCallback) common.Op "conditions": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "type", "x-kubernetes-patch-strategy": "merge", }, @@ -9564,6 +9906,10 @@ func schema_k8sio_api_core_v1_NodeStatus(ref common.ReferenceCallback) common.Op "addresses": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "type", "x-kubernetes-patch-strategy": "merge", }, @@ -9596,6 +9942,11 @@ func schema_k8sio_api_core_v1_NodeStatus(ref common.ReferenceCallback) common.Op }, }, "images": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "List of container images on this node", Type: []string{"array"}, @@ -9610,6 +9961,11 @@ func schema_k8sio_api_core_v1_NodeStatus(ref common.ReferenceCallback) common.Op }, }, "volumesInUse": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "List of attachable volumes in use (mounted) by the node.", Type: []string{"array"}, @@ -9625,6 +9981,11 @@ func schema_k8sio_api_core_v1_NodeStatus(ref common.ReferenceCallback) common.Op }, }, "volumesAttached": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "List of volumes that are attached to the node.", Type: []string{"array"}, @@ -9644,11 +10005,30 @@ func schema_k8sio_api_core_v1_NodeStatus(ref common.ReferenceCallback) common.Op Ref: ref("k8s.io/api/core/v1.NodeConfigStatus"), }, }, + "runtimeHandlers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, + SchemaProps: spec.SchemaProps{ + Description: "The available runtime handlers.", + Type: []string{"array"}, + Items: &spec.SchemaOrArray{ + Schema: &spec.Schema{ + SchemaProps: spec.SchemaProps{ + Default: map[string]interface{}{}, + Ref: ref("k8s.io/api/core/v1.NodeRuntimeHandler"), + }, + }, + }, + }, + }, }, }, }, Dependencies: []string{ - "k8s.io/api/core/v1.AttachedVolume", "k8s.io/api/core/v1.ContainerImage", "k8s.io/api/core/v1.NodeAddress", "k8s.io/api/core/v1.NodeCondition", "k8s.io/api/core/v1.NodeConfigStatus", "k8s.io/api/core/v1.NodeDaemonEndpoints", "k8s.io/api/core/v1.NodeSystemInfo", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, + "k8s.io/api/core/v1.AttachedVolume", "k8s.io/api/core/v1.ContainerImage", "k8s.io/api/core/v1.NodeAddress", "k8s.io/api/core/v1.NodeCondition", "k8s.io/api/core/v1.NodeConfigStatus", "k8s.io/api/core/v1.NodeDaemonEndpoints", "k8s.io/api/core/v1.NodeRuntimeHandler", "k8s.io/api/core/v1.NodeSystemInfo", "k8s.io/apimachinery/pkg/api/resource.Quantity"}, } } @@ -9982,7 +10362,7 @@ func schema_k8sio_api_core_v1_PersistentVolumeClaimCondition(ref common.Referenc }, "reason": { SchemaProps: spec.SchemaProps{ - Description: "reason is a unique, this should be a short, machine understandable string that gives the reason for condition's last transition. If it reports \"ResizeStarted\" that means the underlying persistent volume is being resized.", + Description: "reason is a unique, this should be a short, machine understandable string that gives the reason for condition's last transition. If it reports \"Resizing\" that means the underlying persistent volume is being resized.", Type: []string{"string"}, Format: "", }, @@ -10062,6 +10442,11 @@ func schema_k8sio_api_core_v1_PersistentVolumeClaimSpec(ref common.ReferenceCall Type: []string{"object"}, Properties: map[string]spec.Schema{ "accessModes": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "accessModes contains the desired access modes the volume should have. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1", Type: []string{"array"}, @@ -10071,6 +10456,7 @@ func schema_k8sio_api_core_v1_PersistentVolumeClaimSpec(ref common.ReferenceCall Default: "", Type: []string{"string"}, Format: "", + Enum: []interface{}{"ReadOnlyMany", "ReadWriteMany", "ReadWriteOnce", "ReadWriteOncePod"}, }, }, }, @@ -10125,7 +10511,7 @@ func schema_k8sio_api_core_v1_PersistentVolumeClaimSpec(ref common.ReferenceCall }, "volumeAttributesClassName": { SchemaProps: spec.SchemaProps{ - Description: "volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#volumeattributesclass (Alpha) Using this field requires the VolumeAttributesClass feature gate to be enabled.", + Description: "volumeAttributesClassName may be used to set the VolumeAttributesClass used by this claim. If specified, the CSI driver will create or update the volume with the attributes defined in the corresponding VolumeAttributesClass. This has a different purpose than storageClassName, it can be changed after the claim is created. An empty string value means that no VolumeAttributesClass will be applied to the claim but it's not allowed to reset this field to empty string once it is set. If unspecified and the PersistentVolumeClaim is unbound, the default VolumeAttributesClass will be set by the persistentvolume controller if it exists. If the resource referred to by volumeAttributesClass does not exist, this PersistentVolumeClaim will be set to a Pending state, as reflected by the modifyVolumeStatus field, until such as a resource exists. More info: https://kubernetes.io/docs/concepts/storage/volume-attributes-classes/ (Alpha) Using this field requires the VolumeAttributesClass feature gate to be enabled.", Type: []string{"string"}, Format: "", }, @@ -10154,6 +10540,11 @@ func schema_k8sio_api_core_v1_PersistentVolumeClaimStatus(ref common.ReferenceCa }, }, "accessModes": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "accessModes contains the actual access modes the volume backing the PVC has. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes-1", Type: []string{"array"}, @@ -10163,6 +10554,7 @@ func schema_k8sio_api_core_v1_PersistentVolumeClaimStatus(ref common.ReferenceCa Default: "", Type: []string{"string"}, Format: "", + Enum: []interface{}{"ReadOnlyMany", "ReadWriteMany", "ReadWriteOnce", "ReadWriteOncePod"}, }, }, }, @@ -10185,12 +10577,16 @@ func schema_k8sio_api_core_v1_PersistentVolumeClaimStatus(ref common.ReferenceCa "conditions": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "type", "x-kubernetes-patch-strategy": "merge", }, }, SchemaProps: spec.SchemaProps{ - Description: "conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'ResizeStarted'.", + Description: "conditions is the current Condition of persistent volume claim. If underlying persistent volume is being resized then the Condition will be set to 'Resizing'.", Type: []string{"array"}, Items: &spec.SchemaOrArray{ Schema: &spec.Schema{ @@ -10232,6 +10628,7 @@ func schema_k8sio_api_core_v1_PersistentVolumeClaimStatus(ref common.ReferenceCa Default: "", Type: []string{"string"}, Format: "", + Enum: []interface{}{"ControllerResizeFailed", "ControllerResizeInProgress", "NodeResizeFailed", "NodeResizeInProgress", "NodeResizePending"}, }, }, }, @@ -10669,6 +11066,11 @@ func schema_k8sio_api_core_v1_PersistentVolumeSpec(ref common.ReferenceCallback) }, }, "accessModes": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "accessModes contains all ways the volume can be mounted. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#access-modes", Type: []string{"array"}, @@ -10678,6 +11080,7 @@ func schema_k8sio_api_core_v1_PersistentVolumeSpec(ref common.ReferenceCallback) Default: "", Type: []string{"string"}, Format: "", + Enum: []interface{}{"ReadOnlyMany", "ReadWriteMany", "ReadWriteOnce", "ReadWriteOncePod"}, }, }, }, @@ -10710,6 +11113,11 @@ func schema_k8sio_api_core_v1_PersistentVolumeSpec(ref common.ReferenceCallback) }, }, "mountOptions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "mountOptions is the list of mount options, e.g. [\"ro\", \"soft\"]. Not validated - mount will simply fail if one is invalid. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#mount-options", Type: []string{"array"}, @@ -10883,6 +11291,11 @@ func schema_k8sio_api_core_v1_PodAffinity(ref common.ReferenceCallback) common.O Type: []string{"object"}, Properties: map[string]spec.Schema{ "requiredDuringSchedulingIgnoredDuringExecution": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied.", Type: []string{"array"}, @@ -10897,6 +11310,11 @@ func schema_k8sio_api_core_v1_PodAffinity(ref common.ReferenceCallback) common.O }, }, "preferredDuringSchedulingIgnoredDuringExecution": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding \"weight\" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred.", Type: []string{"array"}, @@ -10932,6 +11350,11 @@ func schema_k8sio_api_core_v1_PodAffinityTerm(ref common.ReferenceCallback) comm }, }, "namespaces": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means \"this pod's namespace\".", Type: []string{"array"}, @@ -10967,7 +11390,7 @@ func schema_k8sio_api_core_v1_PodAffinityTerm(ref common.ReferenceCallback) comm }, }, SchemaProps: spec.SchemaProps{ - Description: "MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `LabelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both MatchLabelKeys and LabelSelector. Also, MatchLabelKeys cannot be set when LabelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.", + Description: "MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.", Type: []string{"array"}, Items: &spec.SchemaOrArray{ Schema: &spec.Schema{ @@ -10987,7 +11410,7 @@ func schema_k8sio_api_core_v1_PodAffinityTerm(ref common.ReferenceCallback) comm }, }, SchemaProps: spec.SchemaProps{ - Description: "MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `LabelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both MismatchLabelKeys and LabelSelector. Also, MismatchLabelKeys cannot be set when LabelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.", + Description: "MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. This is an alpha field and requires enabling MatchLabelKeysInPodAffinity feature gate.", Type: []string{"array"}, Items: &spec.SchemaOrArray{ Schema: &spec.Schema{ @@ -11017,6 +11440,11 @@ func schema_k8sio_api_core_v1_PodAntiAffinity(ref common.ReferenceCallback) comm Type: []string{"object"}, Properties: map[string]spec.Schema{ "requiredDuringSchedulingIgnoredDuringExecution": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied.", Type: []string{"array"}, @@ -11031,6 +11459,11 @@ func schema_k8sio_api_core_v1_PodAntiAffinity(ref common.ReferenceCallback) comm }, }, "preferredDuringSchedulingIgnoredDuringExecution": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding \"weight\" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred.", Type: []string{"array"}, @@ -11180,6 +11613,11 @@ func schema_k8sio_api_core_v1_PodDNSConfig(ref common.ReferenceCallback) common. Type: []string{"object"}, Properties: map[string]spec.Schema{ "nameservers": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A list of DNS name server IP addresses. This will be appended to the base nameservers generated from DNSPolicy. Duplicated nameservers will be removed.", Type: []string{"array"}, @@ -11195,6 +11633,11 @@ func schema_k8sio_api_core_v1_PodDNSConfig(ref common.ReferenceCallback) common. }, }, "searches": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A list of DNS search domains for host-name lookup. This will be appended to the base search paths generated from DNSPolicy. Duplicated search paths will be removed.", Type: []string{"array"}, @@ -11210,6 +11653,11 @@ func schema_k8sio_api_core_v1_PodDNSConfig(ref common.ReferenceCallback) common. }, }, "options": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A list of DNS resolver options. This will be merged with the base options generated from DNSPolicy. Duplicated entries will be removed. Resolution options given in Options will override those that appear in the base DNSPolicy.", Type: []string{"array"}, @@ -11314,6 +11762,11 @@ func schema_k8sio_api_core_v1_PodExecOptions(ref common.ReferenceCallback) commo }, }, "command": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Command is the remote command to execute. argv array. Not executed within a shell.", Type: []string{"array"}, @@ -11541,6 +11994,11 @@ func schema_k8sio_api_core_v1_PodPortForwardOptions(ref common.ReferenceCallback }, }, "ports": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "List of ports to forward Required when using WebSockets", Type: []string{"array"}, @@ -11740,6 +12198,11 @@ func schema_k8sio_api_core_v1_PodSecurityContext(ref common.ReferenceCallback) c }, }, "supplementalGroups": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows.", Type: []string{"array"}, @@ -11762,6 +12225,11 @@ func schema_k8sio_api_core_v1_PodSecurityContext(ref common.ReferenceCallback) c }, }, "sysctls": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows.", Type: []string{"array"}, @@ -11789,11 +12257,17 @@ func schema_k8sio_api_core_v1_PodSecurityContext(ref common.ReferenceCallback) c Ref: ref("k8s.io/api/core/v1.SeccompProfile"), }, }, + "appArmorProfile": { + SchemaProps: spec.SchemaProps{ + Description: "appArmorProfile is the AppArmor options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows.", + Ref: ref("k8s.io/api/core/v1.AppArmorProfile"), + }, + }, }, }, }, Dependencies: []string{ - "k8s.io/api/core/v1.SELinuxOptions", "k8s.io/api/core/v1.SeccompProfile", "k8s.io/api/core/v1.Sysctl", "k8s.io/api/core/v1.WindowsSecurityContextOptions"}, + "k8s.io/api/core/v1.AppArmorProfile", "k8s.io/api/core/v1.SELinuxOptions", "k8s.io/api/core/v1.SeccompProfile", "k8s.io/api/core/v1.Sysctl", "k8s.io/api/core/v1.WindowsSecurityContextOptions"}, } } @@ -11828,6 +12302,10 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA "volumes": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge,retainKeys", }, @@ -11848,6 +12326,10 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA "initContainers": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge", }, @@ -11868,6 +12350,10 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA "containers": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge", }, @@ -11888,6 +12374,10 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA "ephemeralContainers": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge", }, @@ -11965,7 +12455,7 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA }, "serviceAccount": { SchemaProps: spec.SchemaProps{ - Description: "DeprecatedServiceAccount is a depreciated alias for ServiceAccountName. Deprecated: Use serviceAccountName instead.", + Description: "DeprecatedServiceAccount is a deprecated alias for ServiceAccountName. Deprecated: Use serviceAccountName instead.", Type: []string{"string"}, Format: "", }, @@ -12021,6 +12511,10 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA "imagePullSecrets": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge", }, @@ -12066,6 +12560,11 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA }, }, "tolerations": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "If specified, the pod's tolerations.", Type: []string{"array"}, @@ -12082,12 +12581,16 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA "hostAliases": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "ip", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "ip", "x-kubernetes-patch-strategy": "merge", }, }, SchemaProps: spec.SchemaProps{ - Description: "HostAliases is an optional list of hosts and IPs that will be injected into the pod's hosts file if specified. This is only valid for non-hostNetwork pods.", + Description: "HostAliases is an optional list of hosts and IPs that will be injected into the pod's hosts file if specified.", Type: []string{"array"}, Items: &spec.SchemaOrArray{ Schema: &spec.Schema{ @@ -12120,6 +12623,11 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA }, }, "readinessGates": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "If specified, all readiness gates will be evaluated for pod readiness. A pod is ready when all its containers are ready AND all conditions specified in the readiness gates have status equal to \"True\" More info: https://git.k8s.io/enhancements/keps/sig-network/580-pod-readiness-gates", Type: []string{"array"}, @@ -12203,7 +12711,7 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA }, "os": { SchemaProps: spec.SchemaProps{ - Description: "Specifies the OS of the containers in the pod. Some pod and container fields are restricted if this is set.\n\nIf the OS field is set to linux, the following fields must be unset: -securityContext.windowsOptions\n\nIf the OS field is set to windows, following fields must be unset: - spec.hostPID - spec.hostIPC - spec.hostUsers - spec.securityContext.seLinuxOptions - spec.securityContext.seccompProfile - spec.securityContext.fsGroup - spec.securityContext.fsGroupChangePolicy - spec.securityContext.sysctls - spec.shareProcessNamespace - spec.securityContext.runAsUser - spec.securityContext.runAsGroup - spec.securityContext.supplementalGroups - spec.containers[*].securityContext.seLinuxOptions - spec.containers[*].securityContext.seccompProfile - spec.containers[*].securityContext.capabilities - spec.containers[*].securityContext.readOnlyRootFilesystem - spec.containers[*].securityContext.privileged - spec.containers[*].securityContext.allowPrivilegeEscalation - spec.containers[*].securityContext.procMount - spec.containers[*].securityContext.runAsUser - spec.containers[*].securityContext.runAsGroup", + Description: "Specifies the OS of the containers in the pod. Some pod and container fields are restricted if this is set.\n\nIf the OS field is set to linux, the following fields must be unset: -securityContext.windowsOptions\n\nIf the OS field is set to windows, following fields must be unset: - spec.hostPID - spec.hostIPC - spec.hostUsers - spec.securityContext.appArmorProfile - spec.securityContext.seLinuxOptions - spec.securityContext.seccompProfile - spec.securityContext.fsGroup - spec.securityContext.fsGroupChangePolicy - spec.securityContext.sysctls - spec.shareProcessNamespace - spec.securityContext.runAsUser - spec.securityContext.runAsGroup - spec.securityContext.supplementalGroups - spec.containers[*].securityContext.appArmorProfile - spec.containers[*].securityContext.seLinuxOptions - spec.containers[*].securityContext.seccompProfile - spec.containers[*].securityContext.capabilities - spec.containers[*].securityContext.readOnlyRootFilesystem - spec.containers[*].securityContext.privileged - spec.containers[*].securityContext.allowPrivilegeEscalation - spec.containers[*].securityContext.procMount - spec.containers[*].securityContext.runAsUser - spec.containers[*].securityContext.runAsGroup", Ref: ref("k8s.io/api/core/v1.PodOS"), }, }, @@ -12226,7 +12734,7 @@ func schema_k8sio_api_core_v1_PodSpec(ref common.ReferenceCallback) common.OpenA }, }, SchemaProps: spec.SchemaProps{ - Description: "SchedulingGates is an opaque list of values that if specified will block scheduling the pod. If schedulingGates is not empty, the pod will stay in the SchedulingGated state and the scheduler will not attempt to schedule the pod.\n\nSchedulingGates can only be set at pod creation time, and be removed only afterwards.\n\nThis is a beta feature enabled by the PodSchedulingReadiness feature gate.", + Description: "SchedulingGates is an opaque list of values that if specified will block scheduling the pod. If schedulingGates is not empty, the pod will stay in the SchedulingGated state and the scheduler will not attempt to schedule the pod.\n\nSchedulingGates can only be set at pod creation time, and be removed only afterwards.", Type: []string{"array"}, Items: &spec.SchemaOrArray{ Schema: &spec.Schema{ @@ -12289,6 +12797,10 @@ func schema_k8sio_api_core_v1_PodStatus(ref common.ReferenceCallback) common.Ope "conditions": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "type", "x-kubernetes-patch-strategy": "merge", }, @@ -12365,6 +12877,10 @@ func schema_k8sio_api_core_v1_PodStatus(ref common.ReferenceCallback) common.Ope "podIPs": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "ip", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "ip", "x-kubernetes-patch-strategy": "merge", }, @@ -12389,6 +12905,11 @@ func schema_k8sio_api_core_v1_PodStatus(ref common.ReferenceCallback) common.Ope }, }, "initContainerStatuses": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "The list has one entry per init container in the manifest. The most recent successful init container will have ready = true, the most recently started container will have startTime set. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status", Type: []string{"array"}, @@ -12401,8 +12922,13 @@ func schema_k8sio_api_core_v1_PodStatus(ref common.ReferenceCallback) common.Ope }, }, }, - }, - "containerStatuses": { + }, + "containerStatuses": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "The list has one entry per container in the manifest. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-status", Type: []string{"array"}, @@ -12425,6 +12951,11 @@ func schema_k8sio_api_core_v1_PodStatus(ref common.ReferenceCallback) common.Ope }, }, "ephemeralContainerStatuses": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Status for any ephemeral containers that have run in this pod.", Type: []string{"array"}, @@ -12918,6 +13449,11 @@ func schema_k8sio_api_core_v1_ProjectedVolumeSource(ref common.ReferenceCallback Type: []string{"object"}, Properties: map[string]spec.Schema{ "sources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "sources is the list of volume projections", Type: []string{"array"}, @@ -13012,6 +13548,11 @@ func schema_k8sio_api_core_v1_RBDPersistentVolumeSource(ref common.ReferenceCall Type: []string{"object"}, Properties: map[string]spec.Schema{ "monitors": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "monitors is a collection of Ceph monitors. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", Type: []string{"array"}, @@ -13092,6 +13633,11 @@ func schema_k8sio_api_core_v1_RBDVolumeSource(ref common.ReferenceCallback) comm Type: []string{"object"}, Properties: map[string]spec.Schema{ "monitors": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "monitors is a collection of Ceph monitors. More info: https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it", Type: []string{"array"}, @@ -13471,6 +14017,10 @@ func schema_k8sio_api_core_v1_ReplicationControllerStatus(ref common.ReferenceCa "conditions": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "type", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "type", "x-kubernetes-patch-strategy": "merge", }, @@ -13684,6 +14234,11 @@ func schema_k8sio_api_core_v1_ResourceQuotaSpec(ref common.ReferenceCallback) co }, }, "scopes": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A collection of filters that must match each object tracked by a quota. If not specified, the quota matches all objects.", Type: []string{"array"}, @@ -13693,6 +14248,7 @@ func schema_k8sio_api_core_v1_ResourceQuotaSpec(ref common.ReferenceCallback) co Default: "", Type: []string{"string"}, Format: "", + Enum: []interface{}{"BestEffort", "CrossNamespacePodAffinity", "NotBestEffort", "NotTerminating", "PriorityClass", "Terminating"}, }, }, }, @@ -14043,6 +14599,11 @@ func schema_k8sio_api_core_v1_ScopeSelector(ref common.ReferenceCallback) common Type: []string{"object"}, Properties: map[string]spec.Schema{ "matchExpressions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A list of scope selector requirements by scope of the resources.", Type: []string{"array"}, @@ -14095,6 +14656,11 @@ func schema_k8sio_api_core_v1_ScopedResourceSelectorRequirement(ref common.Refer }, }, "values": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.", Type: []string{"array"}, @@ -14248,7 +14814,8 @@ func schema_k8sio_api_core_v1_SecretEnvSource(ref common.ReferenceCallback) comm Properties: map[string]spec.Schema{ "name": { SchemaProps: spec.SchemaProps{ - Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Description: "Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", Type: []string{"string"}, Format: "", }, @@ -14275,7 +14842,8 @@ func schema_k8sio_api_core_v1_SecretKeySelector(ref common.ReferenceCallback) co Properties: map[string]spec.Schema{ "name": { SchemaProps: spec.SchemaProps{ - Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Description: "Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", Type: []string{"string"}, Format: "", }, @@ -14367,12 +14935,18 @@ func schema_k8sio_api_core_v1_SecretProjection(ref common.ReferenceCallback) com Properties: map[string]spec.Schema{ "name": { SchemaProps: spec.SchemaProps{ - Description: "Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Description: "Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names", + Default: "", Type: []string{"string"}, Format: "", }, }, "items": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "items if unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'.", Type: []string{"array"}, @@ -14448,6 +15022,11 @@ func schema_k8sio_api_core_v1_SecretVolumeSource(ref common.ReferenceCallback) c }, }, "items": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "items If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'.", Type: []string{"array"}, @@ -14564,11 +15143,17 @@ func schema_k8sio_api_core_v1_SecurityContext(ref common.ReferenceCallback) comm Ref: ref("k8s.io/api/core/v1.SeccompProfile"), }, }, + "appArmorProfile": { + SchemaProps: spec.SchemaProps{ + Description: "appArmorProfile is the AppArmor options to use by this container. If set, this profile overrides the pod's appArmorProfile. Note that this field cannot be set when spec.os.name is windows.", + Ref: ref("k8s.io/api/core/v1.AppArmorProfile"), + }, + }, }, }, }, Dependencies: []string{ - "k8s.io/api/core/v1.Capabilities", "k8s.io/api/core/v1.SELinuxOptions", "k8s.io/api/core/v1.SeccompProfile", "k8s.io/api/core/v1.WindowsSecurityContextOptions"}, + "k8s.io/api/core/v1.AppArmorProfile", "k8s.io/api/core/v1.Capabilities", "k8s.io/api/core/v1.SELinuxOptions", "k8s.io/api/core/v1.SeccompProfile", "k8s.io/api/core/v1.WindowsSecurityContextOptions"}, } } @@ -14689,6 +15274,10 @@ func schema_k8sio_api_core_v1_ServiceAccount(ref common.ReferenceCallback) commo "secrets": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "name", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "name", "x-kubernetes-patch-strategy": "merge", }, @@ -14707,6 +15296,11 @@ func schema_k8sio_api_core_v1_ServiceAccount(ref common.ReferenceCallback) commo }, }, "imagePullSecrets": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "ImagePullSecrets is a list of references to secrets in the same namespace to use for pulling any images in pods that reference this ServiceAccount. ImagePullSecrets are distinct from Secrets because Secrets can be mounted in the pod, but ImagePullSecrets are only accessed by the kubelet. More info: https://kubernetes.io/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod", Type: []string{"array"}, @@ -15056,6 +15650,11 @@ func schema_k8sio_api_core_v1_ServiceSpec(ref common.ReferenceCallback) common.O }, }, "externalIPs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "externalIPs is a list of IP addresses for which nodes in the cluster will also accept traffic for this service. These IPs are not managed by Kubernetes. The user is responsible for ensuring that traffic arrives at a node with this IP. A common example is external load-balancers that are not part of the Kubernetes system.", Type: []string{"array"}, @@ -15086,6 +15685,11 @@ func schema_k8sio_api_core_v1_ServiceSpec(ref common.ReferenceCallback) common.O }, }, "loadBalancerSourceRanges": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "If specified and supported by the platform, this will restrict traffic through the cloud-provider load-balancer will be restricted to the specified client IPs. This field will be ignored if the cloud-provider does not support the feature.\" More info: https://kubernetes.io/docs/tasks/access-application-cluster/create-external-load-balancer/", Type: []string{"array"}, @@ -15109,10 +15713,10 @@ func schema_k8sio_api_core_v1_ServiceSpec(ref common.ReferenceCallback) common.O }, "externalTrafficPolicy": { SchemaProps: spec.SchemaProps{ - Description: "externalTrafficPolicy describes how nodes distribute service traffic they receive on one of the Service's \"externally-facing\" addresses (NodePorts, ExternalIPs, and LoadBalancer IPs). If set to \"Local\", the proxy will configure the service in a way that assumes that external load balancers will take care of balancing the service traffic between nodes, and so each node will deliver traffic only to the node-local endpoints of the service, without masquerading the client source IP. (Traffic mistakenly sent to a node with no endpoints will be dropped.) The default value, \"Cluster\", uses the standard behavior of routing to all endpoints evenly (possibly modified by topology and other features). Note that traffic sent to an External IP or LoadBalancer IP from within the cluster will always get \"Cluster\" semantics, but clients sending to a NodePort from within the cluster may need to take traffic policy into account when picking a node.\n\nPossible enum values:\n - `\"Cluster\"`\n - `\"Cluster\"` routes traffic to all endpoints.\n - `\"Local\"`\n - `\"Local\"` preserves the source IP of the traffic by routing only to endpoints on the same node as the traffic was received on (dropping the traffic if there are no local endpoints).", + Description: "externalTrafficPolicy describes how nodes distribute service traffic they receive on one of the Service's \"externally-facing\" addresses (NodePorts, ExternalIPs, and LoadBalancer IPs). If set to \"Local\", the proxy will configure the service in a way that assumes that external load balancers will take care of balancing the service traffic between nodes, and so each node will deliver traffic only to the node-local endpoints of the service, without masquerading the client source IP. (Traffic mistakenly sent to a node with no endpoints will be dropped.) The default value, \"Cluster\", uses the standard behavior of routing to all endpoints evenly (possibly modified by topology and other features). Note that traffic sent to an External IP or LoadBalancer IP from within the cluster will always get \"Cluster\" semantics, but clients sending to a NodePort from within the cluster may need to take traffic policy into account when picking a node.\n\nPossible enum values:\n - `\"Cluster\"` routes traffic to all endpoints.\n - `\"Local\"` preserves the source IP of the traffic by routing only to endpoints on the same node as the traffic was received on (dropping the traffic if there are no local endpoints).", Type: []string{"string"}, Format: "", - Enum: []interface{}{"Cluster", "Cluster", "Local", "Local"}, + Enum: []interface{}{"Cluster", "Local"}, }, }, "healthCheckNodePort": { @@ -15150,6 +15754,7 @@ func schema_k8sio_api_core_v1_ServiceSpec(ref common.ReferenceCallback) common.O Default: "", Type: []string{"string"}, Format: "", + Enum: []interface{}{"", "IPv4", "IPv6"}, }, }, }, @@ -15185,6 +15790,13 @@ func schema_k8sio_api_core_v1_ServiceSpec(ref common.ReferenceCallback) common.O Enum: []interface{}{"Cluster", "Local"}, }, }, + "trafficDistribution": { + SchemaProps: spec.SchemaProps{ + Description: "TrafficDistribution offers a way to express preferences for how traffic is distributed to Service endpoints. Implementations can use this field as a hint, but are not required to guarantee strict adherence. If the field is not set, the implementation will apply its default routing strategy. If set to \"PreferClose\", implementations should prioritize endpoints that are topologically close (e.g., same zone). This is an alpha field and requires enabling ServiceTrafficDistribution feature.", + Type: []string{"string"}, + Format: "", + }, + }, }, }, }, @@ -15551,6 +16163,11 @@ func schema_k8sio_api_core_v1_TopologySelectorLabelRequirement(ref common.Refere }, }, "values": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "An array of string values. One value must match the label to be selected. Each entry in Values is ORed.", Type: []string{"array"}, @@ -15580,6 +16197,11 @@ func schema_k8sio_api_core_v1_TopologySelectorTerm(ref common.ReferenceCallback) Type: []string{"object"}, Properties: map[string]spec.Schema{ "matchLabelExpressions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "A list of topology selector requirements by labels.", Type: []string{"array"}, @@ -15646,7 +16268,7 @@ func schema_k8sio_api_core_v1_TopologySpreadConstraint(ref common.ReferenceCallb }, "minDomains": { SchemaProps: spec.SchemaProps{ - Description: "MinDomains indicates a minimum number of eligible domains. When the number of eligible domains with matching topology keys is less than minDomains, Pod Topology Spread treats \"global minimum\" as 0, and then the calculation of Skew is performed. And when the number of eligible domains with matching topology keys equals or greater than minDomains, this value has no effect on scheduling. As a result, when the number of eligible domains is less than minDomains, scheduler won't schedule more than maxSkew Pods to those domains. If value is nil, the constraint behaves as if MinDomains is equal to 1. Valid values are integers greater than 0. When value is not nil, WhenUnsatisfiable must be DoNotSchedule.\n\nFor example, in a 3-zone cluster, MaxSkew is set to 2, MinDomains is set to 5 and pods with the same labelSelector spread as 2/2/2: | zone1 | zone2 | zone3 | | P P | P P | P P | The number of domains is less than 5(MinDomains), so \"global minimum\" is treated as 0. In this situation, new pod with the same labelSelector cannot be scheduled, because computed skew will be 3(3 - 0) if new Pod is scheduled to any of the three zones, it will violate MaxSkew.\n\nThis is a beta field and requires the MinDomainsInPodTopologySpread feature gate to be enabled (enabled by default).", + Description: "MinDomains indicates a minimum number of eligible domains. When the number of eligible domains with matching topology keys is less than minDomains, Pod Topology Spread treats \"global minimum\" as 0, and then the calculation of Skew is performed. And when the number of eligible domains with matching topology keys equals or greater than minDomains, this value has no effect on scheduling. As a result, when the number of eligible domains is less than minDomains, scheduler won't schedule more than maxSkew Pods to those domains. If value is nil, the constraint behaves as if MinDomains is equal to 1. Valid values are integers greater than 0. When value is not nil, WhenUnsatisfiable must be DoNotSchedule.\n\nFor example, in a 3-zone cluster, MaxSkew is set to 2, MinDomains is set to 5 and pods with the same labelSelector spread as 2/2/2: | zone1 | zone2 | zone3 | | P P | P P | P P | The number of domains is less than 5(MinDomains), so \"global minimum\" is treated as 0. In this situation, new pod with the same labelSelector cannot be scheduled, because computed skew will be 3(3 - 0) if new Pod is scheduled to any of the three zones, it will violate MaxSkew.", Type: []string{"integer"}, Format: "int32", }, @@ -16031,6 +16653,13 @@ func schema_k8sio_api_core_v1_VolumeMount(ref common.ReferenceCallback) common.O Format: "", }, }, + "recursiveReadOnly": { + SchemaProps: spec.SchemaProps{ + Description: "RecursiveReadOnly specifies whether read-only mounts should be handled recursively.\n\nIf ReadOnly is false, this field has no meaning and must be unspecified.\n\nIf ReadOnly is true, and this field is set to Disabled, the mount is not made recursively read-only. If this field is set to IfPossible, the mount is made recursively read-only, if it is supported by the container runtime. If this field is set to Enabled, the mount is made recursively read-only if it is supported by the container runtime, otherwise the pod will not be started and an error will be generated to indicate the reason.\n\nIf this field is set to IfPossible or Enabled, MountPropagation must be set to None (or be unspecified, which defaults to None).\n\nIf this field is not specified, it is treated as an equivalent of Disabled.", + Type: []string{"string"}, + Format: "", + }, + }, "mountPath": { SchemaProps: spec.SchemaProps{ Description: "Path within the container at which the volume should be mounted. Must not contain ':'.", @@ -16048,7 +16677,7 @@ func schema_k8sio_api_core_v1_VolumeMount(ref common.ReferenceCallback) common.O }, "mountPropagation": { SchemaProps: spec.SchemaProps{ - Description: "mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationNone is used. This field is beta in 1.10.\n\nPossible enum values:\n - `\"Bidirectional\"` means that the volume in a container will receive new mounts from the host or other containers, and its own mounts will be propagated from the container to the host or other containers. Note that this mode is recursively applied to all mounts in the volume (\"rshared\" in Linux terminology).\n - `\"HostToContainer\"` means that the volume in a container will receive new mounts from the host or other containers, but filesystems mounted inside the container won't be propagated to the host or other containers. Note that this mode is recursively applied to all mounts in the volume (\"rslave\" in Linux terminology).\n - `\"None\"` means that the volume in a container will not receive new mounts from the host or other containers, and filesystems mounted inside the container won't be propagated to the host or other containers. Note that this mode corresponds to \"private\" in Linux terminology.", + Description: "mountPropagation determines how mounts are propagated from the host to container and the other way around. When not set, MountPropagationNone is used. This field is beta in 1.10. When RecursiveReadOnly is set to IfPossible or to Enabled, MountPropagation must be None or unspecified (which defaults to None).\n\nPossible enum values:\n - `\"Bidirectional\"` means that the volume in a container will receive new mounts from the host or other containers, and its own mounts will be propagated from the container to the host or other containers. Note that this mode is recursively applied to all mounts in the volume (\"rshared\" in Linux terminology).\n - `\"HostToContainer\"` means that the volume in a container will receive new mounts from the host or other containers, but filesystems mounted inside the container won't be propagated to the host or other containers. Note that this mode is recursively applied to all mounts in the volume (\"rslave\" in Linux terminology).\n - `\"None\"` means that the volume in a container will not receive new mounts from the host or other containers, and filesystems mounted inside the container won't be propagated to the host or other containers. Note that this mode corresponds to \"private\" in Linux terminology.", Type: []string{"string"}, Format: "", Enum: []interface{}{"Bidirectional", "HostToContainer", "None"}, @@ -16068,6 +16697,50 @@ func schema_k8sio_api_core_v1_VolumeMount(ref common.ReferenceCallback) common.O } } +func schema_k8sio_api_core_v1_VolumeMountStatus(ref common.ReferenceCallback) common.OpenAPIDefinition { + return common.OpenAPIDefinition{ + Schema: spec.Schema{ + SchemaProps: spec.SchemaProps{ + Description: "VolumeMountStatus shows status of volume mounts.", + Type: []string{"object"}, + Properties: map[string]spec.Schema{ + "name": { + SchemaProps: spec.SchemaProps{ + Description: "Name corresponds to the name of the original VolumeMount.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "mountPath": { + SchemaProps: spec.SchemaProps{ + Description: "MountPath corresponds to the original VolumeMount.", + Default: "", + Type: []string{"string"}, + Format: "", + }, + }, + "readOnly": { + SchemaProps: spec.SchemaProps{ + Description: "ReadOnly corresponds to the original VolumeMount.", + Type: []string{"boolean"}, + Format: "", + }, + }, + "recursiveReadOnly": { + SchemaProps: spec.SchemaProps{ + Description: "RecursiveReadOnly must be set to Disabled, Enabled, or unspecified (for non-readonly mounts). An IfPossible value in the original VolumeMount must be translated to Disabled or Enabled, depending on the mount result.", + Type: []string{"string"}, + Format: "", + }, + }, + }, + Required: []string{"name", "mountPath"}, + }, + }, + } +} + func schema_k8sio_api_core_v1_VolumeNodeAffinity(ref common.ReferenceCallback) common.OpenAPIDefinition { return common.OpenAPIDefinition{ Schema: spec.Schema{ @@ -16559,6 +17232,11 @@ func schema_pkg_apis_meta_v1_APIGroup(ref common.ReferenceCallback) common.OpenA }, }, "versions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "versions are the versions supported in this group.", Type: []string{"array"}, @@ -16580,6 +17258,11 @@ func schema_pkg_apis_meta_v1_APIGroup(ref common.ReferenceCallback) common.OpenA }, }, "serverAddressByClientCIDRs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.", Type: []string{"array"}, @@ -16624,6 +17307,11 @@ func schema_pkg_apis_meta_v1_APIGroupList(ref common.ReferenceCallback) common.O }, }, "groups": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "groups is a list of APIGroup.", Type: []string{"array"}, @@ -16715,6 +17403,11 @@ func schema_pkg_apis_meta_v1_APIResource(ref common.ReferenceCallback) common.Op }, }, "shortNames": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "shortNames is a list of suggested short names of the resource.", Type: []string{"array"}, @@ -16730,6 +17423,11 @@ func schema_pkg_apis_meta_v1_APIResource(ref common.ReferenceCallback) common.Op }, }, "categories": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "categories is a list of the grouped resources this resource belongs to (e.g. 'all')", Type: []string{"array"}, @@ -16788,6 +17486,11 @@ func schema_pkg_apis_meta_v1_APIResourceList(ref common.ReferenceCallback) commo }, }, "resources": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "resources contains the name of the resources and if they are namespaced.", Type: []string{"array"}, @@ -16832,6 +17535,11 @@ func schema_pkg_apis_meta_v1_APIVersions(ref common.ReferenceCallback) common.Op }, }, "versions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "versions are the api versions that are available.", Type: []string{"array"}, @@ -16847,6 +17555,11 @@ func schema_pkg_apis_meta_v1_APIVersions(ref common.ReferenceCallback) common.Op }, }, "serverAddressByClientCIDRs": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.", Type: []string{"array"}, @@ -16891,6 +17604,11 @@ func schema_pkg_apis_meta_v1_ApplyOptions(ref common.ReferenceCallback) common.O }, }, "dryRun": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", Type: []string{"array"}, @@ -17011,6 +17729,11 @@ func schema_pkg_apis_meta_v1_CreateOptions(ref common.ReferenceCallback) common. }, }, "dryRun": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", Type: []string{"array"}, @@ -17094,6 +17817,11 @@ func schema_pkg_apis_meta_v1_DeleteOptions(ref common.ReferenceCallback) common. }, }, "dryRun": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", Type: []string{"array"}, @@ -17410,6 +18138,11 @@ func schema_pkg_apis_meta_v1_LabelSelector(ref common.ReferenceCallback) common. }, }, "matchExpressions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "matchExpressions is a list of label selector requirements. The requirements are ANDed.", Type: []string{"array"}, @@ -17460,6 +18193,11 @@ func schema_pkg_apis_meta_v1_LabelSelectorRequirement(ref common.ReferenceCallba }, }, "values": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch.", Type: []string{"array"}, @@ -17853,6 +18591,10 @@ func schema_pkg_apis_meta_v1_ObjectMeta(ref common.ReferenceCallback) common.Ope "ownerReferences": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-map-keys": []interface{}{ + "uid", + }, + "x-kubernetes-list-type": "map", "x-kubernetes-patch-merge-key": "uid", "x-kubernetes-patch-strategy": "merge", }, @@ -17873,6 +18615,7 @@ func schema_pkg_apis_meta_v1_ObjectMeta(ref common.ReferenceCallback) common.Ope "finalizers": { VendorExtensible: spec.VendorExtensible{ Extensions: spec.Extensions{ + "x-kubernetes-list-type": "set", "x-kubernetes-patch-strategy": "merge", }, }, @@ -17891,6 +18634,11 @@ func schema_pkg_apis_meta_v1_ObjectMeta(ref common.ReferenceCallback) common.Ope }, }, "managedFields": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like \"ci-cd\". The set of fields is always in the version that the workflow used when modifying the object.", Type: []string{"array"}, @@ -18097,6 +18845,11 @@ func schema_pkg_apis_meta_v1_PatchOptions(ref common.ReferenceCallback) common.O }, }, "dryRun": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", Type: []string{"array"}, @@ -18173,6 +18926,11 @@ func schema_pkg_apis_meta_v1_RootPaths(ref common.ReferenceCallback) common.Open Type: []string{"object"}, Properties: map[string]spec.Schema{ "paths": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "paths are the paths available at root.", Type: []string{"array"}, @@ -18274,6 +19032,11 @@ func schema_pkg_apis_meta_v1_Status(ref common.ReferenceCallback) common.OpenAPI }, }, "details": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "Extended data associated with the reason. Each reason may define its own extended details. This field is optional and the data returned is not guaranteed to conform to any schema except that defined by the reason type.", Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.StatusDetails"), @@ -18364,6 +19127,11 @@ func schema_pkg_apis_meta_v1_StatusDetails(ref common.ReferenceCallback) common. }, }, "causes": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "The Causes array includes more details associated with the StatusReason failure. Not all StatusReasons may provide detailed causes.", Type: []string{"array"}, @@ -18421,6 +19189,11 @@ func schema_pkg_apis_meta_v1_Table(ref common.ReferenceCallback) common.OpenAPID }, }, "columnDefinitions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "columnDefinitions describes each column in the returned items array. The number of cells per row will always match the number of column definitions.", Type: []string{"array"}, @@ -18435,6 +19208,11 @@ func schema_pkg_apis_meta_v1_Table(ref common.ReferenceCallback) common.OpenAPID }, }, "rows": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "rows is the list of items in the table.", Type: []string{"array"}, @@ -18553,6 +19331,11 @@ func schema_pkg_apis_meta_v1_TableRow(ref common.ReferenceCallback) common.OpenA Type: []string{"object"}, Properties: map[string]spec.Schema{ "cells": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "cells will be as wide as the column definitions array and may contain strings, numbers (float64 or int64), booleans, simple maps, lists, or null. See the type field of the column definition for a more detailed description.", Type: []string{"array"}, @@ -18567,6 +19350,11 @@ func schema_pkg_apis_meta_v1_TableRow(ref common.ReferenceCallback) common.OpenA }, }, "conditions": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "conditions describe additional status of a row that are relevant for a human user. These conditions apply to the row, not to the object, and will be specific to table output. The only defined condition type is 'Completed', for a row that indicates a resource that has run to completion and can be given less visual priority.", Type: []string{"array"}, @@ -18730,6 +19518,11 @@ func schema_pkg_apis_meta_v1_UpdateOptions(ref common.ReferenceCallback) common. }, }, "dryRun": { + VendorExtensible: spec.VendorExtensible{ + Extensions: spec.Extensions{ + "x-kubernetes-list-type": "atomic", + }, + }, SchemaProps: spec.SchemaProps{ Description: "When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed", Type: []string{"array"}, diff --git a/cmd/apinetlet/main.go b/cmd/apinetlet/main.go index 30b4e504..62a637bf 100644 --- a/cmd/apinetlet/main.go +++ b/cmd/apinetlet/main.go @@ -13,7 +13,7 @@ import ( apinetletclient "github.com/ironcore-dev/ironcore-net/apinetlet/client" apinetletconfig "github.com/ironcore-dev/ironcore-net/apinetlet/client/config" "github.com/ironcore-dev/ironcore-net/apinetlet/controllers" - "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + ironcorenet "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" apinetclient "github.com/ironcore-dev/ironcore-net/internal/client" commonv1alpha1 "github.com/ironcore-dev/ironcore/api/common/v1alpha1" ipamv1alpha1 "github.com/ironcore-dev/ironcore/api/ipam/v1alpha1" diff --git a/go.mod b/go.mod index 7a033186..026f64a8 100644 --- a/go.mod +++ b/go.mod @@ -5,6 +5,7 @@ go 1.23.0 require ( github.com/bits-and-blooms/bitset v1.14.3 github.com/go-logr/logr v1.4.2 + github.com/gogo/protobuf v1.3.2 github.com/google/uuid v1.6.0 github.com/ironcore-dev/controller-utils v0.9.4 github.com/ironcore-dev/ironcore v0.2.0 @@ -15,15 +16,16 @@ require ( github.com/spf13/pflag v1.0.5 go4.org/netipx v0.0.0-20220812043211-3cc044ffd68d golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 - k8s.io/api v0.29.9 - k8s.io/apimachinery v0.29.9 - k8s.io/apiserver v0.29.9 - k8s.io/client-go v0.29.9 - k8s.io/component-base v0.29.9 + k8s.io/api v0.30.4 + k8s.io/apimachinery v0.30.4 + k8s.io/apiserver v0.30.4 + k8s.io/client-go v0.30.4 + k8s.io/code-generator v0.30.4 + k8s.io/component-base v0.30.4 k8s.io/klog/v2 v2.130.1 - k8s.io/kube-openapi v0.0.0-20231010175941-2dd684a91f00 + k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 k8s.io/utils v0.0.0-20240102154912-e7106e64919e - sigs.k8s.io/controller-runtime v0.17.6 + sigs.k8s.io/controller-runtime v0.18.5 sigs.k8s.io/structured-merge-diff/v4 v4.4.1 ) @@ -40,7 +42,7 @@ require ( github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect github.com/emicklei/go-restful/v3 v3.11.0 // indirect github.com/evanphx/json-patch v5.6.0+incompatible // indirect - github.com/evanphx/json-patch/v5 v5.8.0 // indirect + github.com/evanphx/json-patch/v5 v5.9.0 // indirect github.com/felixge/httpsnoop v1.0.3 // indirect github.com/fsnotify/fsnotify v1.7.0 // indirect github.com/go-logr/stdr v1.2.2 // indirect @@ -49,10 +51,9 @@ require ( github.com/go-openapi/jsonreference v0.20.2 // indirect github.com/go-openapi/swag v0.22.4 // indirect github.com/go-task/slim-sprig/v3 v3.0.0 // indirect - github.com/gogo/protobuf v1.3.2 // indirect github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect github.com/golang/protobuf v1.5.4 // indirect - github.com/google/cel-go v0.17.7 // indirect + github.com/google/cel-go v0.17.8 // indirect github.com/google/gnostic-models v0.6.8 // indirect github.com/google/go-cmp v0.6.0 // indirect github.com/google/gofuzz v1.2.0 // indirect @@ -89,6 +90,7 @@ require ( go.uber.org/multierr v1.11.0 // indirect go.uber.org/zap v1.26.0 // indirect golang.org/x/crypto v0.28.0 // indirect + golang.org/x/mod v0.21.0 // indirect golang.org/x/net v0.30.0 // indirect golang.org/x/oauth2 v0.22.0 // indirect golang.org/x/sync v0.8.0 // indirect @@ -106,10 +108,11 @@ require ( gopkg.in/natefinch/lumberjack.v2 v2.2.1 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect - k8s.io/apiextensions-apiserver v0.29.7 // indirect - k8s.io/kms v0.29.9 // indirect + k8s.io/apiextensions-apiserver v0.30.1 // indirect + k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70 // indirect + k8s.io/kms v0.30.4 // indirect k8s.io/kube-aggregator v0.29.4 // indirect - sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.28.0 // indirect + sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.29.0 // indirect sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect sigs.k8s.io/yaml v1.4.0 // indirect ) diff --git a/go.sum b/go.sum index b0ec57b9..edb737b8 100644 --- a/go.sum +++ b/go.sum @@ -37,8 +37,8 @@ github.com/envoyproxy/protoc-gen-validate v1.1.0 h1:tntQDh69XqOCOZsDz0lVJQez/2L6 github.com/envoyproxy/protoc-gen-validate v1.1.0/go.mod h1:sXRDRVmzEbkM7CVcM06s9shE/m23dg3wzjl0UWqJ2q4= github.com/evanphx/json-patch v5.6.0+incompatible h1:jBYDEEiFBPxA0v50tFdvOzQQTCvpL6mnFh5mB2/l16U= github.com/evanphx/json-patch v5.6.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk= -github.com/evanphx/json-patch/v5 v5.8.0 h1:lRj6N9Nci7MvzrXuX6HFzU8XjmhPiXPlsKEy1u0KQro= -github.com/evanphx/json-patch/v5 v5.8.0/go.mod h1:VNkHZ/282BpEyt/tObQO8s5CMPmYYq14uClGH4abBuQ= +github.com/evanphx/json-patch/v5 v5.9.0 h1:kcBlZQbplgElYIlo/n1hJbls2z/1awpXxpRi0/FOJfg= +github.com/evanphx/json-patch/v5 v5.9.0/go.mod h1:VNkHZ/282BpEyt/tObQO8s5CMPmYYq14uClGH4abBuQ= github.com/felixge/httpsnoop v1.0.3 h1:s/nj+GCswXYzN5v2DpNMuMQYe+0DDwt5WVCU6CWBdXk= github.com/felixge/httpsnoop v1.0.3/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U= github.com/fsnotify/fsnotify v1.7.0 h1:8JEhPFa5W2WU7YfeZzPNqzMP6Lwt7L2715Ggo0nosvA= @@ -72,8 +72,8 @@ github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps= github.com/google/btree v1.0.1 h1:gK4Kx5IaGY9CD5sPJ36FHiBJ6ZXl0kilRiiCj+jdYp4= github.com/google/btree v1.0.1/go.mod h1:xXMiIv4Fb/0kKde4SpL7qlzvu5cMJDRkFDxJfI9uaxA= -github.com/google/cel-go v0.17.7 h1:6ebJFzu1xO2n7TLtN+UBqShGBhlD85bhvglh5DpcfqQ= -github.com/google/cel-go v0.17.7/go.mod h1:HXZKzB0LXqer5lHHgfWAnlYwJaQBDKMjxjulNQzhwhY= +github.com/google/cel-go v0.17.8 h1:j9m730pMZt1Fc4oKhCLUHfjj6527LuhYcYw0Rl8gqto= +github.com/google/cel-go v0.17.8/go.mod h1:HXZKzB0LXqer5lHHgfWAnlYwJaQBDKMjxjulNQzhwhY= github.com/google/gnostic-models v0.6.8 h1:yo/ABAfM5IMRsS1VnXjTBvUb61tFIHozhlYvRgGre9I= github.com/google/gnostic-models v0.6.8/go.mod h1:5n7qKqH0f5wFt+aWF8CW6pZLLNOfYuF5OpfBSENuI8U= github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= @@ -132,6 +132,8 @@ github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9G github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk= github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA= github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= +github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f h1:y5//uYreIhSUg3J1GEMiLbxo1LJaP8RfCpH6pymGZus= +github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw= github.com/onsi/ginkgo/v2 v2.21.0 h1:7rg/4f3rB88pb5obDgNZrNHrQ4e6WpjonchcpuBRnZM= github.com/onsi/ginkgo/v2 v2.21.0/go.mod h1:7Du3c42kxCUegi0IImZ1wUQzMBVecgIHjR1C+NkhLQo= github.com/onsi/gomega v1.35.1 h1:Cwbd75ZBPxFSuZ6T+rN/WCb/gOc6YgFBXLlZLhC7Ds4= @@ -233,6 +235,8 @@ golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 h1:2dVuKD2vS7b0QIHQbpyTISPd0 golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56/go.mod h1:M4RDyNAINzryxdtnbRXRL/OHtkFuWGRjvuhBJpk2IlY= golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= +golang.org/x/mod v0.21.0 h1:vvrHzRwRfVKSiLrG+d4FMl/Qi4ukBCE6kZlTUkDYRT0= +golang.org/x/mod v0.21.0/go.mod h1:6SkKJ3Xj0I0BrPOZoBy3bdMptDDU9oJrpohJ3eWZ1fY= golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= @@ -296,32 +300,36 @@ gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C gopkg.in/yaml.v3 v3.0.0/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA= gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= -k8s.io/api v0.29.9 h1:FwdflpNsfMUYUOblMZNWJ4K/q0OSL5A4jGa0iOgcJco= -k8s.io/api v0.29.9/go.mod h1:fNhmzRfKaSEHCmczA/jRx6CiDKhYOnFLJBERMJAXEk8= -k8s.io/apiextensions-apiserver v0.29.7 h1:X62u7vUGfwW5rYJB5jkZDr0uV2XSyEHJRdxnfD5PaLs= -k8s.io/apiextensions-apiserver v0.29.7/go.mod h1:JzBXxlZKKdtEYGr4yiN+s0eXheCTYgKDay8JXPfSGoQ= -k8s.io/apimachinery v0.29.9 h1:YZ8HUid1TzQVz94cnNlsQjLdH0VoAhWSqz7t0q6B12A= -k8s.io/apimachinery v0.29.9/go.mod h1:i3FJVwhvSp/6n8Fl4K97PJEP8C+MM+aoDq4+ZJBf70Y= -k8s.io/apiserver v0.29.9 h1:BiHTZbAYcNYHTE9RlWMBe5AX2XoZbRujy6oo5krU4V8= -k8s.io/apiserver v0.29.9/go.mod h1:3zmBeYworciVZHs8jSfzt/naTpDQb3AM++aYJ5Pkqqo= -k8s.io/client-go v0.29.9 h1:4f/Wz6li3rEyIPFj32XAQMtOGMM1tg7KQi1oeS6ibPg= -k8s.io/client-go v0.29.9/go.mod h1:2N1drQEZ5yiYrWVaE2Un8JiISUhl47D8pyZlYLszke4= -k8s.io/component-base v0.29.9 h1:lPENvp3CCwdeMEWGjiTfn5b287qQYuK7gX32OBOovmA= -k8s.io/component-base v0.29.9/go.mod h1:NGDa6Ih0EdcLA2G4K2ZYySoiB+2Tn+rmSqPyudCPgDY= +k8s.io/api v0.30.4 h1:XASIELmW8w8q0i1Y4124LqPoWMycLjyQti/fdYHYjCs= +k8s.io/api v0.30.4/go.mod h1:ZqniWRKu7WIeLijbbzetF4U9qZ03cg5IRwl8YVs8mX0= +k8s.io/apiextensions-apiserver v0.30.1 h1:4fAJZ9985BmpJG6PkoxVRpXv9vmPUOVzl614xarePws= +k8s.io/apiextensions-apiserver v0.30.1/go.mod h1:R4GuSrlhgq43oRY9sF2IToFh7PVlF1JjfWdoG3pixk4= +k8s.io/apimachinery v0.30.4 h1:5QHQI2tInzr8LsT4kU/2+fSeibH1eIHswNx480cqIoY= +k8s.io/apimachinery v0.30.4/go.mod h1:iexa2somDaxdnj7bha06bhb43Zpa6eWH8N8dbqVjTUc= +k8s.io/apiserver v0.30.4 h1:rHkGJhxd+m4jILrgkenwSmG4X0QXk6ecGuybzS/PQak= +k8s.io/apiserver v0.30.4/go.mod h1:oyGAj9B9/0+I9huJyf4/8SMBF2mNh2bTMlu7703dkH8= +k8s.io/client-go v0.30.4 h1:eculUe+HPQoPbixfwmaSZGsKcOf7D288tH6hDAdd+wY= +k8s.io/client-go v0.30.4/go.mod h1:IBS0R/Mt0LHkNHF4E6n+SUDPG7+m2po6RZU7YHeOpzc= +k8s.io/code-generator v0.30.4 h1:1J2AcpPNBGh/NH9+m4TDh8Yj+mSbM+JyQhH0QdIMwmE= +k8s.io/code-generator v0.30.4/go.mod h1:Dd8gxOr5ieh9yHCLKnIkKDmk1H2glH8nYCAqwFogD2M= +k8s.io/component-base v0.30.4 h1:FlgKqazIkIIxpLA4wFXsiPiDllJn9fhsN3G4TeX7T7U= +k8s.io/component-base v0.30.4/go.mod h1:Qd3h+OJxV/LrnriXG/E15ZK83dzd306qJHW9+87S5ls= +k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70 h1:NGrVE502P0s0/1hudf8zjgwki1X/TByhmAoILTarmzo= +k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70/go.mod h1:VH3AT8AaQOqiGjMF9p0/IM1Dj+82ZwjfxUP1IxaHE+8= k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk= k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE= -k8s.io/kms v0.29.9 h1:7B9VGhFAzNfBmfXeQ0Xi+OzIcNPw/xazPnLm/J3vNT4= -k8s.io/kms v0.29.9/go.mod h1:vWVImKkJd+1BQY4tBwdfSwjQBiLrnbNtHADcDEDQFtk= +k8s.io/kms v0.30.4 h1:Je7wR5/m+w/E7Ef9R9RY1yeMU/C2GXIvhzRFfg8H5kQ= +k8s.io/kms v0.30.4/go.mod h1:GrMurD0qk3G4yNgGcsCEmepqf9KyyIrTXYR2lyUOJC4= k8s.io/kube-aggregator v0.29.4 h1:yT7vYtwIag4G8HNrktYZ3qz6p6oHKronMAXOw4eQ2WQ= k8s.io/kube-aggregator v0.29.4/go.mod h1:zBfe4iXXmw5HinNgN0JoAu5rpXdyCUvRfG99+FVOd68= -k8s.io/kube-openapi v0.0.0-20231010175941-2dd684a91f00 h1:aVUu9fTY98ivBPKR9Y5w/AuzbMm96cd3YHRTU83I780= -k8s.io/kube-openapi v0.0.0-20231010175941-2dd684a91f00/go.mod h1:AsvuZPBlUDVuCdzJ87iajxtXuR9oktsTctW/R9wwouA= +k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 h1:BZqlfIlq5YbRMFko6/PM7FjZpUb45WallggurYhKGag= +k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340/go.mod h1:yD4MZYeKMBwQKVht279WycxKyM84kkAx2DPrTXaeb98= k8s.io/utils v0.0.0-20240102154912-e7106e64919e h1:eQ/4ljkx21sObifjzXwlPKpdGLrCfRziVtos3ofG/sQ= k8s.io/utils v0.0.0-20240102154912-e7106e64919e/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0= -sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.28.0 h1:TgtAeesdhpm2SGwkQasmbeqDo8th5wOBA5h/AjTKA4I= -sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.28.0/go.mod h1:VHVDI/KrK4fjnV61bE2g3sA7tiETLn8sooImelsCx3Y= -sigs.k8s.io/controller-runtime v0.17.6 h1:12IXsozEsIXWAMRpgRlYS1jjAHQXHtWEOMdULh3DbEw= -sigs.k8s.io/controller-runtime v0.17.6/go.mod h1:N0jpP5Lo7lMTF9aL56Z/B2oWBJjey6StQM0jRbKQXtY= +sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.29.0 h1:/U5vjBbQn3RChhv7P11uhYvCSm5G2GaIi5AIGBS6r4c= +sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.29.0/go.mod h1:z7+wmGM2dfIiLRfrC6jb5kV2Mq/sK1ZP303cxzkV5Y4= +sigs.k8s.io/controller-runtime v0.18.5 h1:nTHio/W+Q4aBlQMgbnC5hZb4IjIidyrizMai9P6n4Rk= +sigs.k8s.io/controller-runtime v0.18.5/go.mod h1:TVoGrfdpbA9VRFaRnKgk9P5/atA0pMwq+f+msb9M8Sg= sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo= sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0= sigs.k8s.io/structured-merge-diff/v4 v4.4.1 h1:150L+0vs/8DA78h1u02ooW1/fFq/Lwr+sGiqlzvrtq4= diff --git a/hack/tools.go b/hack/tools.go new file mode 100644 index 00000000..5da7b115 --- /dev/null +++ b/hack/tools.go @@ -0,0 +1,13 @@ +//go:build tools +// +build tools + +// SPDX-FileCopyrightText: 2023 SAP SE or an SAP affiliate company and IronCore contributors +// SPDX-License-Identifier: Apache-2.0 +// Package tools +package hack + +import ( + // Use gogoproto for protobuf generation. + _ "github.com/gogo/protobuf/gogoproto" + _ "k8s.io/code-generator" +) diff --git a/internal/apis/core/zz_generated.defaults.go b/internal/apis/core/zz_generated.defaults.go new file mode 100644 index 00000000..e27754e4 --- /dev/null +++ b/internal/apis/core/zz_generated.defaults.go @@ -0,0 +1,20 @@ +//go:build !ignore_autogenerated +// +build !ignore_autogenerated + +// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and IronCore contributors +// SPDX-License-Identifier: Apache-2.0 + +// Code generated by defaulter-gen. DO NOT EDIT. + +package core + +import ( + runtime "k8s.io/apimachinery/pkg/runtime" +) + +// RegisterDefaults adds defaulters functions to the given scheme. +// Public to allow building arbitrary schemes. +// All generated defaulters are covering - they call all nested defaulters. +func RegisterDefaults(scheme *runtime.Scheme) error { + return nil +} diff --git a/internal/apiserver/apiserver.go b/internal/apiserver/apiserver.go index f028b9de..4457e50f 100644 --- a/internal/apiserver/apiserver.go +++ b/internal/apiserver/apiserver.go @@ -7,8 +7,8 @@ import ( "net/netip" "github.com/ironcore-dev/ironcore-net/apimachinery/equality" - "github.com/ironcore-dev/ironcore-net/client-go/informers" - v1alpha1client "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/typed/core/v1alpha1" + informers "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions" + v1alpha1client "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/typed/core/v1alpha1" "github.com/ironcore-dev/ironcore-net/internal/apis/core" "github.com/ironcore-dev/ironcore-net/internal/apis/core/install" "github.com/ironcore-dev/ironcore-net/internal/registry/daemonset" diff --git a/internal/app/apiserver/apiserver.go b/internal/app/apiserver/apiserver.go index 7c2693f7..4c5ee23b 100644 --- a/internal/app/apiserver/apiserver.go +++ b/internal/app/apiserver/apiserver.go @@ -13,8 +13,8 @@ import ( "k8s.io/apiserver/pkg/endpoints/openapi" "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - "github.com/ironcore-dev/ironcore-net/client-go/informers" - clientset "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet" + informers "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions" + clientset "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned" "github.com/ironcore-dev/ironcore-net/internal/apiserver" netflag "github.com/ironcore-dev/ironcore-net/utils/flag" "github.com/spf13/cobra" diff --git a/internal/registry/ip/ipaddressallocator/ipaddressallocator.go b/internal/registry/ip/ipaddressallocator/ipaddressallocator.go index 72614845..c80681bb 100644 --- a/internal/registry/ip/ipaddressallocator/ipaddressallocator.go +++ b/internal/registry/ip/ipaddressallocator/ipaddressallocator.go @@ -12,8 +12,8 @@ import ( "time" "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - v1alpha1informers "github.com/ironcore-dev/ironcore-net/client-go/informers/core/v1alpha1" - v1alpha1client "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/typed/core/v1alpha1" + v1alpha1informers "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/core/v1alpha1" + v1alpha1client "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/typed/core/v1alpha1" v1alpha1listers "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" netiputils "github.com/ironcore-dev/ironcore-net/utils/netip" "go4.org/netipx" diff --git a/internal/registry/ipallocator/ipallocator.go b/internal/registry/ipallocator/ipallocator.go index 0e976f65..c23caab1 100644 --- a/internal/registry/ipallocator/ipallocator.go +++ b/internal/registry/ipallocator/ipallocator.go @@ -12,8 +12,8 @@ import ( "time" "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - v1alpha1informers "github.com/ironcore-dev/ironcore-net/client-go/informers/core/v1alpha1" - v1alpha1client "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/typed/core/v1alpha1" + v1alpha1informers "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/core/v1alpha1" + v1alpha1client "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/typed/core/v1alpha1" v1alpha1listers "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" "github.com/ironcore-dev/ironcore/utils/generic" corev1 "k8s.io/api/core/v1" diff --git a/internal/registry/network/networkidallocator/networkidallocator.go b/internal/registry/network/networkidallocator/networkidallocator.go index 6a5dbe6b..2e0853b6 100644 --- a/internal/registry/network/networkidallocator/networkidallocator.go +++ b/internal/registry/network/networkidallocator/networkidallocator.go @@ -11,8 +11,8 @@ import ( "time" "github.com/ironcore-dev/ironcore-net/api/core/v1alpha1" - v1alpha1informers "github.com/ironcore-dev/ironcore-net/client-go/informers/core/v1alpha1" - v1alpha1client "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/typed/core/v1alpha1" + v1alpha1informers "github.com/ironcore-dev/ironcore-net/client-go/informers/externalversions/core/v1alpha1" + v1alpha1client "github.com/ironcore-dev/ironcore-net/client-go/ironcorenet/versioned/typed/core/v1alpha1" v1alpha1listers "github.com/ironcore-dev/ironcore-net/client-go/listers/core/v1alpha1" "github.com/ironcore-dev/ironcore-net/internal/apis/core" "github.com/ironcore-dev/ironcore-net/networkid" diff --git a/metalnetlet/controllers/instance_controller.go b/metalnetlet/controllers/instance_controller.go index 7fd74a73..d3512414 100644 --- a/metalnetlet/controllers/instance_controller.go +++ b/metalnetlet/controllers/instance_controller.go @@ -335,8 +335,11 @@ func (r *InstanceReconciler) SetupWithManager(mgr ctrl.Manager, metalnetCache ca builder.WithPredicates(r.isPartitionLoadBalancerInstance()), ). WatchesRawSource( - source.Kind(metalnetCache, &metalnetv1alpha1.LoadBalancer{}), - utilhandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &v1alpha1.Instance{}), + source.Kind[client.Object]( + metalnetCache, + &metalnetv1alpha1.LoadBalancer{}, + utilhandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &v1alpha1.Instance{}), + ), ). Complete(r) } diff --git a/metalnetlet/controllers/metalnetnode_controller.go b/metalnetlet/controllers/metalnetnode_controller.go index 93dc03a6..f197b858 100644 --- a/metalnetlet/controllers/metalnetnode_controller.go +++ b/metalnetlet/controllers/metalnetnode_controller.go @@ -189,8 +189,11 @@ func (r *MetalnetNodeReconciler) SetupWithManager(mgr ctrl.Manager, metalnetCach Named("metalnetnode"). WithLogConstructor(r.logConstructor(mgr)). WatchesRawSource( - source.Kind(metalnetCache, &corev1.Node{}), - r.enqueueByMetalnetNode(), + source.Kind[client.Object]( + metalnetCache, + &corev1.Node{}, + r.enqueueByMetalnetNode(), + ), ). Watches( &v1alpha1.Node{}, diff --git a/metalnetlet/controllers/network_controller.go b/metalnetlet/controllers/network_controller.go index 1c18241c..43a4abba 100644 --- a/metalnetlet/controllers/network_controller.go +++ b/metalnetlet/controllers/network_controller.go @@ -247,8 +247,11 @@ func (r *NetworkReconciler) SetupWithManager(mgr ctrl.Manager, metalnetCache cac // builder.WithPredicates(r.networkStatusChangedPredicate()), ). WatchesRawSource( - source.Kind(metalnetCache, &metalnetv1alpha1.Network{}), - metalnetlethandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &apinetv1alpha1.Network{}), + source.Kind[client.Object]( + metalnetCache, + &metalnetv1alpha1.Network{}, + metalnetlethandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &apinetv1alpha1.Network{}), + ), ). Complete(r) } diff --git a/metalnetlet/controllers/networkinterface_controller.go b/metalnetlet/controllers/networkinterface_controller.go index 5a437641..83828a07 100644 --- a/metalnetlet/controllers/networkinterface_controller.go +++ b/metalnetlet/controllers/networkinterface_controller.go @@ -729,12 +729,18 @@ func (r *NetworkInterfaceReconciler) SetupWithManager(mgr ctrl.Manager, metalnet r.enqueueByNetworkPolicyRule(), ). WatchesRawSource( - source.Kind(metalnetCache, &metalnetv1alpha1.NetworkInterface{}), - utilhandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &v1alpha1.NetworkInterface{}), + source.Kind[client.Object]( + metalnetCache, + &metalnetv1alpha1.NetworkInterface{}, + utilhandler.EnqueueRequestForSource(r.Scheme(), r.RESTMapper(), &v1alpha1.NetworkInterface{}), + ), ). WatchesRawSource( - source.Kind(metalnetCache, &corev1.Node{}), - r.enqueueByMetalnetNode(), + source.Kind[client.Object]( + metalnetCache, + &corev1.Node{}, + r.enqueueByMetalnetNode(), + ), ). Complete(r) }