Vendor: Update k8s version
Signed-off-by: Michał Żyłowski <michal.zylowski@intel.com>
This commit is contained in:
parent
dfa93414c5
commit
52baf68d50
3756 changed files with 113013 additions and 92675 deletions
6
vendor/k8s.io/kubernetes/.bazelrc
generated
vendored
Normal file
6
vendor/k8s.io/kubernetes/.bazelrc
generated
vendored
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Show us information about failures.
|
||||
build --verbose_failures
|
||||
test --test_output=errors
|
||||
|
||||
# Retry tests up to 3 times if they fail.
|
||||
test --flaky_test_attempts=3
|
2
vendor/k8s.io/kubernetes/.generated_docs
generated
vendored
2
vendor/k8s.io/kubernetes/.generated_docs
generated
vendored
|
@ -58,6 +58,7 @@ docs/man/man1/kubectl-create.1
|
|||
docs/man/man1/kubectl-delete.1
|
||||
docs/man/man1/kubectl-describe.1
|
||||
docs/man/man1/kubectl-drain.1
|
||||
docs/man/man1/kubectl-edit-configmap.1
|
||||
docs/man/man1/kubectl-edit.1
|
||||
docs/man/man1/kubectl-exec.1
|
||||
docs/man/man1/kubectl-explain.1
|
||||
|
@ -142,6 +143,7 @@ docs/user-guide/kubectl/kubectl_delete.md
|
|||
docs/user-guide/kubectl/kubectl_describe.md
|
||||
docs/user-guide/kubectl/kubectl_drain.md
|
||||
docs/user-guide/kubectl/kubectl_edit.md
|
||||
docs/user-guide/kubectl/kubectl_edit_configmap.md
|
||||
docs/user-guide/kubectl/kubectl_exec.md
|
||||
docs/user-guide/kubectl/kubectl_explain.md
|
||||
docs/user-guide/kubectl/kubectl_expose.md
|
||||
|
|
11
vendor/k8s.io/kubernetes/BUILD.bazel
generated
vendored
11
vendor/k8s.io/kubernetes/BUILD.bazel
generated
vendored
|
@ -12,6 +12,7 @@ gcs_upload(
|
|||
name = "ci-artifacts",
|
||||
data = [
|
||||
"//build/debs",
|
||||
"//build/release-tars",
|
||||
],
|
||||
)
|
||||
|
||||
|
@ -51,13 +52,3 @@ filegroup(
|
|||
],
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-src",
|
||||
extension = "tar.gz",
|
||||
files = [
|
||||
":all-srcs",
|
||||
],
|
||||
package_dir = "kubernetes",
|
||||
strip_prefix = "//",
|
||||
)
|
||||
|
|
454
vendor/k8s.io/kubernetes/Godeps/Godeps.json
generated
vendored
454
vendor/k8s.io/kubernetes/Godeps/Godeps.json
generated
vendored
|
@ -128,6 +128,10 @@
|
|||
"Comment": "v0.8.1-6-gab50d12",
|
||||
"Rev": "ab50d12e88f57788bf84b83fef2be236eb1fcc0b"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/armon/circbuf",
|
||||
"Rev": "bbbad097214e2918d8543d5201d12bfd7bca254d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/asaskevich/govalidator",
|
||||
"Comment": "v4-12-g593d645",
|
||||
|
@ -135,143 +139,163 @@
|
|||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/awserr",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/awsutil",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/client",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/client/metadata",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/corehandlers",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/credentials",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/credentials/endpointcreds",
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/credentials/stscreds",
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/defaults",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/ec2metadata",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/endpoints",
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/request",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/session",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/endpoints",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/aws/signer/v4",
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol",
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol/ec2query",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol/json/jsonutil",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol/jsonrpc",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol/query",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol/query/queryutil",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol/rest",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol/restxml",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/protocol/xml/xmlutil",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/signer/v4",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/private/waiter",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/service/autoscaling",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/service/ec2",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/service/ecr",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/service/elb",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/service/route53",
|
||||
"Comment": "v1.0.8",
|
||||
"Rev": "c924893c38ecc04b18d7aab8a7aa561cb8b4c4cc"
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/aws/aws-sdk-go/service/sts",
|
||||
"Comment": "v1.6.10",
|
||||
"Rev": "63ce630574a5ec05ecd8e8de5cea16332a5a684d"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/beorn7/perks/quantile",
|
||||
|
@ -728,7 +752,7 @@
|
|||
},
|
||||
{
|
||||
"ImportPath": "github.com/coreos/rkt/api/v1alpha",
|
||||
"Comment": "v1.11.0-59-ga83419b",
|
||||
"Comment": "v1.11.0-59-ga83419be",
|
||||
"Rev": "a83419be28ac626876f94a28b4df2dbc9eac7448"
|
||||
},
|
||||
{
|
||||
|
@ -751,12 +775,12 @@
|
|||
},
|
||||
{
|
||||
"ImportPath": "github.com/docker/distribution/digest",
|
||||
"Comment": "v2.4.0-rc.1-38-gcd27f17",
|
||||
"Comment": "v2.4.0-rc.1-38-gcd27f179",
|
||||
"Rev": "cd27f179f2c10c5d300e6d09025b538c475b0d51"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/docker/distribution/reference",
|
||||
"Comment": "v2.4.0-rc.1-38-gcd27f17",
|
||||
"Comment": "v2.4.0-rc.1-38-gcd27f179",
|
||||
"Rev": "cd27f179f2c10c5d300e6d09025b538c475b0d51"
|
||||
},
|
||||
{
|
||||
|
@ -1000,127 +1024,127 @@
|
|||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/gogoproto",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/compare",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/defaultcheck",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/description",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/embedcheck",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/enumstringer",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/equal",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/face",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/gostring",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/marshalto",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/oneofcheck",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/populate",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/size",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/stringer",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/testgen",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/union",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/plugin/unmarshal",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/proto",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/protoc-gen-gogo/descriptor",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/protoc-gen-gogo/generator",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/protoc-gen-gogo/grpc",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/protoc-gen-gogo/plugin",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/sortkeys",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/vanity",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/gogo/protobuf/vanity/command",
|
||||
"Comment": "v0.2-33-ge18d7aa",
|
||||
"Comment": "v0.2-33-ge18d7aa8",
|
||||
"Rev": "e18d7aa8f8c624c915db340349aad4c49b10d173"
|
||||
},
|
||||
{
|
||||
|
@ -1149,203 +1173,203 @@
|
|||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/api",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/cache/memory",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/client/v2",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/collector",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/container",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/container/common",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/container/docker",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/container/libcontainer",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/container/raw",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/container/rkt",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/container/systemd",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/devicemapper",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/events",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/fs",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/healthz",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/http",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/http/mux",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/info/v1",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/info/v2",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/machine",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/manager",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/manager/watcher",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/manager/watcher/raw",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/manager/watcher/rkt",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/metrics",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/pages",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/pages/static",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/storage",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/summary",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils/cloudinfo",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils/cpuload",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils/cpuload/netlink",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils/docker",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils/oomparser",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils/sysfs",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils/sysinfo",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/utils/tail",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/validate",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/cadvisor/version",
|
||||
"Comment": "v0.24.0-alpha1-56-ga726d13",
|
||||
"Rev": "a726d13de8cb32860e73d72a78dc8e0124267709"
|
||||
"Comment": "v0.24.0-alpha1-82-gc30a9e7",
|
||||
"Rev": "c30a9e7d3642fffb422f08be34a7bbc15d69cdbf"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/google/certificate-transparency/go",
|
||||
|
@ -1922,187 +1946,187 @@
|
|||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/blockstorage/v1/volumes",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/common/extensions",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/compute/v2/extensions/bootfromvolume",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/compute/v2/extensions/diskconfig",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/compute/v2/extensions/volumeattach",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/compute/v2/flavors",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/compute/v2/images",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/compute/v2/servers",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/identity/v2/tenants",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/identity/v2/tokens",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/identity/v3/extensions/trust",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/identity/v3/tokens",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/layer3/floatingips",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/layer3/routers",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/lbaas/members",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/lbaas/monitors",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/lbaas/pools",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/lbaas/vips",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/lbaas_v2/listeners",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/lbaas_v2/loadbalancers",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/lbaas_v2/monitors",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/lbaas_v2/pools",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/security/groups",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/security/rules",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/networking/v2/ports",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/openstack/utils",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/pagination",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/rackspace",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/rackspace/blockstorage/v1/volumes",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/rackspace/compute/v2/servers",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/rackspace/compute/v2/volumeattach",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/rackspace/identity/v2/tokens",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/testhelper",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
"ImportPath": "github.com/rackspace/gophercloud/testhelper/client",
|
||||
"Comment": "v1.0.0-1012-ge00690e",
|
||||
"Comment": "v1.0.0-1012-ge00690e8",
|
||||
"Rev": "e00690e87603abe613e9f02c816c7c4bef82e063"
|
||||
},
|
||||
{
|
||||
|
@ -2639,43 +2663,43 @@
|
|||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/args",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/examples/deepcopy-gen/generators",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/examples/defaulter-gen/generators",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/examples/import-boss/generators",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/examples/set-gen/generators",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/examples/set-gen/sets",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/generator",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/namer",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/parser",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/gengo/types",
|
||||
"Rev": "3c6a809462caf39389d70d9ea787ed24c5acffed"
|
||||
"Rev": "c118aa8edfff53fe5b69127a970f54b6cf3a7563"
|
||||
},
|
||||
{
|
||||
"ImportPath": "k8s.io/heapster/metrics/api/v1/types",
|
||||
|
|
1290
vendor/k8s.io/kubernetes/Godeps/LICENSES
generated
vendored
1290
vendor/k8s.io/kubernetes/Godeps/LICENSES
generated
vendored
File diff suppressed because it is too large
Load diff
18
vendor/k8s.io/kubernetes/Makefile
generated
vendored
18
vendor/k8s.io/kubernetes/Makefile
generated
vendored
|
@ -470,7 +470,7 @@ help:
|
|||
endif
|
||||
|
||||
# Non-dockerized bazel rules.
|
||||
.PHONY: bazel-build bazel-test
|
||||
.PHONY: bazel-build bazel-test bazel-release
|
||||
|
||||
ifeq ($(PRINT_HELP),y)
|
||||
define BAZEL_BUILD_HELP_INFO
|
||||
|
@ -498,5 +498,19 @@ endef
|
|||
@echo "$$BAZEL_TEST_HELP_INFO"
|
||||
else
|
||||
bazel-test:
|
||||
bazel test --test_output=errors //cmd/... //pkg/... //federation/... //plugin/... //build/... //third_party/... //hack/...
|
||||
bazel test //cmd/... //pkg/... //federation/... //plugin/... //build/... //third_party/... //hack/... //hack:verify-all
|
||||
endif
|
||||
|
||||
ifeq ($(PRINT_HELP),y)
|
||||
define BAZEL_BUILD_HELP_INFO
|
||||
# Build release tars with bazel
|
||||
#
|
||||
# Example:
|
||||
# make bazel-release
|
||||
endef
|
||||
bazel-release:
|
||||
@echo "$$BAZEL_BUILD_HELP_INFO"
|
||||
else
|
||||
bazel-release:
|
||||
bazel build //build/release-tars
|
||||
endif
|
||||
|
|
9
vendor/k8s.io/kubernetes/OWNERS
generated
vendored
9
vendor/k8s.io/kubernetes/OWNERS
generated
vendored
|
@ -1,4 +1,11 @@
|
|||
assignees:
|
||||
reviewers:
|
||||
- brendandburns
|
||||
- dchen1107
|
||||
- jbeda
|
||||
- lavalamp
|
||||
- smarterclayton
|
||||
- thockin
|
||||
approvers:
|
||||
- bgrant0607
|
||||
- brendandburns
|
||||
- dchen1107
|
||||
|
|
18
vendor/k8s.io/kubernetes/OWNERS_ALIASES
generated
vendored
18
vendor/k8s.io/kubernetes/OWNERS_ALIASES
generated
vendored
|
@ -29,3 +29,21 @@ aliases:
|
|||
- ixdy
|
||||
- rmmh
|
||||
- spxtr
|
||||
sig-node-reviewers:
|
||||
- Random-Liu
|
||||
- dashpole
|
||||
- dchen1107
|
||||
- derekwaynecarr
|
||||
- dims
|
||||
- euank
|
||||
- feiskyer
|
||||
- mtaufen
|
||||
- ncdc
|
||||
- pmorie
|
||||
- resouer
|
||||
- sjpotter
|
||||
- timstclair
|
||||
- tmrts
|
||||
- vishh
|
||||
- yifan-gu
|
||||
- yujuhong
|
||||
|
|
10
vendor/k8s.io/kubernetes/WORKSPACE
generated
vendored
10
vendor/k8s.io/kubernetes/WORKSPACE
generated
vendored
|
@ -10,6 +10,12 @@ git_repository(
|
|||
remote = "https://github.com/kubernetes/release.git",
|
||||
)
|
||||
|
||||
git_repository(
|
||||
name = "io_bazel",
|
||||
commit = "3b29803eb528ff525c7024190ffbf4b08c598cf2",
|
||||
remote = "https://github.com/ixdy/bazel.git",
|
||||
)
|
||||
|
||||
load("@io_bazel_rules_go//go:def.bzl", "go_repositories")
|
||||
|
||||
go_repositories()
|
||||
|
@ -23,8 +29,8 @@ debs = (
|
|||
),
|
||||
(
|
||||
"libc_deb",
|
||||
"ee4d9dea08728e2c2bbf43d819c3c7e61798245fab4b983ae910865980f791ad",
|
||||
"http://ftp.us.debian.org/debian/pool/main/g/glibc/libc6_2.19-18+deb8u6_amd64.deb",
|
||||
"6bbd506b171a9f29b09fde77e2749c0aa0c1439058df9d1a6408d464069b7dd6",
|
||||
"http://ftp.us.debian.org/debian/pool/main/g/glibc/libc6_2.24-9_amd64.deb",
|
||||
),
|
||||
(
|
||||
"iptables_deb",
|
||||
|
|
3210
vendor/k8s.io/kubernetes/api/openapi-spec/swagger.json
generated
vendored
3210
vendor/k8s.io/kubernetes/api/openapi-spec/swagger.json
generated
vendored
File diff suppressed because it is too large
Load diff
54
vendor/k8s.io/kubernetes/api/swagger-spec/apps_v1beta1.json
generated
vendored
54
vendor/k8s.io/kubernetes/api/swagger-spec/apps_v1beta1.json
generated
vendored
|
@ -1353,6 +1353,10 @@
|
|||
"affinity": {
|
||||
"$ref": "v1.Affinity",
|
||||
"description": "If specified, the pod's scheduling constraints"
|
||||
},
|
||||
"schedulername": {
|
||||
"type": "string",
|
||||
"description": "If specified, the pod will be dispatched by specified scheduler. If not specified, the pod will be dispatched by default scheduler."
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -1570,12 +1574,16 @@
|
|||
"items": {
|
||||
"$ref": "v1.KeyToPath"
|
||||
},
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
},
|
||||
"defaultMode": {
|
||||
"type": "integer",
|
||||
"format": "int32",
|
||||
"description": "Optional: mode bits to use on created files by default. Must be a value between 0 and 0777. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret or it's keys must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2001,12 +2009,16 @@
|
|||
"items": {
|
||||
"$ref": "v1.KeyToPath"
|
||||
},
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
},
|
||||
"defaultMode": {
|
||||
"type": "integer",
|
||||
"format": "int32",
|
||||
"description": "Optional: mode bits to use on created files by default. Must be a value between 0 and 0777. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap or it's keys must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2187,7 +2199,11 @@
|
|||
},
|
||||
"terminationMessagePath": {
|
||||
"type": "string",
|
||||
"description": "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Defaults to /dev/termination-log. Cannot be updated."
|
||||
"description": "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated."
|
||||
},
|
||||
"terminationMessagePolicy": {
|
||||
"type": "string",
|
||||
"description": "Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the container status message on both success and failure. FallbackToLogsOnError will use the last chunk of container log output if the termination message file is empty and the container exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated."
|
||||
},
|
||||
"imagePullPolicy": {
|
||||
"type": "string",
|
||||
|
@ -2253,6 +2269,10 @@
|
|||
"configMapRef": {
|
||||
"$ref": "v1.ConfigMapEnvSource",
|
||||
"description": "The ConfigMap to select from"
|
||||
},
|
||||
"secretRef": {
|
||||
"$ref": "v1.SecretEnvSource",
|
||||
"description": "The Secret to select from"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2263,6 +2283,24 @@
|
|||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
"v1.SecretEnvSource": {
|
||||
"id": "v1.SecretEnvSource",
|
||||
"description": "SecretEnvSource selects a Secret to populate the environment variables with.\n\nThe contents of the target Secret's Data field will represent the key-value pairs as environment variables.",
|
||||
"properties": {
|
||||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2323,6 +2361,10 @@
|
|||
"key": {
|
||||
"type": "string",
|
||||
"description": "The key to select."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap or it's key must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2340,6 +2382,10 @@
|
|||
"key": {
|
||||
"type": "string",
|
||||
"description": "The key of the secret to select from. Must be a valid secret key."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret or it's key must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -3040,7 +3086,7 @@
|
|||
},
|
||||
"v1.DeleteOptions": {
|
||||
"id": "v1.DeleteOptions",
|
||||
"description": "DeleteOptions may be provided when deleting an API object",
|
||||
"description": "DeleteOptions may be provided when deleting an API object.",
|
||||
"properties": {
|
||||
"kind": {
|
||||
"type": "string",
|
||||
|
|
2
vendor/k8s.io/kubernetes/api/swagger-spec/autoscaling_v1.json
generated
vendored
2
vendor/k8s.io/kubernetes/api/swagger-spec/autoscaling_v1.json
generated
vendored
|
@ -1371,7 +1371,7 @@
|
|||
},
|
||||
"v1.DeleteOptions": {
|
||||
"id": "v1.DeleteOptions",
|
||||
"description": "DeleteOptions may be provided when deleting an API object",
|
||||
"description": "DeleteOptions may be provided when deleting an API object.",
|
||||
"properties": {
|
||||
"kind": {
|
||||
"type": "string",
|
||||
|
|
54
vendor/k8s.io/kubernetes/api/swagger-spec/batch_v1.json
generated
vendored
54
vendor/k8s.io/kubernetes/api/swagger-spec/batch_v1.json
generated
vendored
|
@ -1358,6 +1358,10 @@
|
|||
"affinity": {
|
||||
"$ref": "v1.Affinity",
|
||||
"description": "If specified, the pod's scheduling constraints"
|
||||
},
|
||||
"schedulername": {
|
||||
"type": "string",
|
||||
"description": "If specified, the pod will be dispatched by specified scheduler. If not specified, the pod will be dispatched by default scheduler."
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -1575,12 +1579,16 @@
|
|||
"items": {
|
||||
"$ref": "v1.KeyToPath"
|
||||
},
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
},
|
||||
"defaultMode": {
|
||||
"type": "integer",
|
||||
"format": "int32",
|
||||
"description": "Optional: mode bits to use on created files by default. Must be a value between 0 and 0777. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret or it's keys must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2006,12 +2014,16 @@
|
|||
"items": {
|
||||
"$ref": "v1.KeyToPath"
|
||||
},
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
},
|
||||
"defaultMode": {
|
||||
"type": "integer",
|
||||
"format": "int32",
|
||||
"description": "Optional: mode bits to use on created files by default. Must be a value between 0 and 0777. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap or it's keys must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2192,7 +2204,11 @@
|
|||
},
|
||||
"terminationMessagePath": {
|
||||
"type": "string",
|
||||
"description": "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Defaults to /dev/termination-log. Cannot be updated."
|
||||
"description": "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated."
|
||||
},
|
||||
"terminationMessagePolicy": {
|
||||
"type": "string",
|
||||
"description": "Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the container status message on both success and failure. FallbackToLogsOnError will use the last chunk of container log output if the termination message file is empty and the container exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated."
|
||||
},
|
||||
"imagePullPolicy": {
|
||||
"type": "string",
|
||||
|
@ -2258,6 +2274,10 @@
|
|||
"configMapRef": {
|
||||
"$ref": "v1.ConfigMapEnvSource",
|
||||
"description": "The ConfigMap to select from"
|
||||
},
|
||||
"secretRef": {
|
||||
"$ref": "v1.SecretEnvSource",
|
||||
"description": "The Secret to select from"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2268,6 +2288,24 @@
|
|||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
"v1.SecretEnvSource": {
|
||||
"id": "v1.SecretEnvSource",
|
||||
"description": "SecretEnvSource selects a Secret to populate the environment variables with.\n\nThe contents of the target Secret's Data field will represent the key-value pairs as environment variables.",
|
||||
"properties": {
|
||||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2328,6 +2366,10 @@
|
|||
"key": {
|
||||
"type": "string",
|
||||
"description": "The key to select."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap or it's key must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -2345,6 +2387,10 @@
|
|||
"key": {
|
||||
"type": "string",
|
||||
"description": "The key of the secret to select from. Must be a valid secret key."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret or it's key must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -3020,7 +3066,7 @@
|
|||
},
|
||||
"v1.DeleteOptions": {
|
||||
"id": "v1.DeleteOptions",
|
||||
"description": "DeleteOptions may be provided when deleting an API object",
|
||||
"description": "DeleteOptions may be provided when deleting an API object.",
|
||||
"properties": {
|
||||
"kind": {
|
||||
"type": "string",
|
||||
|
|
1173
vendor/k8s.io/kubernetes/api/swagger-spec/certificates.k8s.io_v1beta1.json
generated
vendored
Normal file
1173
vendor/k8s.io/kubernetes/api/swagger-spec/certificates.k8s.io_v1beta1.json
generated
vendored
Normal file
File diff suppressed because it is too large
Load diff
54
vendor/k8s.io/kubernetes/api/swagger-spec/extensions_v1beta1.json
generated
vendored
54
vendor/k8s.io/kubernetes/api/swagger-spec/extensions_v1beta1.json
generated
vendored
|
@ -7730,6 +7730,10 @@
|
|||
"affinity": {
|
||||
"$ref": "v1.Affinity",
|
||||
"description": "If specified, the pod's scheduling constraints"
|
||||
},
|
||||
"schedulername": {
|
||||
"type": "string",
|
||||
"description": "If specified, the pod will be dispatched by specified scheduler. If not specified, the pod will be dispatched by default scheduler."
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -7947,12 +7951,16 @@
|
|||
"items": {
|
||||
"$ref": "v1.KeyToPath"
|
||||
},
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
},
|
||||
"defaultMode": {
|
||||
"type": "integer",
|
||||
"format": "int32",
|
||||
"description": "Optional: mode bits to use on created files by default. Must be a value between 0 and 0777. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret or it's keys must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -8378,12 +8386,16 @@
|
|||
"items": {
|
||||
"$ref": "v1.KeyToPath"
|
||||
},
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
},
|
||||
"defaultMode": {
|
||||
"type": "integer",
|
||||
"format": "int32",
|
||||
"description": "Optional: mode bits to use on created files by default. Must be a value between 0 and 0777. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap or it's keys must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -8564,7 +8576,11 @@
|
|||
},
|
||||
"terminationMessagePath": {
|
||||
"type": "string",
|
||||
"description": "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Defaults to /dev/termination-log. Cannot be updated."
|
||||
"description": "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated."
|
||||
},
|
||||
"terminationMessagePolicy": {
|
||||
"type": "string",
|
||||
"description": "Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the container status message on both success and failure. FallbackToLogsOnError will use the last chunk of container log output if the termination message file is empty and the container exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated."
|
||||
},
|
||||
"imagePullPolicy": {
|
||||
"type": "string",
|
||||
|
@ -8630,6 +8646,10 @@
|
|||
"configMapRef": {
|
||||
"$ref": "v1.ConfigMapEnvSource",
|
||||
"description": "The ConfigMap to select from"
|
||||
},
|
||||
"secretRef": {
|
||||
"$ref": "v1.SecretEnvSource",
|
||||
"description": "The Secret to select from"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -8640,6 +8660,24 @@
|
|||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
"v1.SecretEnvSource": {
|
||||
"id": "v1.SecretEnvSource",
|
||||
"description": "SecretEnvSource selects a Secret to populate the environment variables with.\n\nThe contents of the target Secret's Data field will represent the key-value pairs as environment variables.",
|
||||
"properties": {
|
||||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -8700,6 +8738,10 @@
|
|||
"key": {
|
||||
"type": "string",
|
||||
"description": "The key to select."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap or it's key must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -8717,6 +8759,10 @@
|
|||
"key": {
|
||||
"type": "string",
|
||||
"description": "The key of the secret to select from. Must be a valid secret key."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret or it's key must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -9359,7 +9405,7 @@
|
|||
},
|
||||
"v1.DeleteOptions": {
|
||||
"id": "v1.DeleteOptions",
|
||||
"description": "DeleteOptions may be provided when deleting an API object",
|
||||
"description": "DeleteOptions may be provided when deleting an API object.",
|
||||
"properties": {
|
||||
"kind": {
|
||||
"type": "string",
|
||||
|
|
2
vendor/k8s.io/kubernetes/api/swagger-spec/policy_v1beta1.json
generated
vendored
2
vendor/k8s.io/kubernetes/api/swagger-spec/policy_v1beta1.json
generated
vendored
|
@ -1381,7 +1381,7 @@
|
|||
},
|
||||
"v1.DeleteOptions": {
|
||||
"id": "v1.DeleteOptions",
|
||||
"description": "DeleteOptions may be provided when deleting an API object",
|
||||
"description": "DeleteOptions may be provided when deleting an API object.",
|
||||
"properties": {
|
||||
"kind": {
|
||||
"type": "string",
|
||||
|
|
6
vendor/k8s.io/kubernetes/api/swagger-spec/rbac.authorization.k8s.io_v1alpha1.json
generated
vendored
6
vendor/k8s.io/kubernetes/api/swagger-spec/rbac.authorization.k8s.io_v1alpha1.json
generated
vendored
|
@ -3068,7 +3068,7 @@
|
|||
},
|
||||
"v1.DeleteOptions": {
|
||||
"id": "v1.DeleteOptions",
|
||||
"description": "DeleteOptions may be provided when deleting an API object",
|
||||
"description": "DeleteOptions may be provided when deleting an API object.",
|
||||
"properties": {
|
||||
"kind": {
|
||||
"type": "string",
|
||||
|
@ -3177,10 +3177,6 @@
|
|||
},
|
||||
"description": "Verbs is a list of Verbs that apply to ALL the ResourceKinds and AttributeRestrictions contained in this rule. VerbAll represents all kinds."
|
||||
},
|
||||
"attributeRestrictions": {
|
||||
"type": "string",
|
||||
"description": "AttributeRestrictions will vary depending on what the Authorizer/AuthorizationAttributeBuilder pair supports. If the Authorizer does not recognize how to handle the AttributeRestrictions, the Authorizer should report an error."
|
||||
},
|
||||
"apiGroups": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
|
|
3388
vendor/k8s.io/kubernetes/api/swagger-spec/rbac.authorization.k8s.io_v1beta1.json
generated
vendored
Normal file
3388
vendor/k8s.io/kubernetes/api/swagger-spec/rbac.authorization.k8s.io_v1beta1.json
generated
vendored
Normal file
File diff suppressed because it is too large
Load diff
8
vendor/k8s.io/kubernetes/api/swagger-spec/resourceListing.json
generated
vendored
8
vendor/k8s.io/kubernetes/api/swagger-spec/resourceListing.json
generated
vendored
|
@ -66,8 +66,8 @@
|
|||
"description": "get information of a group"
|
||||
},
|
||||
{
|
||||
"path": "/apis/certificates.k8s.io/v1alpha1",
|
||||
"description": "API at /apis/certificates.k8s.io/v1alpha1"
|
||||
"path": "/apis/certificates.k8s.io/v1beta1",
|
||||
"description": "API at /apis/certificates.k8s.io/v1beta1"
|
||||
},
|
||||
{
|
||||
"path": "/apis/certificates.k8s.io",
|
||||
|
@ -89,6 +89,10 @@
|
|||
"path": "/apis/policy",
|
||||
"description": "get information of a group"
|
||||
},
|
||||
{
|
||||
"path": "/apis/rbac.authorization.k8s.io/v1beta1",
|
||||
"description": "API at /apis/rbac.authorization.k8s.io/v1beta1"
|
||||
},
|
||||
{
|
||||
"path": "/apis/rbac.authorization.k8s.io/v1alpha1",
|
||||
"description": "API at /apis/rbac.authorization.k8s.io/v1alpha1"
|
||||
|
|
2
vendor/k8s.io/kubernetes/api/swagger-spec/storage.k8s.io_v1beta1.json
generated
vendored
2
vendor/k8s.io/kubernetes/api/swagger-spec/storage.k8s.io_v1beta1.json
generated
vendored
|
@ -894,7 +894,7 @@
|
|||
},
|
||||
"v1.DeleteOptions": {
|
||||
"id": "v1.DeleteOptions",
|
||||
"description": "DeleteOptions may be provided when deleting an API object",
|
||||
"description": "DeleteOptions may be provided when deleting an API object.",
|
||||
"properties": {
|
||||
"kind": {
|
||||
"type": "string",
|
||||
|
|
54
vendor/k8s.io/kubernetes/api/swagger-spec/v1.json
generated
vendored
54
vendor/k8s.io/kubernetes/api/swagger-spec/v1.json
generated
vendored
|
@ -16597,7 +16597,7 @@
|
|||
},
|
||||
"v1.DeleteOptions": {
|
||||
"id": "v1.DeleteOptions",
|
||||
"description": "DeleteOptions may be provided when deleting an API object",
|
||||
"description": "DeleteOptions may be provided when deleting an API object.",
|
||||
"properties": {
|
||||
"kind": {
|
||||
"type": "string",
|
||||
|
@ -18272,6 +18272,10 @@
|
|||
"affinity": {
|
||||
"$ref": "v1.Affinity",
|
||||
"description": "If specified, the pod's scheduling constraints"
|
||||
},
|
||||
"schedulername": {
|
||||
"type": "string",
|
||||
"description": "If specified, the pod will be dispatched by specified scheduler. If not specified, the pod will be dispatched by default scheduler."
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -18424,12 +18428,16 @@
|
|||
"items": {
|
||||
"$ref": "v1.KeyToPath"
|
||||
},
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced Secret will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the Secret, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
},
|
||||
"defaultMode": {
|
||||
"type": "integer",
|
||||
"format": "int32",
|
||||
"description": "Optional: mode bits to use on created files by default. Must be a value between 0 and 0777. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret or it's keys must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -18568,12 +18576,16 @@
|
|||
"items": {
|
||||
"$ref": "v1.KeyToPath"
|
||||
},
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
"description": "If unspecified, each key-value pair in the Data field of the referenced ConfigMap will be projected into the volume as a file whose name is the key and content is the value. If specified, the listed keys will be projected into the specified paths, and unlisted keys will not be present. If a key is specified which is not present in the ConfigMap, the volume setup will error unless it is marked optional. Paths must be relative and may not contain the '..' path or start with '..'."
|
||||
},
|
||||
"defaultMode": {
|
||||
"type": "integer",
|
||||
"format": "int32",
|
||||
"description": "Optional: mode bits to use on created files by default. Must be a value between 0 and 0777. Defaults to 0644. Directories within the path are not affected by this setting. This might be in conflict with other options that affect the file mode, like fsGroup, and the result can be other mode bits set."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap or it's keys must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -18656,7 +18668,11 @@
|
|||
},
|
||||
"terminationMessagePath": {
|
||||
"type": "string",
|
||||
"description": "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Defaults to /dev/termination-log. Cannot be updated."
|
||||
"description": "Optional: Path at which the file to which the container's termination message will be written is mounted into the container's filesystem. Message written is intended to be brief final status, such as an assertion failure message. Will be truncated by the node if greater than 4096 bytes. The total message length across all containers will be limited to 12kb. Defaults to /dev/termination-log. Cannot be updated."
|
||||
},
|
||||
"terminationMessagePolicy": {
|
||||
"type": "string",
|
||||
"description": "Indicate how the termination message should be populated. File will use the contents of terminationMessagePath to populate the container status message on both success and failure. FallbackToLogsOnError will use the last chunk of container log output if the termination message file is empty and the container exited with an error. The log output is limited to 2048 bytes or 80 lines, whichever is smaller. Defaults to File. Cannot be updated."
|
||||
},
|
||||
"imagePullPolicy": {
|
||||
"type": "string",
|
||||
|
@ -18722,6 +18738,10 @@
|
|||
"configMapRef": {
|
||||
"$ref": "v1.ConfigMapEnvSource",
|
||||
"description": "The ConfigMap to select from"
|
||||
},
|
||||
"secretRef": {
|
||||
"$ref": "v1.SecretEnvSource",
|
||||
"description": "The Secret to select from"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -18732,6 +18752,24 @@
|
|||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
"v1.SecretEnvSource": {
|
||||
"id": "v1.SecretEnvSource",
|
||||
"description": "SecretEnvSource selects a Secret to populate the environment variables with.\n\nThe contents of the target Secret's Data field will represent the key-value pairs as environment variables.",
|
||||
"properties": {
|
||||
"name": {
|
||||
"type": "string",
|
||||
"description": "Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names"
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -18792,6 +18830,10 @@
|
|||
"key": {
|
||||
"type": "string",
|
||||
"description": "The key to select."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the ConfigMap or it's key must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -18809,6 +18851,10 @@
|
|||
"key": {
|
||||
"type": "string",
|
||||
"description": "The key of the secret to select from. Must be a valid secret key."
|
||||
},
|
||||
"optional": {
|
||||
"type": "boolean",
|
||||
"description": "Specify whether the Secret or it's key must be defined"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
|
94
vendor/k8s.io/kubernetes/build/BUILD
generated
vendored
94
vendor/k8s.io/kubernetes/build/BUILD
generated
vendored
|
@ -1,6 +1,22 @@
|
|||
package(default_visibility = ["//visibility:public"])
|
||||
|
||||
load("@bazel_tools//tools/build_defs/docker:docker.bzl", "docker_build")
|
||||
load("@io_bazel//tools/build_defs/docker:docker.bzl", "docker_build")
|
||||
|
||||
filegroup(
|
||||
name = "package-srcs",
|
||||
srcs = glob(["**"]),
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "all-srcs",
|
||||
srcs = [
|
||||
":package-srcs",
|
||||
"//build/debs:all-srcs",
|
||||
"//build/release-tars:all-srcs",
|
||||
],
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
docker_build(
|
||||
name = "busybox",
|
||||
|
@ -34,43 +50,59 @@ docker_build(
|
|||
],
|
||||
)
|
||||
|
||||
DOCKERIZED_BINARIES = {
|
||||
"kube-apiserver": {
|
||||
"base": ":busybox-libc",
|
||||
"target": "//cmd/kube-apiserver:kube-apiserver",
|
||||
},
|
||||
"kube-controller-manager": {
|
||||
"base": ":busybox-libc",
|
||||
"target": "//cmd/kube-controller-manager:kube-controller-manager",
|
||||
},
|
||||
"kube-scheduler": {
|
||||
"base": ":busybox-libc",
|
||||
"target": "//plugin/cmd/kube-scheduler:kube-scheduler",
|
||||
},
|
||||
"kube-aggregator": {
|
||||
"base": ":busybox-libc",
|
||||
"target": "//cmd/kube-aggregator:kube-aggregator",
|
||||
},
|
||||
"kube-proxy": {
|
||||
"base": ":busybox-net",
|
||||
"target": "//cmd/kube-proxy:kube-proxy",
|
||||
},
|
||||
}
|
||||
|
||||
[genrule(
|
||||
name = binary + "_docker_tag",
|
||||
srcs = [meta["target"]],
|
||||
outs = [binary + ".docker_tag"],
|
||||
# Currently each target has two outputs, the binary and its library, so hash only the first item (the binary).
|
||||
# This can be made less hacky when we have static linking working.
|
||||
cmd = "md5sum $(locations " + meta["target"] + ") | grep '" + binary + "'$$ | cut -f1 -d' ' | tr -d '\n' > $@",
|
||||
) for binary, meta in DOCKERIZED_BINARIES.items()]
|
||||
|
||||
[docker_build(
|
||||
name = binary,
|
||||
base = ":busybox-libc",
|
||||
base = meta["base"],
|
||||
cmd = ["/usr/bin/" + binary],
|
||||
debs = [
|
||||
"//build/debs:%s.deb" % binary,
|
||||
],
|
||||
repository = "gcr.io/google-containers",
|
||||
) for binary in [
|
||||
"kube-apiserver",
|
||||
"kube-controller-manager",
|
||||
"kube-scheduler",
|
||||
"kube-aggregator",
|
||||
]]
|
||||
|
||||
docker_build(
|
||||
name = "kube-proxy",
|
||||
base = ":busybox-net",
|
||||
cmd = ["/usr/bin/kube-proxy"],
|
||||
debs = [
|
||||
"//build/debs:kube-proxy.deb",
|
||||
image_tags = [
|
||||
"@%s.docker_tag" % binary,
|
||||
],
|
||||
repository = "gcr.io/google-containers",
|
||||
)
|
||||
repository = "gcr.io/google_containers/" + binary,
|
||||
repository_append_package = False,
|
||||
symlinks = {
|
||||
# Some cluster startup scripts expect to find the binaries in /usr/local/bin,
|
||||
# but the debs install the binaries into /usr/bin.
|
||||
"/usr/local/bin/" + binary: "/usr/bin/" + binary,
|
||||
},
|
||||
) for binary, meta in DOCKERIZED_BINARIES.items()]
|
||||
|
||||
filegroup(
|
||||
name = "package-srcs",
|
||||
srcs = glob(["**"]),
|
||||
tags = ["automanaged"],
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "all-srcs",
|
||||
srcs = [
|
||||
":package-srcs",
|
||||
"//build/debs:all-srcs",
|
||||
],
|
||||
tags = ["automanaged"],
|
||||
name = "docker-artifacts",
|
||||
srcs = [":%s.tar" % binary for binary in DOCKERIZED_BINARIES.keys()] +
|
||||
[":%s.docker_tag" % binary for binary in DOCKERIZED_BINARIES.keys()],
|
||||
)
|
||||
|
|
8
vendor/k8s.io/kubernetes/build/OWNERS
generated
vendored
8
vendor/k8s.io/kubernetes/build/OWNERS
generated
vendored
|
@ -1,4 +1,10 @@
|
|||
assignees:
|
||||
reviewers:
|
||||
- ihmccreery
|
||||
- ixdy
|
||||
- jbeda
|
||||
- lavalamp
|
||||
- zmerlynn
|
||||
approvers:
|
||||
- ihmccreery
|
||||
- ixdy
|
||||
- jbeda
|
||||
|
|
43
vendor/k8s.io/kubernetes/build/lib/release.sh
generated
vendored
43
vendor/k8s.io/kubernetes/build/lib/release.sh
generated
vendored
|
@ -356,34 +356,37 @@ function kube::release::package_salt_tarball() {
|
|||
function kube::release::package_kube_manifests_tarball() {
|
||||
kube::log::status "Building tarball: manifests"
|
||||
|
||||
local salt_dir="${KUBE_ROOT}/cluster/saltbase/salt"
|
||||
|
||||
local release_stage="${RELEASE_STAGE}/manifests/kubernetes"
|
||||
rm -rf "${release_stage}"
|
||||
local dst_dir="${release_stage}/gci-trusty"
|
||||
mkdir -p "${dst_dir}"
|
||||
|
||||
local salt_dir="${KUBE_ROOT}/cluster/saltbase/salt"
|
||||
cp "${salt_dir}/cluster-autoscaler/cluster-autoscaler.manifest" "${dst_dir}/"
|
||||
mkdir -p "${release_stage}"
|
||||
cp "${salt_dir}/fluentd-gcp/fluentd-gcp.yaml" "${release_stage}/"
|
||||
cp "${salt_dir}/kube-registry-proxy/kube-registry-proxy.yaml" "${release_stage}/"
|
||||
cp "${salt_dir}/kube-proxy/kube-proxy.manifest" "${release_stage}/"
|
||||
cp "${salt_dir}/etcd/etcd.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-scheduler/kube-scheduler.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-apiserver/kube-apiserver.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-apiserver/abac-authz-policy.jsonl" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-controller-manager/kube-controller-manager.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-addons/kube-addon-manager.yaml" "${dst_dir}"
|
||||
cp "${salt_dir}/l7-gcp/glbc.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/rescheduler/rescheduler.manifest" "${dst_dir}/"
|
||||
cp "${salt_dir}/e2e-image-puller/e2e-image-puller.manifest" "${dst_dir}/"
|
||||
cp "${KUBE_ROOT}/cluster/gce/trusty/configure-helper.sh" "${dst_dir}/trusty-configure-helper.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/configure-helper.sh" "${dst_dir}/gci-configure-helper.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/mounter/mounter" "${dst_dir}/gci-mounter"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/health-monitor.sh" "${dst_dir}/health-monitor.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/container-linux/configure-helper.sh" "${dst_dir}/container-linux-configure-helper.sh"
|
||||
cp -r "${salt_dir}/kube-admission-controls/limit-range" "${dst_dir}"
|
||||
|
||||
local gci_dst_dir="${release_stage}/gci-trusty"
|
||||
mkdir -p "${gci_dst_dir}"
|
||||
cp "${salt_dir}/cluster-autoscaler/cluster-autoscaler.manifest" "${gci_dst_dir}/"
|
||||
cp "${salt_dir}/etcd/etcd.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-scheduler/kube-scheduler.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-apiserver/kube-apiserver.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-apiserver/abac-authz-policy.jsonl" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-controller-manager/kube-controller-manager.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-addons/kube-addon-manager.yaml" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/l7-gcp/glbc.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/rescheduler/rescheduler.manifest" "${gci_dst_dir}/"
|
||||
cp "${salt_dir}/e2e-image-puller/e2e-image-puller.manifest" "${gci_dst_dir}/"
|
||||
cp "${KUBE_ROOT}/cluster/gce/trusty/configure-helper.sh" "${gci_dst_dir}/trusty-configure-helper.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/configure-helper.sh" "${gci_dst_dir}/gci-configure-helper.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/mounter/mounter" "${gci_dst_dir}/gci-mounter"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/health-monitor.sh" "${gci_dst_dir}/health-monitor.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/container-linux/configure-helper.sh" "${gci_dst_dir}/container-linux-configure-helper.sh"
|
||||
cp -r "${salt_dir}/kube-admission-controls/limit-range" "${gci_dst_dir}"
|
||||
local objects
|
||||
objects=$(cd "${KUBE_ROOT}/cluster/addons" && find . \( -name \*.yaml -or -name \*.yaml.in -or -name \*.json \) | grep -v demo)
|
||||
tar c -C "${KUBE_ROOT}/cluster/addons" ${objects} | tar x -C "${dst_dir}"
|
||||
tar c -C "${KUBE_ROOT}/cluster/addons" ${objects} | tar x -C "${gci_dst_dir}"
|
||||
|
||||
kube::release::clean_cruft
|
||||
|
||||
|
|
15
vendor/k8s.io/kubernetes/build/pause/Makefile
generated
vendored
15
vendor/k8s.io/kubernetes/build/pause/Makefile
generated
vendored
|
@ -12,7 +12,7 @@
|
|||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
.PHONY: all push push-legacy container clean
|
||||
.PHONY: all push push-legacy container clean orphan
|
||||
|
||||
REGISTRY ?= gcr.io/google_containers
|
||||
IMAGE = $(REGISTRY)/pause-$(ARCH)
|
||||
|
@ -25,7 +25,7 @@ ARCH ?= amd64
|
|||
|
||||
ALL_ARCH = amd64 arm arm64 ppc64le s390x
|
||||
|
||||
CFLAGS = -Os -Wall -static
|
||||
CFLAGS = -Os -Wall -Werror -static
|
||||
KUBE_CROSS_IMAGE ?= gcr.io/google_containers/kube-cross
|
||||
KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION)
|
||||
|
||||
|
@ -97,5 +97,16 @@ ifeq ($(ARCH),amd64)
|
|||
endif
|
||||
touch $@
|
||||
|
||||
# Useful for testing, not automatically included in container image
|
||||
orphan: bin/orphan-$(ARCH)
|
||||
bin/orphan-$(ARCH): orphan.c
|
||||
mkdir -p bin
|
||||
docker run -u $$(id -u):$$(id -g) -v $$(pwd):/build \
|
||||
$(KUBE_CROSS_IMAGE):$(KUBE_CROSS_VERSION) \
|
||||
/bin/bash -c "\
|
||||
cd /build && \
|
||||
$(TRIPLE)-gcc $(CFLAGS) -o $@ $^ && \
|
||||
$(TRIPLE)-strip $@"
|
||||
|
||||
clean:
|
||||
rm -rf .container-* .push-* bin/
|
||||
|
|
|
@ -14,10 +14,23 @@ See the License for the specific language governing permissions and
|
|||
limitations under the License.
|
||||
*/
|
||||
|
||||
package types
|
||||
/* Creates a zombie to be reaped by init. Useful for testing. */
|
||||
|
||||
// int64 is used as a safe bet against wrap-around (uid's are general
|
||||
// int32) and to support uid_t -1, and -2.
|
||||
#include <stdio.h>
|
||||
#include <unistd.h>
|
||||
|
||||
type UnixUserID int64
|
||||
type UnixGroupID int64
|
||||
int main() {
|
||||
pid_t pid;
|
||||
pid = fork();
|
||||
if (pid == 0) {
|
||||
while (getppid() > 1)
|
||||
;
|
||||
printf("Child exiting: pid=%d ppid=%d\n", getpid(), getppid());
|
||||
return 0;
|
||||
} else if (pid > 0) {
|
||||
printf("Parent exiting: pid=%d ppid=%d\n", getpid(), getppid());
|
||||
return 0;
|
||||
}
|
||||
perror("Could not create child");
|
||||
return 1;
|
||||
}
|
36
vendor/k8s.io/kubernetes/build/pause/pause.c
generated
vendored
36
vendor/k8s.io/kubernetes/build/pause/pause.c
generated
vendored
|
@ -17,20 +17,36 @@ limitations under the License.
|
|||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/wait.h>
|
||||
#include <unistd.h>
|
||||
|
||||
static void sigdown(int signo) {
|
||||
psignal(signo, "shutting down, got signal");
|
||||
exit(0);
|
||||
psignal(signo, "Shutting down, got signal");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
static void sigreap(int signo) {
|
||||
while (waitpid(-1, NULL, WNOHANG) > 0)
|
||||
;
|
||||
}
|
||||
|
||||
int main() {
|
||||
if (signal(SIGINT, sigdown) == SIG_ERR)
|
||||
return 1;
|
||||
if (signal(SIGTERM, sigdown) == SIG_ERR)
|
||||
return 2;
|
||||
signal(SIGKILL, sigdown);
|
||||
for (;;) pause();
|
||||
fprintf(stderr, "error: infinite loop terminated\n");
|
||||
return 42;
|
||||
if (getpid() != 1)
|
||||
/* Not an error because pause sees use outside of infra containers. */
|
||||
fprintf(stderr, "Warning: pause should be the first process in a pod\n");
|
||||
|
||||
if (sigaction(SIGINT, &(struct sigaction){.sa_handler = sigdown}, NULL) < 0)
|
||||
return 1;
|
||||
if (sigaction(SIGTERM, &(struct sigaction){.sa_handler = sigdown}, NULL) < 0)
|
||||
return 2;
|
||||
if (sigaction(SIGCHLD, &(struct sigaction){.sa_handler = sigreap,
|
||||
.sa_flags = SA_NOCLDSTOP},
|
||||
NULL) < 0)
|
||||
return 3;
|
||||
|
||||
for (;;)
|
||||
pause();
|
||||
fprintf(stderr, "Error: infinite loop terminated\n");
|
||||
return 42;
|
||||
}
|
||||
|
|
261
vendor/k8s.io/kubernetes/build/release-tars/BUILD
generated
vendored
Normal file
261
vendor/k8s.io/kubernetes/build/release-tars/BUILD
generated
vendored
Normal file
|
@ -0,0 +1,261 @@
|
|||
package(default_visibility = ["//visibility:public"])
|
||||
|
||||
load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar")
|
||||
|
||||
filegroup(
|
||||
name = "package-srcs",
|
||||
srcs = glob(["**"]),
|
||||
tags = ["automanaged"],
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "all-srcs",
|
||||
srcs = [":package-srcs"],
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
config_setting(
|
||||
name = "embed_license_targets",
|
||||
values = {
|
||||
"define": "EMBED_LICENSE_TARGETS=true",
|
||||
},
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-src",
|
||||
extension = "tar.gz",
|
||||
files = [
|
||||
"//:all-srcs",
|
||||
],
|
||||
package_dir = "kubernetes",
|
||||
strip_prefix = "//",
|
||||
)
|
||||
|
||||
# FIXME: this should be configurable/auto-detected
|
||||
PLATFORM_ARCH_STRING = "linux-amd64"
|
||||
|
||||
# KUBE_CLIENT_TARGETS
|
||||
CLIENT_TARGETS = [
|
||||
"//cmd/kubectl",
|
||||
"//federation/cmd/kubefed",
|
||||
]
|
||||
|
||||
# KUBE_NODE_TARGETS
|
||||
NODE_TARGETS = [
|
||||
"//cmd/kube-proxy",
|
||||
"//cmd/kubelet",
|
||||
]
|
||||
|
||||
# KUBE_SERVER_TARGETS
|
||||
# No need to duplicate CLIENT_TARGETS or NODE_TARGETS here,
|
||||
# since we include them in the actual build rule.
|
||||
SERVER_TARGETS = [
|
||||
"//cmd/hyperkube",
|
||||
"//cmd/kube-aggregator",
|
||||
"//cmd/kube-apiserver",
|
||||
"//cmd/kube-controller-manager",
|
||||
"//cmd/kube-discovery",
|
||||
"//cmd/kubeadm",
|
||||
"//plugin/cmd/kube-scheduler",
|
||||
]
|
||||
|
||||
# kube::golang::test_targets
|
||||
TEST_BINARY_TARGETS = [
|
||||
"//cmd/gendocs",
|
||||
"//cmd/genkubedocs",
|
||||
"//cmd/genman",
|
||||
"//cmd/genswaggertypedocs",
|
||||
"//cmd/genyaml",
|
||||
"//cmd/linkcheck",
|
||||
"//cmd/mungedocs",
|
||||
"//examples/k8petstore/web-server/src",
|
||||
"//federation/cmd/genfeddocs",
|
||||
"//test/e2e:e2e.test",
|
||||
"//vendor:github.com/onsi/ginkgo/ginkgo_bin",
|
||||
"//cmd/kubemark", # TODO: server platforms only
|
||||
"//test/e2e_node:e2e_node.test", # TODO: server platforms only
|
||||
]
|
||||
|
||||
TEST_PORTABLE_TARGETS = [
|
||||
"//federation/develop:all-srcs",
|
||||
"//hack:e2e.go",
|
||||
"//hack:federated-ginkgo-e2e.sh",
|
||||
"//hack:get-build.sh",
|
||||
"//hack:ginkgo-e2e.sh",
|
||||
"//hack/e2e-internal:all-srcs",
|
||||
"//hack/lib:all-srcs",
|
||||
"//test/e2e/testing-manifests:all-srcs",
|
||||
"//test/kubemark:all-srcs",
|
||||
]
|
||||
|
||||
# Included in node and server tarballs.
|
||||
LICENSE_TARGETS = [
|
||||
"//:Godeps/LICENSES",
|
||||
":kubernetes-src.tar.gz",
|
||||
]
|
||||
|
||||
pkg_tar(
|
||||
name = "_client-bin",
|
||||
files = CLIENT_TARGETS,
|
||||
mode = "0755",
|
||||
package_dir = "client/bin",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-client-%s" % PLATFORM_ARCH_STRING,
|
||||
extension = "tar.gz",
|
||||
package_dir = "kubernetes",
|
||||
deps = [
|
||||
":_client-bin",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_node-bin",
|
||||
files = NODE_TARGETS + CLIENT_TARGETS,
|
||||
mode = "0755",
|
||||
package_dir = "node/bin",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-node-%s" % PLATFORM_ARCH_STRING,
|
||||
extension = "tar.gz",
|
||||
files = select({
|
||||
":embed_license_targets": LICENSE_TARGETS,
|
||||
"//conditions:default": [],
|
||||
}),
|
||||
mode = "0644",
|
||||
package_dir = "kubernetes",
|
||||
deps = [
|
||||
":_node-bin",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_server-bin",
|
||||
files = SERVER_TARGETS + NODE_TARGETS + CLIENT_TARGETS + [
|
||||
"//build:docker-artifacts",
|
||||
],
|
||||
mode = "0755",
|
||||
package_dir = "server/bin",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
genrule(
|
||||
name = "dummy",
|
||||
outs = [".dummy"],
|
||||
cmd = "touch $@",
|
||||
)
|
||||
|
||||
# Some of the startup scripts fail if there isn't an addons/ directory in the server tarball.
|
||||
pkg_tar(
|
||||
name = "_server-addons",
|
||||
files = [
|
||||
":.dummy",
|
||||
],
|
||||
package_dir = "addons",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-server-%s" % PLATFORM_ARCH_STRING,
|
||||
extension = "tar.gz",
|
||||
files = select({
|
||||
":embed_license_targets": LICENSE_TARGETS,
|
||||
"//conditions:default": [],
|
||||
}),
|
||||
mode = "0644",
|
||||
package_dir = "kubernetes",
|
||||
deps = [
|
||||
":_server-addons",
|
||||
":_server-bin",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_test-bin",
|
||||
files = TEST_BINARY_TARGETS,
|
||||
mode = "0755",
|
||||
package_dir = "platforms/" + PLATFORM_ARCH_STRING.replace("-", "/"),
|
||||
# TODO: how to make this multiplatform?
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-test",
|
||||
extension = "tar.gz",
|
||||
files = TEST_PORTABLE_TARGETS,
|
||||
package_dir = "kubernetes",
|
||||
strip_prefix = "//",
|
||||
deps = [
|
||||
# TODO: how to make this multiplatform?
|
||||
":_test-bin",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_full_server",
|
||||
files = [
|
||||
":kubernetes-manifests.tar.gz",
|
||||
":kubernetes-salt.tar.gz",
|
||||
],
|
||||
package_dir = "server",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes",
|
||||
extension = "tar.gz",
|
||||
files = [
|
||||
# TODO: the version file
|
||||
"//:README.md",
|
||||
"//:Vagrantfile",
|
||||
"//cluster:all-srcs",
|
||||
"//docs:all-srcs",
|
||||
"//examples:all-srcs",
|
||||
"//third_party/htpasswd:all-srcs",
|
||||
] + select({
|
||||
":embed_license_targets": ["//:Godeps/LICENSES"],
|
||||
"//conditions:default": [],
|
||||
}),
|
||||
package_dir = "kubernetes",
|
||||
strip_prefix = "//",
|
||||
deps = [
|
||||
":_full_server",
|
||||
"//federation:release",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-manifests",
|
||||
extension = "tar.gz",
|
||||
deps = [
|
||||
"//cluster:manifests",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-salt",
|
||||
extension = "tar.gz",
|
||||
deps = [
|
||||
"//cluster/saltbase:salt",
|
||||
],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "release-tars",
|
||||
srcs = [
|
||||
":kubernetes.tar.gz",
|
||||
":kubernetes-client-%s.tar.gz" % PLATFORM_ARCH_STRING,
|
||||
":kubernetes-node-%s.tar.gz" % PLATFORM_ARCH_STRING,
|
||||
":kubernetes-server-%s.tar.gz" % PLATFORM_ARCH_STRING,
|
||||
":kubernetes-manifests.tar.gz",
|
||||
":kubernetes-salt.tar.gz",
|
||||
":kubernetes-src.tar.gz",
|
||||
":kubernetes-test.tar.gz",
|
||||
],
|
||||
)
|
27
vendor/k8s.io/kubernetes/cluster/BUILD
generated
vendored
27
vendor/k8s.io/kubernetes/cluster/BUILD
generated
vendored
|
@ -1,5 +1,7 @@
|
|||
package(default_visibility = ["//visibility:public"])
|
||||
|
||||
load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar")
|
||||
|
||||
licenses(["notice"])
|
||||
|
||||
filegroup(
|
||||
|
@ -14,6 +16,31 @@ filegroup(
|
|||
srcs = [
|
||||
":package-srcs",
|
||||
"//cluster/addons:all-srcs",
|
||||
"//cluster/gce:all-srcs",
|
||||
"//cluster/saltbase:all-srcs",
|
||||
],
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
# All of the manifests that are expected to be in a "gci-trusty"
|
||||
# subdir of the manifests tarball.
|
||||
pkg_tar(
|
||||
name = "_manifests-gci-trusty",
|
||||
package_dir = "gci-trusty",
|
||||
visibility = ["//visibility:private"],
|
||||
deps = [
|
||||
"//cluster/addons",
|
||||
"//cluster/gce:gci-trusty-manifests",
|
||||
"//cluster/saltbase:gci-trusty-salt-manifests",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "manifests",
|
||||
mode = "0644",
|
||||
package_dir = "kubernetes",
|
||||
deps = [
|
||||
":_manifests-gci-trusty",
|
||||
"//cluster/saltbase:salt-manifests",
|
||||
],
|
||||
)
|
||||
|
|
8
vendor/k8s.io/kubernetes/cluster/OWNERS
generated
vendored
8
vendor/k8s.io/kubernetes/cluster/OWNERS
generated
vendored
|
@ -1,4 +1,10 @@
|
|||
assignees:
|
||||
reviewers:
|
||||
- eparis
|
||||
- jbeda
|
||||
- mikedanese
|
||||
- roberthbailey
|
||||
- zmerlynn
|
||||
approvers:
|
||||
- eparis
|
||||
- jbeda
|
||||
- mikedanese
|
||||
|
|
24
vendor/k8s.io/kubernetes/cluster/addons/BUILD
generated
vendored
24
vendor/k8s.io/kubernetes/cluster/addons/BUILD
generated
vendored
|
@ -4,21 +4,14 @@ load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar")
|
|||
|
||||
filegroup(
|
||||
name = "addon-srcs",
|
||||
srcs = glob([
|
||||
"calico-policy-controller/*",
|
||||
"cluster-loadbalancing/*",
|
||||
"cluster-monitoring/*",
|
||||
"dashboard/*",
|
||||
"dns/*",
|
||||
"etcd-empty-dir-cleanup/*",
|
||||
"fluentd-elasticsearch/*",
|
||||
"fluentd-gcp/*",
|
||||
"gci/*",
|
||||
"node-problem-detector/*",
|
||||
"podsecuritypolicies/*",
|
||||
"python-image/*",
|
||||
"registry/*",
|
||||
]),
|
||||
srcs = glob(
|
||||
[
|
||||
"**/*.json",
|
||||
"**/*.yaml",
|
||||
"**/*.yaml.in",
|
||||
],
|
||||
exclude = ["**/*demo*/**"],
|
||||
),
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
|
@ -27,6 +20,7 @@ pkg_tar(
|
|||
files = [
|
||||
":addon-srcs",
|
||||
],
|
||||
mode = "0644",
|
||||
strip_prefix = ".",
|
||||
)
|
||||
|
||||
|
|
9
vendor/k8s.io/kubernetes/cluster/addons/cluster-monitoring/OWNERS
generated
vendored
9
vendor/k8s.io/kubernetes/cluster/addons/cluster-monitoring/OWNERS
generated
vendored
|
@ -1,3 +1,6 @@
|
|||
assignees:
|
||||
- DirectXMan12
|
||||
- piosz
|
||||
approvers:
|
||||
- DirectXMan12
|
||||
- piosz
|
||||
reviewers:
|
||||
- DirectXMan12
|
||||
- piosz
|
||||
|
|
5
vendor/k8s.io/kubernetes/cluster/addons/dns-horizontal-autoscaler/OWNERS
generated
vendored
5
vendor/k8s.io/kubernetes/cluster/addons/dns-horizontal-autoscaler/OWNERS
generated
vendored
|
@ -1,3 +1,6 @@
|
|||
assignees:
|
||||
approvers:
|
||||
- bowei
|
||||
- mrhohn
|
||||
reviewers:
|
||||
- bowei
|
||||
- mrhohn
|
||||
|
|
5
vendor/k8s.io/kubernetes/cluster/addons/dns/OWNERS
generated
vendored
5
vendor/k8s.io/kubernetes/cluster/addons/dns/OWNERS
generated
vendored
|
@ -1,3 +1,6 @@
|
|||
assignees:
|
||||
approvers:
|
||||
- bowei
|
||||
- mrhohn
|
||||
reviewers:
|
||||
- bowei
|
||||
- mrhohn
|
||||
|
|
6
vendor/k8s.io/kubernetes/cluster/addons/dns/kubedns-controller.yaml.base
generated
vendored
6
vendor/k8s.io/kubernetes/cluster/addons/dns/kubedns-controller.yaml.base
generated
vendored
|
@ -47,7 +47,7 @@ spec:
|
|||
spec:
|
||||
containers:
|
||||
- name: kubedns
|
||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.11.0
|
||||
resources:
|
||||
# TODO: Set memory limits when we've profiled the container for large
|
||||
# clusters, then set request = limit to keep this container in
|
||||
|
@ -96,7 +96,7 @@ spec:
|
|||
name: metrics
|
||||
protocol: TCP
|
||||
- name: dnsmasq
|
||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.11.0
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /healthcheck/dnsmasq
|
||||
|
@ -124,7 +124,7 @@ spec:
|
|||
cpu: 150m
|
||||
memory: 10Mi
|
||||
- name: sidecar
|
||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.11.0
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /metrics
|
||||
|
|
6
vendor/k8s.io/kubernetes/cluster/addons/dns/kubedns-controller.yaml.in
generated
vendored
6
vendor/k8s.io/kubernetes/cluster/addons/dns/kubedns-controller.yaml.in
generated
vendored
|
@ -47,7 +47,7 @@ spec:
|
|||
spec:
|
||||
containers:
|
||||
- name: kubedns
|
||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.11.0
|
||||
resources:
|
||||
# TODO: Set memory limits when we've profiled the container for large
|
||||
# clusters, then set request = limit to keep this container in
|
||||
|
@ -96,7 +96,7 @@ spec:
|
|||
name: metrics
|
||||
protocol: TCP
|
||||
- name: dnsmasq
|
||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.11.0
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /healthcheck/dnsmasq
|
||||
|
@ -124,7 +124,7 @@ spec:
|
|||
cpu: 150m
|
||||
memory: 10Mi
|
||||
- name: sidecar
|
||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.11.0
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /metrics
|
||||
|
|
6
vendor/k8s.io/kubernetes/cluster/addons/dns/kubedns-controller.yaml.sed
generated
vendored
6
vendor/k8s.io/kubernetes/cluster/addons/dns/kubedns-controller.yaml.sed
generated
vendored
|
@ -47,7 +47,7 @@ spec:
|
|||
spec:
|
||||
containers:
|
||||
- name: kubedns
|
||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.11.0
|
||||
resources:
|
||||
# TODO: Set memory limits when we've profiled the container for large
|
||||
# clusters, then set request = limit to keep this container in
|
||||
|
@ -95,7 +95,7 @@ spec:
|
|||
name: metrics
|
||||
protocol: TCP
|
||||
- name: dnsmasq
|
||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.11.0
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /healthcheck/dnsmasq
|
||||
|
@ -123,7 +123,7 @@ spec:
|
|||
cpu: 150m
|
||||
memory: 10Mi
|
||||
- name: sidecar
|
||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.10.1
|
||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.11.0
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /metrics
|
||||
|
|
19
vendor/k8s.io/kubernetes/cluster/addons/e2e-rbac-bindings/e2e-user-binding.yaml
generated
vendored
19
vendor/k8s.io/kubernetes/cluster/addons/e2e-rbac-bindings/e2e-user-binding.yaml
generated
vendored
|
@ -1,19 +0,0 @@
|
|||
# This is the main user for the e2e tests. This is ok to leave long term
|
||||
# since the first user in the test can reasonably be high power
|
||||
# its kubecfg in gce
|
||||
# TODO consider provisioning each test its namespace and giving it an
|
||||
# admin user. This still has to exist, but e2e wouldn't normally use it
|
||||
apiVersion: rbac.authorization.k8s.io/v1alpha1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: e2e-user-cluster-admin
|
||||
labels:
|
||||
kubernetes.io/cluster-service: "true"
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: cluster-admin
|
||||
subjects:
|
||||
- apiVersion: rbac/v1alpha1
|
||||
kind: User
|
||||
name: kubecfg
|
9
vendor/k8s.io/kubernetes/cluster/addons/fluentd-elasticsearch/OWNERS
generated
vendored
9
vendor/k8s.io/kubernetes/cluster/addons/fluentd-elasticsearch/OWNERS
generated
vendored
|
@ -1,3 +1,6 @@
|
|||
assignees:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
approvers:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
reviewers:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
|
|
2
vendor/k8s.io/kubernetes/cluster/addons/fluentd-elasticsearch/es-controller.yaml
generated
vendored
2
vendor/k8s.io/kubernetes/cluster/addons/fluentd-elasticsearch/es-controller.yaml
generated
vendored
|
@ -20,7 +20,7 @@ spec:
|
|||
kubernetes.io/cluster-service: "true"
|
||||
spec:
|
||||
containers:
|
||||
- image: gcr.io/google_containers/elasticsearch:v2.4.1
|
||||
- image: gcr.io/google_containers/elasticsearch:v2.4.1-1
|
||||
name: elasticsearch-logging
|
||||
resources:
|
||||
# need more cpu upon initialization, therefore burstable class
|
||||
|
|
2
vendor/k8s.io/kubernetes/cluster/addons/fluentd-elasticsearch/es-image/Makefile
generated
vendored
2
vendor/k8s.io/kubernetes/cluster/addons/fluentd-elasticsearch/es-image/Makefile
generated
vendored
|
@ -16,7 +16,7 @@
|
|||
|
||||
# The current value of the tag to be used for building and
|
||||
# pushing an image to gcr.io
|
||||
TAG = v2.4.1
|
||||
TAG = v2.4.1-1
|
||||
|
||||
build: elasticsearch_logging_discovery
|
||||
docker build --pull -t gcr.io/google_containers/elasticsearch:$(TAG) .
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
cluster.name: kubernetes-logging
|
||||
|
||||
node.name: ${NODE_NAME}
|
||||
node.master: ${NODE_MASTER}
|
||||
node.data: ${NODE_DATA}
|
||||
|
||||
|
|
|
@ -24,9 +24,10 @@ import (
|
|||
"time"
|
||||
|
||||
"github.com/golang/glog"
|
||||
meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
restclient "k8s.io/client-go/rest"
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
|
||||
"k8s.io/kubernetes/pkg/client/restclient"
|
||||
)
|
||||
|
||||
func flattenSubsets(subsets []api.EndpointSubset) []string {
|
||||
|
@ -52,10 +53,10 @@ func main() {
|
|||
if err != nil {
|
||||
glog.Fatalf("Failed to make client: %v", err)
|
||||
}
|
||||
namespace := api.NamespaceSystem
|
||||
namespace := metav1.NamespaceSystem
|
||||
envNamespace := os.Getenv("NAMESPACE")
|
||||
if envNamespace != "" {
|
||||
if _, err := client.Core().Namespaces().Get(envNamespace); err != nil {
|
||||
if _, err := client.Core().Namespaces().Get(envNamespace, meta_v1.GetOptions{}); err != nil {
|
||||
glog.Fatalf("%s namespace doesn't exist: %v", envNamespace, err)
|
||||
}
|
||||
namespace = envNamespace
|
||||
|
@ -65,7 +66,7 @@ func main() {
|
|||
// Look for endpoints associated with the Elasticsearch loggging service.
|
||||
// First wait for the service to become available.
|
||||
for t := time.Now(); time.Since(t) < 5*time.Minute; time.Sleep(10 * time.Second) {
|
||||
elasticsearch, err = client.Core().Services(namespace).Get("elasticsearch-logging")
|
||||
elasticsearch, err = client.Core().Services(namespace).Get("elasticsearch-logging", meta_v1.GetOptions{})
|
||||
if err == nil {
|
||||
break
|
||||
}
|
||||
|
@ -82,7 +83,7 @@ func main() {
|
|||
// Wait for some endpoints.
|
||||
count := 0
|
||||
for t := time.Now(); time.Since(t) < 5*time.Minute; time.Sleep(10 * time.Second) {
|
||||
endpoints, err = client.Core().Endpoints(namespace).Get("elasticsearch-logging")
|
||||
endpoints, err = client.Core().Endpoints(namespace).Get("elasticsearch-logging", meta_v1.GetOptions{})
|
||||
if err != nil {
|
||||
continue
|
||||
}
|
||||
|
|
1
vendor/k8s.io/kubernetes/cluster/addons/fluentd-elasticsearch/es-image/run.sh
generated
vendored
1
vendor/k8s.io/kubernetes/cluster/addons/fluentd-elasticsearch/es-image/run.sh
generated
vendored
|
@ -14,6 +14,7 @@
|
|||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
export NODE_NAME=${NODE_NAME:-${HOSTNAME}}
|
||||
export NODE_MASTER=${NODE_MASTER:-true}
|
||||
export NODE_DATA=${NODE_DATA:-true}
|
||||
export HTTP_PORT=${HTTP_PORT:-9200}
|
||||
|
|
9
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/OWNERS
generated
vendored
9
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/OWNERS
generated
vendored
|
@ -1,3 +1,6 @@
|
|||
assignees:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
approvers:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
reviewers:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
|
|
13
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml
generated
vendored
13
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-ds.yaml
generated
vendored
|
@ -2,23 +2,23 @@
|
|||
apiVersion: extensions/v1beta1
|
||||
kind: DaemonSet
|
||||
metadata:
|
||||
name: fluentd-gcp-v1.31
|
||||
name: fluentd-gcp-v1.34
|
||||
namespace: kube-system
|
||||
labels:
|
||||
k8s-app: fluentd-gcp
|
||||
kubernetes.io/cluster-service: "true"
|
||||
version: v1.31
|
||||
version: v1.34
|
||||
spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
k8s-app: fluentd-gcp
|
||||
kubernetes.io/cluster-service: "true"
|
||||
version: v1.31
|
||||
version: v1.34
|
||||
spec:
|
||||
containers:
|
||||
- name: fluentd-gcp
|
||||
image: gcr.io/google_containers/fluentd-gcp:1.32
|
||||
image: gcr.io/google_containers/fluentd-gcp:1.34
|
||||
# If fluentd consumes its own logs, the following situation may happen:
|
||||
# fluentd fails to send a chunk to the server => writes it to the log =>
|
||||
# tries to send this message to the server => fails to send a chunk and so on.
|
||||
|
@ -40,8 +40,6 @@ spec:
|
|||
- name: varlibdockercontainers
|
||||
mountPath: /var/lib/docker/containers
|
||||
readOnly: true
|
||||
- name: libsystemddir
|
||||
mountPath: /host/lib
|
||||
# Liveness probe is aimed to help in situarions where fluentd
|
||||
# silently hangs for no apparent reasons until manual restart.
|
||||
# The idea of this probe is that if fluentd is not queueing or
|
||||
|
@ -84,6 +82,3 @@ spec:
|
|||
- name: varlibdockercontainers
|
||||
hostPath:
|
||||
path: /var/lib/docker/containers
|
||||
- name: libsystemddir
|
||||
hostPath:
|
||||
path: /usr/lib64
|
||||
|
|
1
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-image/Dockerfile
generated
vendored
1
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-image/Dockerfile
generated
vendored
|
@ -36,6 +36,7 @@ RUN apt-get -qq update && \
|
|||
td-agent-gem install --no-document fluent-plugin-record-reformer -v 0.8.2 && \
|
||||
td-agent-gem install --no-document fluent-plugin-systemd -v 0.0.5 && \
|
||||
td-agent-gem install --no-document fluent-plugin-google-cloud -v 0.5.2 && \
|
||||
td-agent-gem install --no-document fluent-plugin-detect-exceptions -v 0.0.4 && \
|
||||
# Remove build tools
|
||||
apt-get remove -y -qq gcc make && \
|
||||
apt-get autoremove -y -qq && \
|
||||
|
|
2
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-image/Makefile
generated
vendored
2
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-image/Makefile
generated
vendored
|
@ -26,7 +26,7 @@
|
|||
.PHONY: build push
|
||||
|
||||
PREFIX=gcr.io/google_containers
|
||||
TAG = 1.32
|
||||
TAG = 1.34
|
||||
|
||||
build:
|
||||
docker build --pull -t $(PREFIX)/fluentd-gcp:$(TAG) .
|
||||
|
|
13
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-image/fluent.conf
generated
vendored
13
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-image/fluent.conf
generated
vendored
|
@ -70,7 +70,18 @@
|
|||
<match reform.**>
|
||||
type record_reformer
|
||||
enable_ruby true
|
||||
tag kubernetes.${tag_suffix[4].split('-')[0..-2].join('-')}
|
||||
tag raw.kubernetes.${tag_suffix[4].split('-')[0..-2].join('-')}
|
||||
</match>
|
||||
|
||||
# Detect exceptions in the log output and forward them as one log entry.
|
||||
<match raw.kubernetes.**>
|
||||
type detect_exceptions
|
||||
remove_tag_prefix raw
|
||||
message log
|
||||
stream stream
|
||||
multiline_flush_interval 5
|
||||
max_bytes 500000
|
||||
max_lines 1000
|
||||
</match>
|
||||
|
||||
# Example:
|
||||
|
|
6
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-image/run.sh
generated
vendored
6
vendor/k8s.io/kubernetes/cluster/addons/fluentd-gcp/fluentd-gcp-image/run.sh
generated
vendored
|
@ -17,12 +17,6 @@
|
|||
# For systems without journald
|
||||
mkdir -p /var/log/journal
|
||||
|
||||
if [ -e /host/lib/libsystemd* ]
|
||||
then
|
||||
rm /lib/x86_64-linux-gnu/libsystemd*
|
||||
cp /host/lib/libsystemd* /lib/x86_64-linux-gnu/
|
||||
fi
|
||||
|
||||
LD_PRELOAD=/opt/td-agent/embedded/lib/libjemalloc.so
|
||||
RUBY_GC_HEAP_OLDOBJECT_LIMIT_FACTOR=0.9
|
||||
|
||||
|
|
2
vendor/k8s.io/kubernetes/cluster/aws/config-default.sh
generated
vendored
2
vendor/k8s.io/kubernetes/cluster/aws/config-default.sh
generated
vendored
|
@ -151,7 +151,7 @@ NODE_OS_DISTRIBUTION="${KUBE_OS_DISTRIBUTION}"
|
|||
KUBE_NODE_IMAGE="${KUBE_NODE_IMAGE:-}"
|
||||
COREOS_CHANNEL="${COREOS_CHANNEL:-alpha}"
|
||||
CONTAINER_RUNTIME="${KUBE_CONTAINER_RUNTIME:-docker}"
|
||||
RKT_VERSION="${KUBE_RKT_VERSION:-1.14.0}"
|
||||
RKT_VERSION="${KUBE_RKT_VERSION:-1.23.0}"
|
||||
|
||||
NETWORK_PROVIDER="${NETWORK_PROVIDER:-kubenet}" # kubenet, opencontrail, flannel
|
||||
|
||||
|
|
2
vendor/k8s.io/kubernetes/cluster/aws/config-test.sh
generated
vendored
2
vendor/k8s.io/kubernetes/cluster/aws/config-test.sh
generated
vendored
|
@ -137,7 +137,7 @@ NODE_OS_DISTRIBUTION="${KUBE_OS_DISTRIBUTION}"
|
|||
KUBE_NODE_IMAGE="${KUBE_NODE_IMAGE:-}"
|
||||
COREOS_CHANNEL="${COREOS_CHANNEL:-alpha}"
|
||||
CONTAINER_RUNTIME="${KUBE_CONTAINER_RUNTIME:-docker}"
|
||||
RKT_VERSION="${KUBE_RKT_VERSION:-1.14.0}"
|
||||
RKT_VERSION="${KUBE_RKT_VERSION:-1.23.0}"
|
||||
|
||||
NETWORK_PROVIDER="${NETWORK_PROVIDER:-kubenet}" # kubenet, opencontrail, flannel
|
||||
|
||||
|
|
12
vendor/k8s.io/kubernetes/cluster/aws/util.sh
generated
vendored
12
vendor/k8s.io/kubernetes/cluster/aws/util.sh
generated
vendored
|
@ -570,18 +570,6 @@ function verify-prereqs {
|
|||
fi
|
||||
}
|
||||
|
||||
|
||||
# Create a temp dir that'll be deleted at the end of this bash session.
|
||||
#
|
||||
# Vars set:
|
||||
# KUBE_TEMP
|
||||
function ensure-temp-dir {
|
||||
if [[ -z ${KUBE_TEMP-} ]]; then
|
||||
KUBE_TEMP=$(mktemp -d -t kubernetes.XXXXXX)
|
||||
trap 'rm -rf "${KUBE_TEMP}"' EXIT
|
||||
fi
|
||||
}
|
||||
|
||||
# Take the local tar files and upload them to S3. They will then be
|
||||
# downloaded by the master as part of the start up script for the master.
|
||||
#
|
||||
|
|
11
vendor/k8s.io/kubernetes/cluster/azure-legacy/util.sh
generated
vendored
11
vendor/k8s.io/kubernetes/cluster/azure-legacy/util.sh
generated
vendored
|
@ -100,17 +100,6 @@ function verify-prereqs {
|
|||
echo "==> CONTAINER: $CONTAINER"
|
||||
}
|
||||
|
||||
# Create a temp dir that'll be deleted at the end of this bash session.
|
||||
#
|
||||
# Vars set:
|
||||
# KUBE_TEMP
|
||||
function ensure-temp-dir {
|
||||
if [[ -z ${KUBE_TEMP-} ]]; then
|
||||
KUBE_TEMP=$(mktemp -d -t kubernetes.XXXXXX)
|
||||
trap 'rm -rf "${KUBE_TEMP}"' EXIT
|
||||
fi
|
||||
}
|
||||
|
||||
# Take the local tar files and upload them to Azure Storage. They will then be
|
||||
# downloaded by the master as part of the start up script for the master.
|
||||
#
|
||||
|
|
76
vendor/k8s.io/kubernetes/cluster/common.sh
generated
vendored
76
vendor/k8s.io/kubernetes/cluster/common.sh
generated
vendored
|
@ -308,6 +308,17 @@ function load-or-gen-kube-bearertoken() {
|
|||
fi
|
||||
}
|
||||
|
||||
# Create a temp dir that'll be deleted at the end of this bash session.
|
||||
#
|
||||
# Vars set:
|
||||
# KUBE_TEMP
|
||||
function ensure-temp-dir {
|
||||
if [[ -z ${KUBE_TEMP-} ]]; then
|
||||
KUBE_TEMP=$(mktemp -d -t kubernetes.XXXXXX)
|
||||
trap 'rm -rf "${KUBE_TEMP}"' EXIT
|
||||
fi
|
||||
}
|
||||
|
||||
# Get the master IP for the current-context in kubeconfig if one exists.
|
||||
#
|
||||
# Assumed vars:
|
||||
|
@ -412,6 +423,30 @@ function tars_from_version() {
|
|||
fi
|
||||
}
|
||||
|
||||
# Search for the specified tarball in the various known output locations,
|
||||
# echoing the location if found.
|
||||
#
|
||||
# Assumed vars:
|
||||
# KUBE_ROOT
|
||||
#
|
||||
# Args:
|
||||
# $1 name of tarball to search for
|
||||
function find-tar() {
|
||||
local -r tarball=$1
|
||||
locations=(
|
||||
"${KUBE_ROOT}/server/${tarball}"
|
||||
"${KUBE_ROOT}/_output/release-tars/${tarball}"
|
||||
"${KUBE_ROOT}/bazel-bin/build/release-tars/${tarball}"
|
||||
)
|
||||
location=$( (ls -t "${locations[@]}" 2>/dev/null || true) | head -1 )
|
||||
|
||||
if [[ ! -f "${location}" ]]; then
|
||||
echo "!!! Cannot find ${tarball}" >&2
|
||||
exit 1
|
||||
fi
|
||||
echo "${location}"
|
||||
}
|
||||
|
||||
# Verify and find the various tar files that we are going to use on the server.
|
||||
#
|
||||
# Assumed vars:
|
||||
|
@ -421,36 +456,14 @@ function tars_from_version() {
|
|||
# SALT_TAR
|
||||
# KUBE_MANIFESTS_TAR
|
||||
function find-release-tars() {
|
||||
SERVER_BINARY_TAR="${KUBE_ROOT}/server/kubernetes-server-linux-amd64.tar.gz"
|
||||
if [[ ! -f "${SERVER_BINARY_TAR}" ]]; then
|
||||
SERVER_BINARY_TAR="${KUBE_ROOT}/_output/release-tars/kubernetes-server-linux-amd64.tar.gz"
|
||||
fi
|
||||
if [[ ! -f "${SERVER_BINARY_TAR}" ]]; then
|
||||
echo "!!! Cannot find kubernetes-server-linux-amd64.tar.gz" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
SALT_TAR="${KUBE_ROOT}/server/kubernetes-salt.tar.gz"
|
||||
if [[ ! -f "${SALT_TAR}" ]]; then
|
||||
SALT_TAR="${KUBE_ROOT}/_output/release-tars/kubernetes-salt.tar.gz"
|
||||
fi
|
||||
if [[ ! -f "${SALT_TAR}" ]]; then
|
||||
echo "!!! Cannot find kubernetes-salt.tar.gz" >&2
|
||||
exit 1
|
||||
fi
|
||||
SERVER_BINARY_TAR=$(find-tar kubernetes-server-linux-amd64.tar.gz)
|
||||
SALT_TAR=$(find-tar kubernetes-salt.tar.gz)
|
||||
|
||||
# This tarball is used by GCI, Ubuntu Trusty, and Container Linux.
|
||||
KUBE_MANIFESTS_TAR=
|
||||
if [[ "${MASTER_OS_DISTRIBUTION:-}" == "trusty" || "${MASTER_OS_DISTRIBUTION:-}" == "gci" || "${MASTER_OS_DISTRIBUTION:-}" == "container-linux" ]] || \
|
||||
[[ "${NODE_OS_DISTRIBUTION:-}" == "trusty" || "${NODE_OS_DISTRIBUTION:-}" == "gci" || "${NODE_OS_DISTRIBUTION:-}" == "container-linux" ]] ; then
|
||||
KUBE_MANIFESTS_TAR="${KUBE_ROOT}/server/kubernetes-manifests.tar.gz"
|
||||
if [[ ! -f "${KUBE_MANIFESTS_TAR}" ]]; then
|
||||
KUBE_MANIFESTS_TAR="${KUBE_ROOT}/_output/release-tars/kubernetes-manifests.tar.gz"
|
||||
fi
|
||||
if [[ ! -f "${KUBE_MANIFESTS_TAR}" ]]; then
|
||||
echo "!!! Cannot find kubernetes-manifests.tar.gz" >&2
|
||||
exit 1
|
||||
fi
|
||||
KUBE_MANIFESTS_TAR=$(find-tar kubernetes-manifests.tar.gz)
|
||||
fi
|
||||
}
|
||||
|
||||
|
@ -573,6 +586,7 @@ function build-kube-master-certs {
|
|||
KUBEAPISERVER_CERT: $(yaml-quote ${KUBEAPISERVER_CERT_BASE64:-})
|
||||
KUBEAPISERVER_KEY: $(yaml-quote ${KUBEAPISERVER_KEY_BASE64:-})
|
||||
KUBELET_AUTH_CA_CERT: $(yaml-quote ${KUBELET_AUTH_CA_CERT_BASE64:-})
|
||||
CA_KEY: $(yaml-quote ${CA_KEY_BASE64:-})
|
||||
EOF
|
||||
}
|
||||
|
||||
|
@ -719,7 +733,7 @@ ENABLE_MANIFEST_URL: $(yaml-quote ${ENABLE_MANIFEST_URL:-false})
|
|||
MANIFEST_URL: $(yaml-quote ${MANIFEST_URL:-})
|
||||
MANIFEST_URL_HEADER: $(yaml-quote ${MANIFEST_URL_HEADER:-})
|
||||
NUM_NODES: $(yaml-quote ${NUM_NODES})
|
||||
STORAGE_BACKEND: $(yaml-quote ${STORAGE_BACKEND:-etcd2})
|
||||
STORAGE_BACKEND: $(yaml-quote ${STORAGE_BACKEND:-etcd3})
|
||||
ENABLE_GARBAGE_COLLECTOR: $(yaml-quote ${ENABLE_GARBAGE_COLLECTOR:-})
|
||||
MASTER_ADVERTISE_ADDRESS: $(yaml-quote ${MASTER_ADVERTISE_ADDRESS:-})
|
||||
ETCD_CA_KEY: $(yaml-quote ${ETCD_CA_KEY_BASE64:-})
|
||||
|
@ -948,6 +962,7 @@ function create-certs {
|
|||
CERT_DIR="${KUBE_TEMP}/easy-rsa-master/easyrsa3"
|
||||
# By default, linux wraps base64 output every 76 cols, so we use 'tr -d' to remove whitespaces.
|
||||
# Note 'base64 -w0' doesn't work on Mac OS X, which has different flags.
|
||||
CA_KEY_BASE64=$(cat "${CERT_DIR}/pki/private/ca.key" | base64 | tr -d '\r\n')
|
||||
CA_CERT_BASE64=$(cat "${CERT_DIR}/pki/ca.crt" | base64 | tr -d '\r\n')
|
||||
MASTER_CERT_BASE64=$(cat "${CERT_DIR}/pki/issued/${MASTER_NAME}.crt" | base64 | tr -d '\r\n')
|
||||
MASTER_KEY_BASE64=$(cat "${CERT_DIR}/pki/private/${MASTER_NAME}.key" | base64 | tr -d '\r\n')
|
||||
|
@ -995,7 +1010,12 @@ function generate-certs {
|
|||
mv "kubelet.pem" "pki/issued/kubelet.crt"
|
||||
rm -f "kubelet.csr"
|
||||
|
||||
./easyrsa build-client-full kubecfg nopass
|
||||
# Make a superuser client cert with subject "O=system:masters, CN=kubecfg"
|
||||
./easyrsa --dn-mode=org \
|
||||
--req-cn=kubecfg --req-org=system:masters \
|
||||
--req-c= --req-st= --req-city= --req-email= --req-ou= \
|
||||
build-client-full kubecfg nopass
|
||||
|
||||
cd ../kubelet
|
||||
./easyrsa init-pki
|
||||
./easyrsa --batch "--req-cn=kubelet@$(date +%s)" build-ca nopass
|
||||
|
@ -1049,7 +1069,7 @@ function update-or-verify-gcloud() {
|
|||
${sudo_prefix} gcloud ${gcloud_prompt:-} components install beta
|
||||
${sudo_prefix} gcloud ${gcloud_prompt:-} components update
|
||||
else
|
||||
local version=$(${sudo_prefix} gcloud version --format=json)
|
||||
local version=$(gcloud version --format=json)
|
||||
python -c'
|
||||
import json,sys
|
||||
from distutils import version
|
||||
|
|
37
vendor/k8s.io/kubernetes/cluster/gce/BUILD
generated
vendored
Normal file
37
vendor/k8s.io/kubernetes/cluster/gce/BUILD
generated
vendored
Normal file
|
@ -0,0 +1,37 @@
|
|||
package(default_visibility = ["//visibility:public"])
|
||||
|
||||
load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar")
|
||||
|
||||
pkg_tar(
|
||||
name = "gci-trusty-manifests",
|
||||
files = [
|
||||
"container-linux/configure-helper.sh",
|
||||
"gci/configure-helper.sh",
|
||||
"gci/health-monitor.sh",
|
||||
"gci/mounter/mounter",
|
||||
"trusty/configure-helper.sh",
|
||||
],
|
||||
mode = "0755",
|
||||
strip_prefix = ".",
|
||||
# pkg_tar doesn't support renaming the files we add, so instead create symlinks.
|
||||
symlinks = {
|
||||
"container-linux-configure-helper.sh": "container-linux/configure-helper.sh",
|
||||
"gci-configure-helper.sh": "gci/configure-helper.sh",
|
||||
"health-monitor.sh": "gci/health-monitor.sh",
|
||||
"gci-mounter": "gci/mounter/mounter",
|
||||
"trusty-configure-helper.sh": "trusty/configure-helper.sh",
|
||||
},
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "package-srcs",
|
||||
srcs = glob(["**"]),
|
||||
tags = ["automanaged"],
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "all-srcs",
|
||||
srcs = [":package-srcs"],
|
||||
tags = ["automanaged"],
|
||||
)
|
12
vendor/k8s.io/kubernetes/cluster/gce/config-default.sh
generated
vendored
12
vendor/k8s.io/kubernetes/cluster/gce/config-default.sh
generated
vendored
|
@ -46,18 +46,26 @@ if [[ "${NODE_OS_DISTRIBUTION}" == "coreos" ]]; then
|
|||
NODE_OS_DISTRIBUTION="container-linux"
|
||||
fi
|
||||
|
||||
if [[ "${MASTER_OS_DISTRIBUTION}" == "cos" ]]; then
|
||||
MASTER_OS_DISTRIBUTION="gci"
|
||||
fi
|
||||
|
||||
if [[ "${NODE_OS_DISTRIBUTION}" == "cos" ]]; then
|
||||
NODE_OS_DISTRIBUTION="gci"
|
||||
fi
|
||||
|
||||
# By default a cluster will be started with the master on GCI and nodes on
|
||||
# containervm. If you are updating the containervm version, update this
|
||||
# variable. Also please update corresponding image for node e2e at:
|
||||
# https://github.com/kubernetes/kubernetes/blob/master/test/e2e_node/jenkins/image-config.yaml
|
||||
CVM_VERSION=container-vm-v20161208
|
||||
CVM_VERSION=${CVM_VERSION:-container-vm-v20170117}
|
||||
GCI_VERSION=${KUBE_GCI_VERSION:-gci-dev-56-8977-0-0}
|
||||
MASTER_IMAGE=${KUBE_GCE_MASTER_IMAGE:-}
|
||||
MASTER_IMAGE_PROJECT=${KUBE_GCE_MASTER_PROJECT:-google-containers}
|
||||
NODE_IMAGE=${KUBE_GCE_NODE_IMAGE:-${CVM_VERSION}}
|
||||
NODE_IMAGE_PROJECT=${KUBE_GCE_NODE_PROJECT:-google-containers}
|
||||
CONTAINER_RUNTIME=${KUBE_CONTAINER_RUNTIME:-docker}
|
||||
RKT_VERSION=${KUBE_RKT_VERSION:-1.14.0}
|
||||
RKT_VERSION=${KUBE_RKT_VERSION:-1.23.0}
|
||||
RKT_STAGE1_IMAGE=${KUBE_RKT_STAGE1_IMAGE:-coreos.com/rkt/stage1-coreos}
|
||||
|
||||
NETWORK=${KUBE_GCE_NETWORK:-default}
|
||||
|
|
12
vendor/k8s.io/kubernetes/cluster/gce/config-test.sh
generated
vendored
12
vendor/k8s.io/kubernetes/cluster/gce/config-test.sh
generated
vendored
|
@ -47,11 +47,19 @@ if [[ "${NODE_OS_DISTRIBUTION}" == "coreos" ]]; then
|
|||
NODE_OS_DISTRIBUTION="container-linux"
|
||||
fi
|
||||
|
||||
if [[ "${MASTER_OS_DISTRIBUTION}" == "cos" ]]; then
|
||||
MASTER_OS_DISTRIBUTION="gci"
|
||||
fi
|
||||
|
||||
if [[ "${NODE_OS_DISTRIBUTION}" == "cos" ]]; then
|
||||
NODE_OS_DISTRIBUTION="gci"
|
||||
fi
|
||||
|
||||
# By default a cluster will be started with the master on GCI and nodes on
|
||||
# containervm. If you are updating the containervm version, update this
|
||||
# variable. Also please update corresponding image for node e2e at:
|
||||
# https://github.com/kubernetes/kubernetes/blob/master/test/e2e_node/jenkins/image-config.yaml
|
||||
CVM_VERSION=container-vm-v20161208
|
||||
CVM_VERSION=${CVM_VERSION:-container-vm-v20170117}
|
||||
GCI_VERSION=${KUBE_GCI_VERSION:-gci-dev-56-8977-0-0}
|
||||
MASTER_IMAGE=${KUBE_GCE_MASTER_IMAGE:-}
|
||||
MASTER_IMAGE_PROJECT=${KUBE_GCE_MASTER_PROJECT:-google-containers}
|
||||
|
@ -59,7 +67,7 @@ NODE_IMAGE=${KUBE_GCE_NODE_IMAGE:-${CVM_VERSION}}
|
|||
NODE_IMAGE_PROJECT=${KUBE_GCE_NODE_PROJECT:-google-containers}
|
||||
CONTAINER_RUNTIME=${KUBE_CONTAINER_RUNTIME:-docker}
|
||||
GCI_DOCKER_VERSION=${KUBE_GCI_DOCKER_VERSION:-}
|
||||
RKT_VERSION=${KUBE_RKT_VERSION:-1.14.0}
|
||||
RKT_VERSION=${KUBE_RKT_VERSION:-1.23.0}
|
||||
RKT_STAGE1_IMAGE=${KUBE_RKT_STAGE1_IMAGE:-coreos.com/rkt/stage1-coreos}
|
||||
|
||||
NETWORK=${KUBE_GCE_NETWORK:-e2e}
|
||||
|
|
12
vendor/k8s.io/kubernetes/cluster/gce/container-linux/OWNERS
generated
vendored
12
vendor/k8s.io/kubernetes/cluster/gce/container-linux/OWNERS
generated
vendored
|
@ -1,4 +1,8 @@
|
|||
assignees:
|
||||
- euank
|
||||
- yifan-gu
|
||||
- ethernetdan
|
||||
approvers:
|
||||
- euank
|
||||
- yifan-gu
|
||||
- ethernetdan
|
||||
reviewers:
|
||||
- euank
|
||||
- yifan-gu
|
||||
- ethernetdan
|
||||
|
|
9
vendor/k8s.io/kubernetes/cluster/gce/gci/configure-helper.sh
generated
vendored
9
vendor/k8s.io/kubernetes/cluster/gce/gci/configure-helper.sh
generated
vendored
|
@ -68,7 +68,7 @@ function safe-format-and-mount() {
|
|||
# Format only if the disk is not already formatted.
|
||||
if ! tune2fs -l "${device}" ; then
|
||||
echo "Formatting '${device}'"
|
||||
mkfs.ext4 -F -E lazy_itable_init=0,lazy_journal_init=0,discard "${device}"
|
||||
mkfs.ext4 -F "${device}"
|
||||
fi
|
||||
|
||||
mkdir -p "${mountpoint}"
|
||||
|
@ -215,6 +215,9 @@ function create-master-auth {
|
|||
echo "${MASTER_CERT}" | base64 --decode > "${auth_dir}/server.cert"
|
||||
echo "${MASTER_KEY}" | base64 --decode > "${auth_dir}/server.key"
|
||||
fi
|
||||
if [[ ! -z "${CA_KEY:-}" ]]; then
|
||||
echo "${CA_KEY}" | base64 --decode > "${auth_dir}/ca.key"
|
||||
fi
|
||||
if [ ! -e "${auth_dir}/kubeapiserver.cert" ] && [[ ! -z "${KUBEAPISERVER_CERT:-}" ]] && [[ ! -z "${KUBEAPISERVER_KEY:-}" ]]; then
|
||||
echo "${KUBEAPISERVER_CERT}" | base64 --decode > "${auth_dir}/kubeapiserver.cert"
|
||||
echo "${KUBEAPISERVER_KEY}" | base64 --decode > "${auth_dir}/kubeapiserver.key"
|
||||
|
@ -971,6 +974,10 @@ function start-kube-controller-manager {
|
|||
if [[ -n "${CLUSTER_IP_RANGE:-}" ]]; then
|
||||
params+=" --cluster-cidr=${CLUSTER_IP_RANGE}"
|
||||
fi
|
||||
if [[ -n "${CA_KEY:-}" ]]; then
|
||||
params+=" --cluster-signing-cert-file=/etc/srv/kubernetes/ca.crt"
|
||||
params+=" --cluster-signing-key-file=/etc/srv/kubernetes/ca.key"
|
||||
fi
|
||||
if [[ -n "${SERVICE_CLUSTER_IP_RANGE:-}" ]]; then
|
||||
params+=" --service-cluster-ip-range=${SERVICE_CLUSTER_IP_RANGE}"
|
||||
fi
|
||||
|
|
11
vendor/k8s.io/kubernetes/cluster/gce/util.sh
generated
vendored
11
vendor/k8s.io/kubernetes/cluster/gce/util.sh
generated
vendored
|
@ -116,17 +116,6 @@ function verify-prereqs() {
|
|||
update-or-verify-gcloud
|
||||
}
|
||||
|
||||
# Create a temp dir that'll be deleted at the end of this bash session.
|
||||
#
|
||||
# Vars set:
|
||||
# KUBE_TEMP
|
||||
function ensure-temp-dir() {
|
||||
if [[ -z ${KUBE_TEMP-} ]]; then
|
||||
KUBE_TEMP=$(mktemp -d -t kubernetes.XXXXXX)
|
||||
trap 'rm -rf "${KUBE_TEMP}"' EXIT
|
||||
fi
|
||||
}
|
||||
|
||||
# Use the gcloud defaults to find the project. If it is already set in the
|
||||
# environment then go with that.
|
||||
#
|
||||
|
|
3
vendor/k8s.io/kubernetes/cluster/images/hyperkube/Makefile
generated
vendored
3
vendor/k8s.io/kubernetes/cluster/images/hyperkube/Makefile
generated
vendored
|
@ -21,6 +21,7 @@ REGISTRY?=gcr.io/google_containers
|
|||
ARCH?=amd64
|
||||
TEMP_DIR:=$(shell mktemp -d -t hyperkubeXXXXXX)
|
||||
CNI_RELEASE=07a8a28637e97b22eb8dfe710eeae1344f69d16e
|
||||
CACHEBUST?=1
|
||||
|
||||
UNAME_S:=$(shell uname -s)
|
||||
ifeq ($(UNAME_S),Darwin)
|
||||
|
@ -78,7 +79,9 @@ endif
|
|||
cd ${TEMP_DIR} && sed -i.back "s|ARCH|${ARCH}|g" addons/singlenode/*.yaml addons/multinode/*.yaml static-pods/*.json
|
||||
cd ${TEMP_DIR} && sed -i.back "s|ARCH|${QEMUARCH}|g" Dockerfile
|
||||
cd ${TEMP_DIR} && sed -i.back "s|BASEIMAGE|${BASEIMAGE}|g" Dockerfile
|
||||
ifeq ($(CACHEBUST),1)
|
||||
cd ${TEMP_DIR} && sed -i.back "s|CACHEBUST|$(shell uuidgen)|g" Dockerfile
|
||||
endif
|
||||
cd ${TEMP_DIR} && sed -i.back "s|-amd64|-${ARCH}|g" addons/singlenode/*.yaml addons/multinode/*.yaml
|
||||
cd ${TEMP_DIR} && sed -i.back "s|__PILLAR__DNS__SERVER__|10.0.0.10|g" addons/singlenode/kubedns*.yaml addons/multinode/kubedns*.yaml
|
||||
cd ${TEMP_DIR} && sed -i.back "s|__PILLAR__DNS__DOMAIN__|cluster.local|g;s|__PILLAR__FEDERATIONS__DOMAIN__MAP__||g;" addons/singlenode/kubedns*.yaml addons/multinode/kubedns*.yaml
|
||||
|
|
|
@ -46,7 +46,7 @@ spec:
|
|||
spec:
|
||||
containers:
|
||||
- name: kubedns
|
||||
image: gcr.io/google_containers/kubedns-{{ arch }}:1.9
|
||||
image: gcr.io/google_containers/k8s-dns-kube-dns-{{ arch }}:1.11.0
|
||||
resources:
|
||||
# TODO: Set memory limits when we've profiled the container for large
|
||||
# clusters, then set request = limit to keep this container in
|
||||
|
@ -120,7 +120,7 @@ spec:
|
|||
name: dns-tcp
|
||||
protocol: TCP
|
||||
- name: sidecar
|
||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.10.0
|
||||
image: gcr.io/google_containers/k8s-dns-sidecar-amd64:1.11.0
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /metrics
|
||||
|
|
1
vendor/k8s.io/kubernetes/cluster/kubeadm.sh
generated
vendored
1
vendor/k8s.io/kubernetes/cluster/kubeadm.sh
generated
vendored
|
@ -76,6 +76,7 @@ if [[ -z "${KUBEADM_PATH:-}" ]]; then
|
|||
"${KUBE_ROOT}/_output/bin/kubeadm"
|
||||
"${KUBE_ROOT}/_output/dockerized/bin/${host_os}/${host_arch}/kubeadm"
|
||||
"${KUBE_ROOT}/_output/local/bin/${host_os}/${host_arch}/kubeadm"
|
||||
"${KUBE_ROOT}/bazel-bin/cmd/kubectl/kubeadm"
|
||||
"${KUBE_ROOT}/platforms/${host_os}/${host_arch}/kubeadm"
|
||||
)
|
||||
kubeadm=$( (ls -t "${locations[@]}" 2>/dev/null || true) | head -1 )
|
||||
|
|
1
vendor/k8s.io/kubernetes/cluster/kubectl.sh
generated
vendored
1
vendor/k8s.io/kubernetes/cluster/kubectl.sh
generated
vendored
|
@ -88,6 +88,7 @@ if [[ -z "${KUBECTL_PATH:-}" ]]; then
|
|||
"${KUBE_ROOT}/_output/bin/kubectl"
|
||||
"${KUBE_ROOT}/_output/dockerized/bin/${host_os}/${host_arch}/kubectl"
|
||||
"${KUBE_ROOT}/_output/local/bin/${host_os}/${host_arch}/kubectl"
|
||||
"${KUBE_ROOT}/bazel-bin/cmd/kubectl/kubectl"
|
||||
"${KUBE_ROOT}/platforms/${host_os}/${host_arch}/kubectl"
|
||||
)
|
||||
kubectl=$( (ls -t "${locations[@]}" 2>/dev/null || true) | head -1 )
|
||||
|
|
2
vendor/k8s.io/kubernetes/cluster/openstack-heat/config-default.sh
generated
vendored
2
vendor/k8s.io/kubernetes/cluster/openstack-heat/config-default.sh
generated
vendored
|
@ -17,7 +17,7 @@
|
|||
## Contains configuration values for the Openstack cluster
|
||||
|
||||
# Stack name
|
||||
STACK_NAME=${STACK_NAME:-KubernetesStack}
|
||||
STACK_NAME=${STACK_NAME:-kube-stack}
|
||||
|
||||
# Keypair for kubernetes stack
|
||||
KUBERNETES_KEYPAIR_NAME=${KUBERNETES_KEYPAIR_NAME:-kubernetes_keypair}
|
||||
|
|
1
vendor/k8s.io/kubernetes/cluster/openstack-heat/kubernetes-heat/kubeminion.yaml
generated
vendored
1
vendor/k8s.io/kubernetes/cluster/openstack-heat/kubernetes-heat/kubeminion.yaml
generated
vendored
|
@ -251,6 +251,7 @@ resources:
|
|||
server_name_post_fix:
|
||||
type: OS::Heat::RandomString
|
||||
properties:
|
||||
character_classes: [{'class': 'lowercase', 'min': 1}]
|
||||
length: 8
|
||||
|
||||
kube_minion:
|
||||
|
|
8
vendor/k8s.io/kubernetes/cluster/openstack-heat/util.sh
generated
vendored
8
vendor/k8s.io/kubernetes/cluster/openstack-heat/util.sh
generated
vendored
|
@ -186,7 +186,13 @@ function run-heat-script() {
|
|||
|
||||
# Automatically detect swift url if it wasn't specified
|
||||
if [[ -z $SWIFT_SERVER_URL ]]; then
|
||||
SWIFT_SERVER_URL=$(openstack catalog show object-store --format value | egrep -o "publicURL: (.+)$" | cut -d" " -f2)
|
||||
local rgx=""
|
||||
if [ "$OS_IDENTITY_API_VERSION" = "3" ]; then
|
||||
rgx="public: (.+)$"
|
||||
else
|
||||
rgx="publicURL: (.+)$"
|
||||
fi
|
||||
SWIFT_SERVER_URL=$(openstack catalog show object-store --format value | egrep -o "$rgx" | cut -d" " -f2)
|
||||
fi
|
||||
local swift_repo_url="${SWIFT_SERVER_URL}/kubernetes"
|
||||
|
||||
|
|
12
vendor/k8s.io/kubernetes/cluster/photon-controller/util.sh
generated
vendored
12
vendor/k8s.io/kubernetes/cluster/photon-controller/util.sh
generated
vendored
|
@ -1030,18 +1030,6 @@ function verify-cmd-in-path {
|
|||
}
|
||||
}
|
||||
|
||||
#
|
||||
# Checks that KUBE_TEMP is set, or sets it
|
||||
# If it sets it, it also creates the temporary directory
|
||||
# and sets up a trap so that we delete it when we exit
|
||||
#
|
||||
function ensure-temp-dir {
|
||||
if [[ -z ${KUBE_TEMP-} ]]; then
|
||||
KUBE_TEMP=$(mktemp -d -t kubernetes.XXXXXX)
|
||||
trap-add "rm -rf '${KUBE_TEMP}'" EXIT
|
||||
fi
|
||||
}
|
||||
|
||||
#
|
||||
# Repeatedly try a command over ssh until it succeeds or until five minutes have passed
|
||||
# The timeout isn't exact, since we assume the command runs instantaneously, and
|
||||
|
|
87
vendor/k8s.io/kubernetes/cluster/saltbase/BUILD
generated
vendored
Normal file
87
vendor/k8s.io/kubernetes/cluster/saltbase/BUILD
generated
vendored
Normal file
|
@ -0,0 +1,87 @@
|
|||
package(default_visibility = ["//visibility:public"])
|
||||
|
||||
load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar")
|
||||
|
||||
filegroup(
|
||||
name = "package-srcs",
|
||||
srcs = glob(["**"]),
|
||||
tags = ["automanaged"],
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "all-srcs",
|
||||
srcs = [":package-srcs"],
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
# TODO(#3579): This is a temporary hack. It gathers up the yaml,
|
||||
# yaml.in, json files in cluster/addons (minus any demos) and overlays
|
||||
# them into kube-addons, where we expect them.
|
||||
# These files are expected in a salt/kube-addons subdirectory.
|
||||
pkg_tar(
|
||||
name = "_salt_kube-addons",
|
||||
package_dir = "salt/kube-addons",
|
||||
strip_prefix = "/cluster/addons",
|
||||
visibility = ["//visibility:private"],
|
||||
deps = [
|
||||
"//cluster/addons",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "salt",
|
||||
files = glob(
|
||||
["**"],
|
||||
exclude = ["BUILD"],
|
||||
),
|
||||
mode = "0644",
|
||||
modes = {
|
||||
"install.sh": "0755",
|
||||
},
|
||||
package_dir = "kubernetes/saltbase",
|
||||
strip_prefix = ".",
|
||||
deps = [
|
||||
":_salt_kube-addons",
|
||||
],
|
||||
)
|
||||
|
||||
# The following are used in the kubernetes salt tarball.
|
||||
pkg_tar(
|
||||
name = "salt-manifests",
|
||||
files = [
|
||||
"salt/fluentd-gcp/fluentd-gcp.yaml",
|
||||
"salt/kube-proxy/kube-proxy.manifest",
|
||||
"salt/kube-registry-proxy/kube-registry-proxy.yaml",
|
||||
],
|
||||
mode = "0644",
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_kube-admission-controls",
|
||||
files = glob(["salt/kube-admission-controls/limit-range/**"]),
|
||||
mode = "0644",
|
||||
# Maintain limit-range/ subdirectory in tarball
|
||||
strip_prefix = "./salt/kube-admission-controls/",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "gci-trusty-salt-manifests",
|
||||
files = [
|
||||
"salt/cluster-autoscaler/cluster-autoscaler.manifest",
|
||||
"salt/e2e-image-puller/e2e-image-puller.manifest",
|
||||
"salt/etcd/etcd.manifest",
|
||||
"salt/kube-addons/kube-addon-manager.yaml",
|
||||
"salt/kube-apiserver/abac-authz-policy.jsonl",
|
||||
"salt/kube-apiserver/kube-apiserver.manifest",
|
||||
"salt/kube-controller-manager/kube-controller-manager.manifest",
|
||||
"salt/kube-scheduler/kube-scheduler.manifest",
|
||||
"salt/l7-gcp/glbc.manifest",
|
||||
"salt/rescheduler/rescheduler.manifest",
|
||||
],
|
||||
mode = "0644",
|
||||
deps = [
|
||||
"_kube-admission-controls",
|
||||
],
|
||||
)
|
9
vendor/k8s.io/kubernetes/cluster/saltbase/salt/fluentd-gcp/OWNERS
generated
vendored
9
vendor/k8s.io/kubernetes/cluster/saltbase/salt/fluentd-gcp/OWNERS
generated
vendored
|
@ -1,3 +1,6 @@
|
|||
assignees:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
approvers:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
reviewers:
|
||||
- Crassirostris
|
||||
- piosz
|
||||
|
|
24
vendor/k8s.io/kubernetes/cluster/saltbase/salt/fluentd-gcp/fluentd-gcp.yaml
generated
vendored
24
vendor/k8s.io/kubernetes/cluster/saltbase/salt/fluentd-gcp/fluentd-gcp.yaml
generated
vendored
|
@ -10,7 +10,7 @@ spec:
|
|||
dnsPolicy: Default
|
||||
containers:
|
||||
- name: fluentd-cloud-logging
|
||||
image: gcr.io/google_containers/fluentd-gcp:1.32
|
||||
image: gcr.io/google_containers/fluentd-gcp:1.34
|
||||
# If fluentd consumes its own logs, the following situation may happen:
|
||||
# fluentd fails to send a chunk to the server => writes it to the log =>
|
||||
# tries to send this message to the server => fails to send a chunk and so on.
|
||||
|
@ -34,8 +34,6 @@ spec:
|
|||
- name: varlibdockercontainers
|
||||
mountPath: /var/lib/docker/containers
|
||||
readOnly: true
|
||||
- name: libsystemddir
|
||||
mountPath: /host/lib
|
||||
# Liveness probe is aimed to help in situarions where fluentd
|
||||
# silently hangs for no apparent reasons until manual restart.
|
||||
# The idea of this probe is that if fluentd is not queueing or
|
||||
|
@ -51,10 +49,23 @@ spec:
|
|||
- '/bin/sh'
|
||||
- '-c'
|
||||
- >
|
||||
LIVENESS_THRESHOLD_SECONDS=${LIVENESS_THRESHOLD_SECONDS:-600};
|
||||
LIVENESS_THRESHOLD_SECONDS=${LIVENESS_THRESHOLD_SECONDS:-300};
|
||||
STUCK_THRESHOLD_SECONDS=${LIVENESS_THRESHOLD_SECONDS:-900};
|
||||
if [ ! -e /var/log/fluentd-buffers ];
|
||||
then
|
||||
exit 1;
|
||||
fi;
|
||||
LAST_MODIFIED_DATE=`stat /var/log/fluentd-buffers | grep Modify | sed -r "s/Modify: (.*)/\1/"`;
|
||||
LAST_MODIFIED_TIMESTAMP=`date -d "$LAST_MODIFIED_DATE" +%s`;
|
||||
if [ `date +%s` -gt `expr $LAST_MODIFIED_TIMESTAMP + $LIVENESS_THRESHOLD_SECONDS` ]; then exit 1; fi;
|
||||
if [ `date +%s` -gt `expr $LAST_MODIFIED_TIMESTAMP + $STUCK_THRESHOLD_SECONDS` ];
|
||||
then
|
||||
rm -rf /var/log/fluentd-buffers;
|
||||
exit 1;
|
||||
fi;
|
||||
if [ `date +%s` -gt `expr $LAST_MODIFIED_TIMESTAMP + $LIVENESS_THRESHOLD_SECONDS` ];
|
||||
then
|
||||
exit 1;
|
||||
fi;
|
||||
terminationGracePeriodSeconds: 30
|
||||
volumes:
|
||||
- name: varlog
|
||||
|
@ -63,6 +74,3 @@ spec:
|
|||
- name: varlibdockercontainers
|
||||
hostPath:
|
||||
path: /var/lib/docker/containers
|
||||
- name: libsystemddir
|
||||
hostPath:
|
||||
path: /usr/lib64
|
||||
|
|
6
vendor/k8s.io/kubernetes/cluster/saltbase/salt/generate-cert/make-ca-cert.sh
generated
vendored
6
vendor/k8s.io/kubernetes/cluster/saltbase/salt/generate-cert/make-ca-cert.sh
generated
vendored
|
@ -99,7 +99,11 @@ else
|
|||
cp -p pki/issued/kubernetes-master.crt "${cert_dir}/server.cert" > /dev/null 2>&1
|
||||
cp -p pki/private/kubernetes-master.key "${cert_dir}/server.key" > /dev/null 2>&1
|
||||
fi
|
||||
./easyrsa build-client-full kubecfg nopass > /dev/null 2>&1
|
||||
# Make a superuser client cert with subject "O=system:masters, CN=kubecfg"
|
||||
./easyrsa --dn-mode=org \
|
||||
--req-cn=kubecfg --req-org=system:masters \
|
||||
--req-c= --req-st= --req-city= --req-email= --req-ou= \
|
||||
build-client-full kubecfg nopass > /dev/null 2>&1
|
||||
cp -p pki/ca.crt "${cert_dir}/ca.crt"
|
||||
cp -p pki/issued/kubecfg.crt "${cert_dir}/kubecfg.crt"
|
||||
cp -p pki/private/kubecfg.key "${cert_dir}/kubecfg.key"
|
||||
|
|
7
vendor/k8s.io/kubernetes/cluster/saltbase/salt/helpers/safe_format_and_mount
generated
vendored
7
vendor/k8s.io/kubernetes/cluster/saltbase/salt/helpers/safe_format_and_mount
generated
vendored
|
@ -22,12 +22,9 @@
|
|||
|
||||
FSCK=fsck.ext4
|
||||
MOUNT_OPTIONS="discard,defaults"
|
||||
MKFS="mkfs.ext4 -E lazy_itable_init=0,lazy_journal_init=0 -F"
|
||||
MKFS="mkfs.ext4 -F"
|
||||
if [ -e /etc/redhat-release ]; then
|
||||
if grep -q '6\..' /etc/redhat-release; then
|
||||
# lazy_journal_init is not recognized in redhat 6
|
||||
MKFS="mkfs.ext4 -E lazy_itable_init=0 -F"
|
||||
elif grep -q '7\..' /etc/redhat-release; then
|
||||
if grep -q '7\..' /etc/redhat-release; then
|
||||
FSCK=fsck.xfs
|
||||
MKFS=mkfs.xfs
|
||||
fi
|
||||
|
|
11
vendor/k8s.io/kubernetes/cluster/vagrant/util.sh
generated
vendored
11
vendor/k8s.io/kubernetes/cluster/vagrant/util.sh
generated
vendored
|
@ -104,17 +104,6 @@ function verify-prereqs {
|
|||
export USING_KUBE_SCRIPTS=true
|
||||
}
|
||||
|
||||
# Create a temp dir that'll be deleted at the end of this bash session.
|
||||
#
|
||||
# Vars set:
|
||||
# KUBE_TEMP
|
||||
function ensure-temp-dir {
|
||||
if [[ -z ${KUBE_TEMP-} ]]; then
|
||||
export KUBE_TEMP=$(mktemp -d -t kubernetes.XXXXXX)
|
||||
trap 'rm -rf "${KUBE_TEMP}"' EXIT
|
||||
fi
|
||||
}
|
||||
|
||||
# Create a set of provision scripts for the master and each of the nodes
|
||||
function create-provision-scripts {
|
||||
ensure-temp-dir
|
||||
|
|
91
vendor/k8s.io/kubernetes/cluster/windows/kube-startup.ps1
generated
vendored
Normal file
91
vendor/k8s.io/kubernetes/cluster/windows/kube-startup.ps1
generated
vendored
Normal file
|
@ -0,0 +1,91 @@
|
|||
# Copyright 2016 The Kubernetes Authors.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
# kube-startup.ps1 is used to run kubelet and kubeproxy as a process. It uses nssm (https://nssm.cc/) process manager to register kubelet and kube-proxy process,
|
||||
# The processes can be viewed using TaskManager(Taskmgr.exe).
|
||||
# Please note that this startup script does not start the API server. Kubernetes control plane currently runs on Linux
|
||||
# and only Kubelet and Kube-Proxy can be run on Windows
|
||||
|
||||
param (
|
||||
[Parameter(Mandatory=$true)][string]$ContainerNetwork,
|
||||
[string]$InterfaceForServiceIP = "vEthernet (HNS Internal NIC)",
|
||||
[string]$LogDirectory = "C:\temp",
|
||||
[Parameter(Mandatory=$true)][string]$Hostname,
|
||||
[Parameter(Mandatory=$true)][string]$APIServer,
|
||||
[string]$InfraContainerImage = "apprenda/pause",
|
||||
[string]$ClusterDNS = "10.0.0.10",
|
||||
[string]$KubeletExePath = ".\kubelet.exe",
|
||||
[string]$KubeProxyExePath = ".\kube-proxy.exe"
|
||||
)
|
||||
|
||||
$kubeletDirectory = (Get-Item $KubeletExePath).Directory.FullName
|
||||
$kubeproxyDirectory = (Get-Item $KubeProxyExePath).Directory.FullName
|
||||
|
||||
# Assemble the Kubelet executable arguments
|
||||
$kubeletArgs = @("--hostname-override=$Hostname","--pod-infra-container-image=$InfraContainerImage","--resolv-conf=""""","--api-servers=$APIServer","--cluster-dns=$ClusterDNS")
|
||||
# Assemble the kube-proxy executable arguments
|
||||
$kubeproxyArgs = @("--hostname-override=$Hostname","--proxy-mode=userspace","--bind-address=$Hostname","--master=$APIServer")
|
||||
|
||||
# Setup kubelet service
|
||||
nssm install kubelet "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
|
||||
nssm set kubelet Application "$KubeletExePath"
|
||||
nssm set kubelet AppDirectory "$kubeletDirectory"
|
||||
nssm set kubelet AppParameters $kubeletArgs
|
||||
nssm set kubelet DisplayName kubelet
|
||||
nssm set kubelet Description kubelet
|
||||
nssm set kubelet Start SERVICE_AUTO_START
|
||||
nssm set kubelet ObjectName LocalSystem
|
||||
nssm set kubelet Type SERVICE_WIN32_OWN_PROCESS
|
||||
# Delay restart if application runs for less than 1500 ms
|
||||
nssm set kubelet AppThrottle 1500
|
||||
nssm set kubelet AppStdout "$LogDirectory\kubelet.log"
|
||||
nssm set kubelet AppStderr "$LogDirectory\kubelet.err.log"
|
||||
nssm set kubelet AppStdoutCreationDisposition 4
|
||||
nssm set kubelet AppStderrCreationDisposition 4
|
||||
nssm set kubelet AppRotateFiles 1
|
||||
nssm set kubelet AppRotateOnline 1
|
||||
# Rotate Logs Every 24 hours or 1 gb
|
||||
nssm set kubelet AppRotateSeconds 86400
|
||||
nssm set kubelet AppRotateBytes 1073741824
|
||||
nssm set kubelet AppEnvironmentExtra CONTAINER_NETWORK=$ContainerNetwork
|
||||
|
||||
|
||||
# Setup kube-proxy service
|
||||
nssm install kube-proxy "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
|
||||
nssm set kube-proxy Application "$KubeProxyExePath"
|
||||
nssm set kube-proxy AppDirectory "$kubeproxyDirectory"
|
||||
nssm set kube-proxy AppParameters $kubeproxyArgs
|
||||
nssm set kube-proxy DisplayName kube-proxy
|
||||
nssm set kube-proxy Description kube-proxy
|
||||
nssm set kube-proxy Start SERVICE_AUTO_START
|
||||
nssm set kube-proxy ObjectName LocalSystem
|
||||
nssm set kube-proxy Type SERVICE_WIN32_OWN_PROCESS
|
||||
# Delay restart if application runs for less than 1500 ms
|
||||
nssm set kube-proxy AppThrottle 1500
|
||||
nssm set kube-proxy AppStdout "$LogDirectory\kube-proxy.log"
|
||||
nssm set kube-proxy AppStderr "$LogDirectory\kube-proxy.err.log"
|
||||
nssm set kube-proxy AppStdoutCreationDisposition 4
|
||||
nssm set kube-proxy AppStderrCreationDisposition 4
|
||||
nssm set kube-proxy AppRotateFiles 1
|
||||
nssm set kube-proxy AppRotateOnline 1
|
||||
# Rotate Logs Every 24 hours or 1 gb
|
||||
nssm set kube-proxy AppRotateSeconds 86400
|
||||
nssm set kube-proxy AppRotateBytes 1073741824
|
||||
nssm set kube-proxy AppEnvironmentExtra INTERFACE_TO_ADD_SERVICE_IP=$InterfaceForServiceIP
|
||||
|
||||
# Start kubelet and kube-proxy Services
|
||||
echo "Starting kubelet"
|
||||
Start-Service kubelet
|
||||
echo "Starting kube-proxy"
|
||||
Start-Service kube-proxy
|
7
vendor/k8s.io/kubernetes/cmd/OWNERS
generated
vendored
7
vendor/k8s.io/kubernetes/cmd/OWNERS
generated
vendored
|
@ -1,4 +1,9 @@
|
|||
assignees:
|
||||
reviewers:
|
||||
- dchen1107
|
||||
- lavalamp
|
||||
- mikedanese
|
||||
- thockin
|
||||
approvers:
|
||||
- dchen1107
|
||||
- lavalamp
|
||||
- mikedanese
|
||||
|
|
2
vendor/k8s.io/kubernetes/cmd/cloud-controller-manager/BUILD
generated
vendored
2
vendor/k8s.io/kubernetes/cmd/cloud-controller-manager/BUILD
generated
vendored
|
@ -30,7 +30,7 @@ go_library(
|
|||
"//pkg/version/verflag:go_default_library",
|
||||
"//vendor:github.com/golang/glog",
|
||||
"//vendor:github.com/spf13/pflag",
|
||||
"//vendor:k8s.io/apiserver/pkg/healthz",
|
||||
"//vendor:k8s.io/apiserver/pkg/server/healthz",
|
||||
],
|
||||
)
|
||||
|
||||
|
|
7
vendor/k8s.io/kubernetes/cmd/cloud-controller-manager/app/BUILD
generated
vendored
7
vendor/k8s.io/kubernetes/cmd/cloud-controller-manager/app/BUILD
generated
vendored
|
@ -19,8 +19,6 @@ go_library(
|
|||
"//pkg/client/leaderelection:go_default_library",
|
||||
"//pkg/client/leaderelection/resourcelock:go_default_library",
|
||||
"//pkg/client/record:go_default_library",
|
||||
"//pkg/client/restclient:go_default_library",
|
||||
"//pkg/client/unversioned/clientcmd:go_default_library",
|
||||
"//pkg/cloudprovider:go_default_library",
|
||||
"//pkg/controller:go_default_library",
|
||||
"//pkg/controller/cloud:go_default_library",
|
||||
|
@ -32,8 +30,11 @@ go_library(
|
|||
"//vendor:github.com/prometheus/client_golang/prometheus",
|
||||
"//vendor:github.com/spf13/cobra",
|
||||
"//vendor:github.com/spf13/pflag",
|
||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
||||
"//vendor:k8s.io/apimachinery/pkg/util/wait",
|
||||
"//vendor:k8s.io/apiserver/pkg/healthz",
|
||||
"//vendor:k8s.io/apiserver/pkg/server/healthz",
|
||||
"//vendor:k8s.io/client-go/rest",
|
||||
"//vendor:k8s.io/client-go/tools/clientcmd",
|
||||
],
|
||||
)
|
||||
|
||||
|
|
9
vendor/k8s.io/kubernetes/cmd/cloud-controller-manager/app/controllermanager.go
generated
vendored
9
vendor/k8s.io/kubernetes/cmd/cloud-controller-manager/app/controllermanager.go
generated
vendored
|
@ -25,8 +25,11 @@ import (
|
|||
"strconv"
|
||||
"time"
|
||||
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/util/wait"
|
||||
"k8s.io/apiserver/pkg/healthz"
|
||||
"k8s.io/apiserver/pkg/server/healthz"
|
||||
restclient "k8s.io/client-go/rest"
|
||||
"k8s.io/client-go/tools/clientcmd"
|
||||
"k8s.io/kubernetes/cmd/cloud-controller-manager/app/options"
|
||||
"k8s.io/kubernetes/pkg/api/v1"
|
||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||
|
@ -34,8 +37,6 @@ import (
|
|||
"k8s.io/kubernetes/pkg/client/leaderelection"
|
||||
"k8s.io/kubernetes/pkg/client/leaderelection/resourcelock"
|
||||
"k8s.io/kubernetes/pkg/client/record"
|
||||
"k8s.io/kubernetes/pkg/client/restclient"
|
||||
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
|
||||
"k8s.io/kubernetes/pkg/cloudprovider"
|
||||
"k8s.io/kubernetes/pkg/controller"
|
||||
nodecontroller "k8s.io/kubernetes/pkg/controller/cloud"
|
||||
|
@ -158,7 +159,7 @@ func Run(s *options.CloudControllerManagerServer, cloud cloudprovider.Interface)
|
|||
|
||||
// Lock required for leader election
|
||||
rl := resourcelock.EndpointsLock{
|
||||
EndpointsMeta: v1.ObjectMeta{
|
||||
EndpointsMeta: metav1.ObjectMeta{
|
||||
Namespace: "kube-system",
|
||||
Name: "cloud-controller-manager",
|
||||
},
|
||||
|
|
2
vendor/k8s.io/kubernetes/cmd/cloud-controller-manager/controller-manager.go
generated
vendored
2
vendor/k8s.io/kubernetes/cmd/cloud-controller-manager/controller-manager.go
generated
vendored
|
@ -23,7 +23,7 @@ import (
|
|||
"fmt"
|
||||
"os"
|
||||
|
||||
"k8s.io/apiserver/pkg/healthz"
|
||||
"k8s.io/apiserver/pkg/server/healthz"
|
||||
"k8s.io/kubernetes/cmd/cloud-controller-manager/app"
|
||||
"k8s.io/kubernetes/cmd/cloud-controller-manager/app/options"
|
||||
_ "k8s.io/kubernetes/pkg/client/metrics/prometheus" // for client metric registration
|
||||
|
|
2
vendor/k8s.io/kubernetes/cmd/hyperkube/BUILD
generated
vendored
2
vendor/k8s.io/kubernetes/cmd/hyperkube/BUILD
generated
vendored
|
@ -66,7 +66,7 @@ go_library(
|
|||
"//plugin/cmd/kube-scheduler/app:go_default_library",
|
||||
"//plugin/cmd/kube-scheduler/app/options:go_default_library",
|
||||
"//vendor:github.com/spf13/pflag",
|
||||
"//vendor:k8s.io/apiserver/pkg/healthz",
|
||||
"//vendor:k8s.io/apiserver/pkg/server/healthz",
|
||||
],
|
||||
)
|
||||
|
||||
|
|
2
vendor/k8s.io/kubernetes/cmd/hyperkube/kube-proxy.go
generated
vendored
2
vendor/k8s.io/kubernetes/cmd/hyperkube/kube-proxy.go
generated
vendored
|
@ -17,7 +17,7 @@ limitations under the License.
|
|||
package main
|
||||
|
||||
import (
|
||||
"k8s.io/apiserver/pkg/healthz"
|
||||
"k8s.io/apiserver/pkg/server/healthz"
|
||||
"k8s.io/kubernetes/cmd/kube-proxy/app"
|
||||
"k8s.io/kubernetes/cmd/kube-proxy/app/options"
|
||||
)
|
||||
|
|
5
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/install/BUILD
generated
vendored
5
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/install/BUILD
generated
vendored
|
@ -14,7 +14,10 @@ go_library(
|
|||
deps = [
|
||||
"//cmd/kube-aggregator/pkg/apis/apiregistration:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/apis/apiregistration/v1alpha1:go_default_library",
|
||||
"//pkg/apimachinery/announced:go_default_library",
|
||||
"//pkg/api:go_default_library",
|
||||
"//vendor:k8s.io/apimachinery/pkg/apimachinery/announced",
|
||||
"//vendor:k8s.io/apimachinery/pkg/apimachinery/registered",
|
||||
"//vendor:k8s.io/apimachinery/pkg/runtime",
|
||||
"//vendor:k8s.io/apimachinery/pkg/util/sets",
|
||||
],
|
||||
)
|
||||
|
|
12
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/install/install.go
generated
vendored
12
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/install/install.go
generated
vendored
|
@ -17,13 +17,21 @@ limitations under the License.
|
|||
package install
|
||||
|
||||
import (
|
||||
"k8s.io/apimachinery/pkg/apimachinery/announced"
|
||||
"k8s.io/apimachinery/pkg/apimachinery/registered"
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/apimachinery/pkg/util/sets"
|
||||
"k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration"
|
||||
"k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/v1alpha1"
|
||||
"k8s.io/kubernetes/pkg/apimachinery/announced"
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
)
|
||||
|
||||
func init() {
|
||||
Install(api.GroupFactoryRegistry, api.Registry, api.Scheme)
|
||||
}
|
||||
|
||||
// Install registers the API group and adds types to a scheme
|
||||
func Install(groupFactoryRegistry announced.APIGroupFactoryRegistry, registry *registered.APIRegistrationManager, scheme *runtime.Scheme) {
|
||||
if err := announced.NewGroupMetaFactory(
|
||||
&announced.GroupMetaFactoryArgs{
|
||||
GroupName: apiregistration.GroupName,
|
||||
|
@ -35,7 +43,7 @@ func init() {
|
|||
announced.VersionToSchemeFunc{
|
||||
v1alpha1.SchemeGroupVersion.Version: v1alpha1.AddToScheme,
|
||||
},
|
||||
).Announce().RegisterAndEnable(); err != nil {
|
||||
).Announce(groupFactoryRegistry).RegisterAndEnable(registry, scheme); err != nil {
|
||||
panic(err)
|
||||
}
|
||||
}
|
||||
|
|
2
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/register.go
generated
vendored
2
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/register.go
generated
vendored
|
@ -50,7 +50,7 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||
&APIServiceList{},
|
||||
|
||||
&kapi.ListOptions{},
|
||||
&kapi.DeleteOptions{},
|
||||
&metav1.DeleteOptions{},
|
||||
&metav1.GetOptions{},
|
||||
)
|
||||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||
|
|
7
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/types.go
generated
vendored
7
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/types.go
generated
vendored
|
@ -16,10 +16,7 @@ limitations under the License.
|
|||
|
||||
package apiregistration
|
||||
|
||||
import (
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
kapi "k8s.io/kubernetes/pkg/api"
|
||||
)
|
||||
import metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
|
||||
// APIServiceList is a list of APIService objects.
|
||||
type APIServiceList struct {
|
||||
|
@ -75,7 +72,7 @@ type APIServiceStatus struct {
|
|||
// Name must be "version.group".
|
||||
type APIService struct {
|
||||
metav1.TypeMeta
|
||||
kapi.ObjectMeta
|
||||
metav1.ObjectMeta
|
||||
|
||||
// Spec contains information for locating and communicating with a server
|
||||
Spec APIServiceSpec
|
||||
|
|
1
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/v1alpha1/BUILD
generated
vendored
1
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/v1alpha1/BUILD
generated
vendored
|
@ -20,7 +20,6 @@ go_library(
|
|||
tags = ["automanaged"],
|
||||
deps = [
|
||||
"//cmd/kube-aggregator/pkg/apis/apiregistration:go_default_library",
|
||||
"//pkg/api/v1:go_default_library",
|
||||
"//vendor:github.com/ugorji/go/codec",
|
||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
||||
"//vendor:k8s.io/apimachinery/pkg/conversion",
|
||||
|
|
|
@ -20,7 +20,6 @@ import (
|
|||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
"k8s.io/kubernetes/pkg/api/v1"
|
||||
)
|
||||
|
||||
const GroupName = "apiregistration.k8s.io"
|
||||
|
@ -38,10 +37,6 @@ func addKnownTypes(scheme *runtime.Scheme) error {
|
|||
scheme.AddKnownTypes(SchemeGroupVersion,
|
||||
&APIService{},
|
||||
&APIServiceList{},
|
||||
|
||||
&v1.ListOptions{},
|
||||
&v1.DeleteOptions{},
|
||||
&metav1.GetOptions{},
|
||||
)
|
||||
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||
return nil
|
||||
|
|
|
@ -26,8 +26,7 @@ import (
|
|||
"fmt"
|
||||
codec1978 "github.com/ugorji/go/codec"
|
||||
pkg1_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
pkg3_types "k8s.io/apimachinery/pkg/types"
|
||||
pkg2_v1 "k8s.io/kubernetes/pkg/api/v1"
|
||||
pkg2_types "k8s.io/apimachinery/pkg/types"
|
||||
"reflect"
|
||||
"runtime"
|
||||
time "time"
|
||||
|
@ -64,10 +63,9 @@ func init() {
|
|||
}
|
||||
if false { // reference the types, but skip this branch at build/run time
|
||||
var v0 pkg1_v1.TypeMeta
|
||||
var v1 pkg3_types.UID
|
||||
var v2 pkg2_v1.ObjectMeta
|
||||
var v3 time.Time
|
||||
_, _, _, _ = v0, v1, v2, v3
|
||||
var v1 pkg2_types.UID
|
||||
var v2 time.Time
|
||||
_, _, _ = v0, v1, v2
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -1340,7 +1338,13 @@ func (x *APIService) CodecEncodeSelf(e *codec1978.Encoder) {
|
|||
z.EncSendContainerState(codecSelfer_containerArrayElem1234)
|
||||
if yyq2[2] {
|
||||
yy10 := &x.ObjectMeta
|
||||
yy10.CodecEncodeSelf(e)
|
||||
yym11 := z.EncBinary()
|
||||
_ = yym11
|
||||
if false {
|
||||
} else if z.HasExtensions() && z.EncExt(yy10) {
|
||||
} else {
|
||||
z.EncFallback(yy10)
|
||||
}
|
||||
} else {
|
||||
r.EncodeNil()
|
||||
}
|
||||
|
@ -1350,7 +1354,13 @@ func (x *APIService) CodecEncodeSelf(e *codec1978.Encoder) {
|
|||
r.EncodeString(codecSelferC_UTF81234, string("metadata"))
|
||||
z.EncSendContainerState(codecSelfer_containerMapValue1234)
|
||||
yy12 := &x.ObjectMeta
|
||||
yy12.CodecEncodeSelf(e)
|
||||
yym13 := z.EncBinary()
|
||||
_ = yym13
|
||||
if false {
|
||||
} else if z.HasExtensions() && z.EncExt(yy12) {
|
||||
} else {
|
||||
z.EncFallback(yy12)
|
||||
}
|
||||
}
|
||||
}
|
||||
if yyr2 || yy2arr2 {
|
||||
|
@ -1474,24 +1484,30 @@ func (x *APIService) codecDecodeSelfFromMap(l int, d *codec1978.Decoder) {
|
|||
}
|
||||
case "metadata":
|
||||
if r.TryDecodeAsNil() {
|
||||
x.ObjectMeta = pkg2_v1.ObjectMeta{}
|
||||
x.ObjectMeta = pkg1_v1.ObjectMeta{}
|
||||
} else {
|
||||
yyv8 := &x.ObjectMeta
|
||||
yyv8.CodecDecodeSelf(d)
|
||||
yym9 := z.DecBinary()
|
||||
_ = yym9
|
||||
if false {
|
||||
} else if z.HasExtensions() && z.DecExt(yyv8) {
|
||||
} else {
|
||||
z.DecFallback(yyv8, false)
|
||||
}
|
||||
}
|
||||
case "spec":
|
||||
if r.TryDecodeAsNil() {
|
||||
x.Spec = APIServiceSpec{}
|
||||
} else {
|
||||
yyv9 := &x.Spec
|
||||
yyv9.CodecDecodeSelf(d)
|
||||
yyv10 := &x.Spec
|
||||
yyv10.CodecDecodeSelf(d)
|
||||
}
|
||||
case "status":
|
||||
if r.TryDecodeAsNil() {
|
||||
x.Status = APIServiceStatus{}
|
||||
} else {
|
||||
yyv10 := &x.Status
|
||||
yyv10.CodecDecodeSelf(d)
|
||||
yyv11 := &x.Status
|
||||
yyv11.CodecDecodeSelf(d)
|
||||
}
|
||||
default:
|
||||
z.DecStructFieldNotFound(-1, yys3)
|
||||
|
@ -1504,16 +1520,16 @@ func (x *APIService) codecDecodeSelfFromArray(l int, d *codec1978.Decoder) {
|
|||
var h codecSelfer1234
|
||||
z, r := codec1978.GenHelperDecoder(d)
|
||||
_, _, _ = h, z, r
|
||||
var yyj11 int
|
||||
var yyb11 bool
|
||||
var yyhl11 bool = l >= 0
|
||||
yyj11++
|
||||
if yyhl11 {
|
||||
yyb11 = yyj11 > l
|
||||
var yyj12 int
|
||||
var yyb12 bool
|
||||
var yyhl12 bool = l >= 0
|
||||
yyj12++
|
||||
if yyhl12 {
|
||||
yyb12 = yyj12 > l
|
||||
} else {
|
||||
yyb11 = r.CheckBreak()
|
||||
yyb12 = r.CheckBreak()
|
||||
}
|
||||
if yyb11 {
|
||||
if yyb12 {
|
||||
z.DecSendContainerState(codecSelfer_containerArrayEnd1234)
|
||||
return
|
||||
}
|
||||
|
@ -1521,21 +1537,21 @@ func (x *APIService) codecDecodeSelfFromArray(l int, d *codec1978.Decoder) {
|
|||
if r.TryDecodeAsNil() {
|
||||
x.Kind = ""
|
||||
} else {
|
||||
yyv12 := &x.Kind
|
||||
yym13 := z.DecBinary()
|
||||
_ = yym13
|
||||
yyv13 := &x.Kind
|
||||
yym14 := z.DecBinary()
|
||||
_ = yym14
|
||||
if false {
|
||||
} else {
|
||||
*((*string)(yyv12)) = r.DecodeString()
|
||||
*((*string)(yyv13)) = r.DecodeString()
|
||||
}
|
||||
}
|
||||
yyj11++
|
||||
if yyhl11 {
|
||||
yyb11 = yyj11 > l
|
||||
yyj12++
|
||||
if yyhl12 {
|
||||
yyb12 = yyj12 > l
|
||||
} else {
|
||||
yyb11 = r.CheckBreak()
|
||||
yyb12 = r.CheckBreak()
|
||||
}
|
||||
if yyb11 {
|
||||
if yyb12 {
|
||||
z.DecSendContainerState(codecSelfer_containerArrayEnd1234)
|
||||
return
|
||||
}
|
||||
|
@ -1543,38 +1559,44 @@ func (x *APIService) codecDecodeSelfFromArray(l int, d *codec1978.Decoder) {
|
|||
if r.TryDecodeAsNil() {
|
||||
x.APIVersion = ""
|
||||
} else {
|
||||
yyv14 := &x.APIVersion
|
||||
yym15 := z.DecBinary()
|
||||
_ = yym15
|
||||
yyv15 := &x.APIVersion
|
||||
yym16 := z.DecBinary()
|
||||
_ = yym16
|
||||
if false {
|
||||
} else {
|
||||
*((*string)(yyv14)) = r.DecodeString()
|
||||
*((*string)(yyv15)) = r.DecodeString()
|
||||
}
|
||||
}
|
||||
yyj11++
|
||||
if yyhl11 {
|
||||
yyb11 = yyj11 > l
|
||||
yyj12++
|
||||
if yyhl12 {
|
||||
yyb12 = yyj12 > l
|
||||
} else {
|
||||
yyb11 = r.CheckBreak()
|
||||
yyb12 = r.CheckBreak()
|
||||
}
|
||||
if yyb11 {
|
||||
if yyb12 {
|
||||
z.DecSendContainerState(codecSelfer_containerArrayEnd1234)
|
||||
return
|
||||
}
|
||||
z.DecSendContainerState(codecSelfer_containerArrayElem1234)
|
||||
if r.TryDecodeAsNil() {
|
||||
x.ObjectMeta = pkg2_v1.ObjectMeta{}
|
||||
x.ObjectMeta = pkg1_v1.ObjectMeta{}
|
||||
} else {
|
||||
yyv16 := &x.ObjectMeta
|
||||
yyv16.CodecDecodeSelf(d)
|
||||
yyv17 := &x.ObjectMeta
|
||||
yym18 := z.DecBinary()
|
||||
_ = yym18
|
||||
if false {
|
||||
} else if z.HasExtensions() && z.DecExt(yyv17) {
|
||||
} else {
|
||||
z.DecFallback(yyv17, false)
|
||||
}
|
||||
}
|
||||
yyj11++
|
||||
if yyhl11 {
|
||||
yyb11 = yyj11 > l
|
||||
yyj12++
|
||||
if yyhl12 {
|
||||
yyb12 = yyj12 > l
|
||||
} else {
|
||||
yyb11 = r.CheckBreak()
|
||||
yyb12 = r.CheckBreak()
|
||||
}
|
||||
if yyb11 {
|
||||
if yyb12 {
|
||||
z.DecSendContainerState(codecSelfer_containerArrayEnd1234)
|
||||
return
|
||||
}
|
||||
|
@ -1582,16 +1604,16 @@ func (x *APIService) codecDecodeSelfFromArray(l int, d *codec1978.Decoder) {
|
|||
if r.TryDecodeAsNil() {
|
||||
x.Spec = APIServiceSpec{}
|
||||
} else {
|
||||
yyv17 := &x.Spec
|
||||
yyv17.CodecDecodeSelf(d)
|
||||
yyv19 := &x.Spec
|
||||
yyv19.CodecDecodeSelf(d)
|
||||
}
|
||||
yyj11++
|
||||
if yyhl11 {
|
||||
yyb11 = yyj11 > l
|
||||
yyj12++
|
||||
if yyhl12 {
|
||||
yyb12 = yyj12 > l
|
||||
} else {
|
||||
yyb11 = r.CheckBreak()
|
||||
yyb12 = r.CheckBreak()
|
||||
}
|
||||
if yyb11 {
|
||||
if yyb12 {
|
||||
z.DecSendContainerState(codecSelfer_containerArrayEnd1234)
|
||||
return
|
||||
}
|
||||
|
@ -1599,21 +1621,21 @@ func (x *APIService) codecDecodeSelfFromArray(l int, d *codec1978.Decoder) {
|
|||
if r.TryDecodeAsNil() {
|
||||
x.Status = APIServiceStatus{}
|
||||
} else {
|
||||
yyv18 := &x.Status
|
||||
yyv18.CodecDecodeSelf(d)
|
||||
yyv20 := &x.Status
|
||||
yyv20.CodecDecodeSelf(d)
|
||||
}
|
||||
for {
|
||||
yyj11++
|
||||
if yyhl11 {
|
||||
yyb11 = yyj11 > l
|
||||
yyj12++
|
||||
if yyhl12 {
|
||||
yyb12 = yyj12 > l
|
||||
} else {
|
||||
yyb11 = r.CheckBreak()
|
||||
yyb12 = r.CheckBreak()
|
||||
}
|
||||
if yyb11 {
|
||||
if yyb12 {
|
||||
break
|
||||
}
|
||||
z.DecSendContainerState(codecSelfer_containerArrayElem1234)
|
||||
z.DecStructFieldNotFound(yyj11-1, "")
|
||||
z.DecStructFieldNotFound(yyj12-1, "")
|
||||
}
|
||||
z.DecSendContainerState(codecSelfer_containerArrayEnd1234)
|
||||
}
|
||||
|
|
|
@ -16,10 +16,7 @@ limitations under the License.
|
|||
|
||||
package v1alpha1
|
||||
|
||||
import (
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
kapi "k8s.io/kubernetes/pkg/api/v1"
|
||||
)
|
||||
import metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
|
||||
// APIServiceList is a list of APIService objects.
|
||||
type APIServiceList struct {
|
||||
|
@ -74,8 +71,8 @@ type APIServiceStatus struct {
|
|||
// APIService represents a server for a particular GroupVersion.
|
||||
// Name must be "version.group".
|
||||
type APIService struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
kapi.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// Spec contains information for locating and communicating with a server
|
||||
Spec APIServiceSpec `json:"spec,omitempty" protobuf:"bytes,2,opt,name=spec"`
|
||||
|
|
|
@ -49,10 +49,7 @@ func RegisterConversions(scheme *runtime.Scheme) error {
|
|||
}
|
||||
|
||||
func autoConvert_v1alpha1_APIService_To_apiregistration_APIService(in *APIService, out *apiregistration.APIService, s conversion.Scope) error {
|
||||
// TODO: Inefficient conversion - can we improve it?
|
||||
if err := s.Convert(&in.ObjectMeta, &out.ObjectMeta, 0); err != nil {
|
||||
return err
|
||||
}
|
||||
out.ObjectMeta = in.ObjectMeta
|
||||
if err := Convert_v1alpha1_APIServiceSpec_To_apiregistration_APIServiceSpec(&in.Spec, &out.Spec, s); err != nil {
|
||||
return err
|
||||
}
|
||||
|
@ -67,10 +64,7 @@ func Convert_v1alpha1_APIService_To_apiregistration_APIService(in *APIService, o
|
|||
}
|
||||
|
||||
func autoConvert_apiregistration_APIService_To_v1alpha1_APIService(in *apiregistration.APIService, out *APIService, s conversion.Scope) error {
|
||||
// TODO: Inefficient conversion - can we improve it?
|
||||
if err := s.Convert(&in.ObjectMeta, &out.ObjectMeta, 0); err != nil {
|
||||
return err
|
||||
}
|
||||
out.ObjectMeta = in.ObjectMeta
|
||||
if err := Convert_apiregistration_APIServiceSpec_To_v1alpha1_APIServiceSpec(&in.Spec, &out.Spec, s); err != nil {
|
||||
return err
|
||||
}
|
||||
|
|
|
@ -21,9 +21,9 @@ limitations under the License.
|
|||
package v1alpha1
|
||||
|
||||
import (
|
||||
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
conversion "k8s.io/apimachinery/pkg/conversion"
|
||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||
v1 "k8s.io/kubernetes/pkg/api/v1"
|
||||
reflect "reflect"
|
||||
)
|
||||
|
||||
|
@ -48,8 +48,10 @@ func DeepCopy_v1alpha1_APIService(in interface{}, out interface{}, c *conversion
|
|||
in := in.(*APIService)
|
||||
out := out.(*APIService)
|
||||
*out = *in
|
||||
if err := v1.DeepCopy_v1_ObjectMeta(&in.ObjectMeta, &out.ObjectMeta, c); err != nil {
|
||||
if newVal, err := c.DeepCopy(&in.ObjectMeta); err != nil {
|
||||
return err
|
||||
} else {
|
||||
out.ObjectMeta = *newVal.(*v1.ObjectMeta)
|
||||
}
|
||||
if err := DeepCopy_v1alpha1_APIServiceSpec(&in.Spec, &out.Spec, c); err != nil {
|
||||
return err
|
||||
|
|
|
@ -21,9 +21,9 @@ limitations under the License.
|
|||
package apiregistration
|
||||
|
||||
import (
|
||||
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
conversion "k8s.io/apimachinery/pkg/conversion"
|
||||
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||
api "k8s.io/kubernetes/pkg/api"
|
||||
reflect "reflect"
|
||||
)
|
||||
|
||||
|
@ -48,8 +48,10 @@ func DeepCopy_apiregistration_APIService(in interface{}, out interface{}, c *con
|
|||
in := in.(*APIService)
|
||||
out := out.(*APIService)
|
||||
*out = *in
|
||||
if err := api.DeepCopy_api_ObjectMeta(&in.ObjectMeta, &out.ObjectMeta, c); err != nil {
|
||||
if newVal, err := c.DeepCopy(&in.ObjectMeta); err != nil {
|
||||
return err
|
||||
} else {
|
||||
out.ObjectMeta = *newVal.(*v1.ObjectMeta)
|
||||
}
|
||||
if err := DeepCopy_apiregistration_APIServiceSpec(&in.Spec, &out.Spec, c); err != nil {
|
||||
return err
|
||||
|
|
97
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/BUILD
generated
vendored
97
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/BUILD
generated
vendored
|
@ -8,54 +8,6 @@ load(
|
|||
"go_test",
|
||||
)
|
||||
|
||||
go_library(
|
||||
name = "go_default_library",
|
||||
srcs = [
|
||||
"apiserver.go",
|
||||
"apiservice_controller.go",
|
||||
"handler_apis.go",
|
||||
"handler_proxy.go",
|
||||
],
|
||||
tags = ["automanaged"],
|
||||
deps = [
|
||||
"//cmd/kube-aggregator/pkg/apis/apiregistration:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/apis/apiregistration/v1alpha1:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/clientset_generated/clientset:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/clientset_generated/internalclientset:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/informers:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/informers/apiregistration/internalversion:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/listers/apiregistration/internalversion:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/registry/apiservice/etcd:go_default_library",
|
||||
"//pkg/api:go_default_library",
|
||||
"//pkg/auth/handlers:go_default_library",
|
||||
"//pkg/client/cache:go_default_library",
|
||||
"//pkg/client/clientset_generated/clientset:go_default_library",
|
||||
"//pkg/client/informers/informers_generated:go_default_library",
|
||||
"//pkg/client/listers/core/v1:go_default_library",
|
||||
"//pkg/client/restclient:go_default_library",
|
||||
"//pkg/client/transport:go_default_library",
|
||||
"//pkg/controller:go_default_library",
|
||||
"//pkg/genericapiserver:go_default_library",
|
||||
"//pkg/genericapiserver/api/filters:go_default_library",
|
||||
"//pkg/genericapiserver/api/handlers/responsewriters:go_default_library",
|
||||
"//pkg/genericapiserver/api/rest:go_default_library",
|
||||
"//pkg/genericapiserver/filters:go_default_library",
|
||||
"//pkg/registry/generic:go_default_library",
|
||||
"//pkg/registry/generic/rest:go_default_library",
|
||||
"//pkg/util/httpstream/spdy:go_default_library",
|
||||
"//pkg/util/workqueue:go_default_library",
|
||||
"//pkg/version:go_default_library",
|
||||
"//vendor:github.com/golang/glog",
|
||||
"//vendor:k8s.io/apimachinery/pkg/api/errors",
|
||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
||||
"//vendor:k8s.io/apimachinery/pkg/labels",
|
||||
"//vendor:k8s.io/apimachinery/pkg/runtime",
|
||||
"//vendor:k8s.io/apimachinery/pkg/util/runtime",
|
||||
"//vendor:k8s.io/apimachinery/pkg/util/wait",
|
||||
"//vendor:k8s.io/apiserver/pkg/request",
|
||||
],
|
||||
)
|
||||
|
||||
go_test(
|
||||
name = "go_default_test",
|
||||
srcs = [
|
||||
|
@ -76,7 +28,54 @@ go_test(
|
|||
"//vendor:k8s.io/apimachinery/pkg/util/diff",
|
||||
"//vendor:k8s.io/apimachinery/pkg/util/sets",
|
||||
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
||||
"//vendor:k8s.io/apiserver/pkg/request",
|
||||
"//vendor:k8s.io/apiserver/pkg/endpoints/request",
|
||||
],
|
||||
)
|
||||
|
||||
go_library(
|
||||
name = "go_default_library",
|
||||
srcs = [
|
||||
"apiserver.go",
|
||||
"apiservice_controller.go",
|
||||
"handler_apis.go",
|
||||
"handler_proxy.go",
|
||||
],
|
||||
tags = ["automanaged"],
|
||||
deps = [
|
||||
"//cmd/kube-aggregator/pkg/apis/apiregistration:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/apis/apiregistration/v1alpha1:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/clientset_generated/clientset:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/clientset_generated/internalclientset:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/informers:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/informers/apiregistration/internalversion:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/client/listers/apiregistration/internalversion:go_default_library",
|
||||
"//cmd/kube-aggregator/pkg/registry/apiservice/etcd:go_default_library",
|
||||
"//pkg/api:go_default_library",
|
||||
"//pkg/client/cache:go_default_library",
|
||||
"//pkg/client/clientset_generated/clientset:go_default_library",
|
||||
"//pkg/client/informers/informers_generated:go_default_library",
|
||||
"//pkg/client/listers/core/v1:go_default_library",
|
||||
"//pkg/controller:go_default_library",
|
||||
"//pkg/genericapiserver/endpoints/filters:go_default_library",
|
||||
"//pkg/genericapiserver/endpoints/handlers/responsewriters:go_default_library",
|
||||
"//pkg/genericapiserver/registry/generic:go_default_library",
|
||||
"//pkg/genericapiserver/registry/generic/rest:go_default_library",
|
||||
"//pkg/genericapiserver/registry/rest:go_default_library",
|
||||
"//pkg/genericapiserver/server:go_default_library",
|
||||
"//pkg/genericapiserver/server/filters:go_default_library",
|
||||
"//pkg/util/httpstream/spdy:go_default_library",
|
||||
"//pkg/util/workqueue:go_default_library",
|
||||
"//pkg/version:go_default_library",
|
||||
"//vendor:github.com/golang/glog",
|
||||
"//vendor:k8s.io/apimachinery/pkg/api/errors",
|
||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
||||
"//vendor:k8s.io/apimachinery/pkg/labels",
|
||||
"//vendor:k8s.io/apimachinery/pkg/runtime",
|
||||
"//vendor:k8s.io/apimachinery/pkg/util/runtime",
|
||||
"//vendor:k8s.io/apimachinery/pkg/util/wait",
|
||||
"//vendor:k8s.io/apiserver/pkg/endpoints/request",
|
||||
"//vendor:k8s.io/client-go/rest",
|
||||
"//vendor:k8s.io/client-go/transport",
|
||||
],
|
||||
)
|
||||
|
||||
|
|
15
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/apiserver.go
generated
vendored
15
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/apiserver.go
generated
vendored
|
@ -22,16 +22,15 @@ import (
|
|||
"time"
|
||||
|
||||
"k8s.io/apimachinery/pkg/util/wait"
|
||||
genericapirequest "k8s.io/apiserver/pkg/request"
|
||||
authhandlers "k8s.io/kubernetes/pkg/auth/handlers"
|
||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||
kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||
kubeinformers "k8s.io/kubernetes/pkg/client/informers/informers_generated"
|
||||
v1listers "k8s.io/kubernetes/pkg/client/listers/core/v1"
|
||||
"k8s.io/kubernetes/pkg/genericapiserver"
|
||||
genericapifilters "k8s.io/kubernetes/pkg/genericapiserver/api/filters"
|
||||
"k8s.io/kubernetes/pkg/genericapiserver/api/rest"
|
||||
genericfilters "k8s.io/kubernetes/pkg/genericapiserver/filters"
|
||||
"k8s.io/kubernetes/pkg/registry/generic"
|
||||
genericapifilters "k8s.io/kubernetes/pkg/genericapiserver/endpoints/filters"
|
||||
"k8s.io/kubernetes/pkg/genericapiserver/registry/generic"
|
||||
"k8s.io/kubernetes/pkg/genericapiserver/registry/rest"
|
||||
genericapiserver "k8s.io/kubernetes/pkg/genericapiserver/server"
|
||||
genericfilters "k8s.io/kubernetes/pkg/genericapiserver/server/filters"
|
||||
"k8s.io/kubernetes/pkg/version"
|
||||
|
||||
"k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration"
|
||||
|
@ -191,7 +190,7 @@ func (h *handlerChainConfig) handlerChain(apiHandler http.Handler, c *genericapi
|
|||
handler = genericapifilters.WithImpersonation(handler, c.RequestContextMapper, c.Authorizer)
|
||||
// audit to stdout to help with debugging as we get this started
|
||||
handler = genericapifilters.WithAudit(handler, c.RequestContextMapper, os.Stdout)
|
||||
handler = authhandlers.WithAuthentication(handler, c.RequestContextMapper, c.Authenticator, authhandlers.Unauthorized(c.SupportsBasicAuth))
|
||||
handler = genericapifilters.WithAuthentication(handler, c.RequestContextMapper, c.Authenticator, genericapifilters.Unauthorized(c.SupportsBasicAuth))
|
||||
|
||||
handler = genericfilters.WithCORS(handler, c.CorsAllowedOriginList, nil, nil, nil, "true")
|
||||
handler = genericfilters.WithPanicRecovery(handler, c.RequestContextMapper)
|
||||
|
|
2
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/handler_apis.go
generated
vendored
2
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/handler_apis.go
generated
vendored
|
@ -26,7 +26,7 @@ import (
|
|||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
v1listers "k8s.io/kubernetes/pkg/client/listers/core/v1"
|
||||
"k8s.io/kubernetes/pkg/genericapiserver/api/handlers/responsewriters"
|
||||
"k8s.io/kubernetes/pkg/genericapiserver/endpoints/handlers/responsewriters"
|
||||
|
||||
apiregistrationapi "k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration"
|
||||
apiregistrationv1alpha1api "k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration/v1alpha1"
|
||||
|
|
28
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/handler_apis_test.go
generated
vendored
28
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/handler_apis_test.go
generated
vendored
|
@ -111,7 +111,7 @@ func TestAPIs(t *testing.T) {
|
|||
name: "simple add",
|
||||
apiservices: []*apiregistration.APIService{
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.foo"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.foo"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -123,7 +123,7 @@ func TestAPIs(t *testing.T) {
|
|||
},
|
||||
},
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.bar"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.bar"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -172,7 +172,7 @@ func TestAPIs(t *testing.T) {
|
|||
name: "sorting",
|
||||
apiservices: []*apiregistration.APIService{
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.foo"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.foo"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -184,7 +184,7 @@ func TestAPIs(t *testing.T) {
|
|||
},
|
||||
},
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v2.bar"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v2.bar"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -196,7 +196,7 @@ func TestAPIs(t *testing.T) {
|
|||
},
|
||||
},
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v2.foo"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v2.foo"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -208,7 +208,7 @@ func TestAPIs(t *testing.T) {
|
|||
},
|
||||
},
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.bar"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.bar"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -277,9 +277,9 @@ func TestAPIs(t *testing.T) {
|
|||
for _, o := range tc.apiservices {
|
||||
indexer.Add(o)
|
||||
}
|
||||
serviceIndexer.Add(&corev1.Service{ObjectMeta: corev1.ObjectMeta{Namespace: "ns", Name: "api"}})
|
||||
serviceIndexer.Add(&corev1.Service{ObjectMeta: metav1.ObjectMeta{Namespace: "ns", Name: "api"}})
|
||||
endpointsIndexer.Add(&corev1.Endpoints{
|
||||
ObjectMeta: corev1.ObjectMeta{Namespace: "ns", Name: "api"},
|
||||
ObjectMeta: metav1.ObjectMeta{Namespace: "ns", Name: "api"},
|
||||
Subsets: []corev1.EndpointSubset{
|
||||
{Addresses: []corev1.EndpointAddress{{}}},
|
||||
},
|
||||
|
@ -352,7 +352,7 @@ func TestAPIGroup(t *testing.T) {
|
|||
group: "foo",
|
||||
apiservices: []*apiregistration.APIService{
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.foo"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.foo"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -364,7 +364,7 @@ func TestAPIGroup(t *testing.T) {
|
|||
},
|
||||
},
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v2.bar"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v2.bar"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -376,7 +376,7 @@ func TestAPIGroup(t *testing.T) {
|
|||
},
|
||||
},
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v2.foo"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v2.foo"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -388,7 +388,7 @@ func TestAPIGroup(t *testing.T) {
|
|||
},
|
||||
},
|
||||
{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.bar"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.bar"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Service: apiregistration.ServiceReference{
|
||||
Namespace: "ns",
|
||||
|
@ -434,9 +434,9 @@ func TestAPIGroup(t *testing.T) {
|
|||
for _, o := range tc.apiservices {
|
||||
indexer.Add(o)
|
||||
}
|
||||
serviceIndexer.Add(&corev1.Service{ObjectMeta: corev1.ObjectMeta{Namespace: "ns", Name: "api"}})
|
||||
serviceIndexer.Add(&corev1.Service{ObjectMeta: metav1.ObjectMeta{Namespace: "ns", Name: "api"}})
|
||||
endpointsIndexer.Add(&corev1.Endpoints{
|
||||
ObjectMeta: corev1.ObjectMeta{Namespace: "ns", Name: "api"},
|
||||
ObjectMeta: metav1.ObjectMeta{Namespace: "ns", Name: "api"},
|
||||
Subsets: []corev1.EndpointSubset{
|
||||
{Addresses: []corev1.EndpointAddress{{}}},
|
||||
},
|
||||
|
|
10
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/handler_proxy.go
generated
vendored
10
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/handler_proxy.go
generated
vendored
|
@ -22,11 +22,11 @@ import (
|
|||
"sync"
|
||||
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
genericapirequest "k8s.io/apiserver/pkg/request"
|
||||
"k8s.io/kubernetes/pkg/client/restclient"
|
||||
"k8s.io/kubernetes/pkg/client/transport"
|
||||
"k8s.io/kubernetes/pkg/genericapiserver/api/handlers/responsewriters"
|
||||
genericrest "k8s.io/kubernetes/pkg/registry/generic/rest"
|
||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||
restclient "k8s.io/client-go/rest"
|
||||
"k8s.io/client-go/transport"
|
||||
"k8s.io/kubernetes/pkg/genericapiserver/endpoints/handlers/responsewriters"
|
||||
genericrest "k8s.io/kubernetes/pkg/genericapiserver/registry/generic/rest"
|
||||
"k8s.io/kubernetes/pkg/util/httpstream/spdy"
|
||||
|
||||
apiregistrationapi "k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration"
|
||||
|
|
10
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/handler_proxy_test.go
generated
vendored
10
vendor/k8s.io/kubernetes/cmd/kube-aggregator/pkg/apiserver/handler_proxy_test.go
generated
vendored
|
@ -25,10 +25,10 @@ import (
|
|||
"strings"
|
||||
"testing"
|
||||
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/util/sets"
|
||||
"k8s.io/apiserver/pkg/authentication/user"
|
||||
genericapirequest "k8s.io/apiserver/pkg/request"
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||
|
||||
"k8s.io/kubernetes/cmd/kube-aggregator/pkg/apis/apiregistration"
|
||||
)
|
||||
|
@ -103,7 +103,7 @@ func TestProxyHandler(t *testing.T) {
|
|||
},
|
||||
"no user": {
|
||||
apiService: &apiregistration.APIService{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.foo"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.foo"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Group: "foo",
|
||||
Version: "v1",
|
||||
|
@ -119,7 +119,7 @@ func TestProxyHandler(t *testing.T) {
|
|||
},
|
||||
path: "/request/path",
|
||||
apiService: &apiregistration.APIService{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.foo"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.foo"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Group: "foo",
|
||||
Version: "v1",
|
||||
|
@ -144,7 +144,7 @@ func TestProxyHandler(t *testing.T) {
|
|||
},
|
||||
path: "/request/path",
|
||||
apiService: &apiregistration.APIService{
|
||||
ObjectMeta: api.ObjectMeta{Name: "v1.foo"},
|
||||
ObjectMeta: metav1.ObjectMeta{Name: "v1.foo"},
|
||||
Spec: apiregistration.APIServiceSpec{
|
||||
Group: "foo",
|
||||
Version: "v1",
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue