Vendor: Update k8s version
Signed-off-by: Michał Żyłowski <michal.zylowski@intel.com>
This commit is contained in:
parent
dfa93414c5
commit
52baf68d50
3756 changed files with 113013 additions and 92675 deletions
94
vendor/k8s.io/kubernetes/build/BUILD
generated
vendored
94
vendor/k8s.io/kubernetes/build/BUILD
generated
vendored
|
@ -1,6 +1,22 @@
|
|||
package(default_visibility = ["//visibility:public"])
|
||||
|
||||
load("@bazel_tools//tools/build_defs/docker:docker.bzl", "docker_build")
|
||||
load("@io_bazel//tools/build_defs/docker:docker.bzl", "docker_build")
|
||||
|
||||
filegroup(
|
||||
name = "package-srcs",
|
||||
srcs = glob(["**"]),
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "all-srcs",
|
||||
srcs = [
|
||||
":package-srcs",
|
||||
"//build/debs:all-srcs",
|
||||
"//build/release-tars:all-srcs",
|
||||
],
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
docker_build(
|
||||
name = "busybox",
|
||||
|
@ -34,43 +50,59 @@ docker_build(
|
|||
],
|
||||
)
|
||||
|
||||
DOCKERIZED_BINARIES = {
|
||||
"kube-apiserver": {
|
||||
"base": ":busybox-libc",
|
||||
"target": "//cmd/kube-apiserver:kube-apiserver",
|
||||
},
|
||||
"kube-controller-manager": {
|
||||
"base": ":busybox-libc",
|
||||
"target": "//cmd/kube-controller-manager:kube-controller-manager",
|
||||
},
|
||||
"kube-scheduler": {
|
||||
"base": ":busybox-libc",
|
||||
"target": "//plugin/cmd/kube-scheduler:kube-scheduler",
|
||||
},
|
||||
"kube-aggregator": {
|
||||
"base": ":busybox-libc",
|
||||
"target": "//cmd/kube-aggregator:kube-aggregator",
|
||||
},
|
||||
"kube-proxy": {
|
||||
"base": ":busybox-net",
|
||||
"target": "//cmd/kube-proxy:kube-proxy",
|
||||
},
|
||||
}
|
||||
|
||||
[genrule(
|
||||
name = binary + "_docker_tag",
|
||||
srcs = [meta["target"]],
|
||||
outs = [binary + ".docker_tag"],
|
||||
# Currently each target has two outputs, the binary and its library, so hash only the first item (the binary).
|
||||
# This can be made less hacky when we have static linking working.
|
||||
cmd = "md5sum $(locations " + meta["target"] + ") | grep '" + binary + "'$$ | cut -f1 -d' ' | tr -d '\n' > $@",
|
||||
) for binary, meta in DOCKERIZED_BINARIES.items()]
|
||||
|
||||
[docker_build(
|
||||
name = binary,
|
||||
base = ":busybox-libc",
|
||||
base = meta["base"],
|
||||
cmd = ["/usr/bin/" + binary],
|
||||
debs = [
|
||||
"//build/debs:%s.deb" % binary,
|
||||
],
|
||||
repository = "gcr.io/google-containers",
|
||||
) for binary in [
|
||||
"kube-apiserver",
|
||||
"kube-controller-manager",
|
||||
"kube-scheduler",
|
||||
"kube-aggregator",
|
||||
]]
|
||||
|
||||
docker_build(
|
||||
name = "kube-proxy",
|
||||
base = ":busybox-net",
|
||||
cmd = ["/usr/bin/kube-proxy"],
|
||||
debs = [
|
||||
"//build/debs:kube-proxy.deb",
|
||||
image_tags = [
|
||||
"@%s.docker_tag" % binary,
|
||||
],
|
||||
repository = "gcr.io/google-containers",
|
||||
)
|
||||
repository = "gcr.io/google_containers/" + binary,
|
||||
repository_append_package = False,
|
||||
symlinks = {
|
||||
# Some cluster startup scripts expect to find the binaries in /usr/local/bin,
|
||||
# but the debs install the binaries into /usr/bin.
|
||||
"/usr/local/bin/" + binary: "/usr/bin/" + binary,
|
||||
},
|
||||
) for binary, meta in DOCKERIZED_BINARIES.items()]
|
||||
|
||||
filegroup(
|
||||
name = "package-srcs",
|
||||
srcs = glob(["**"]),
|
||||
tags = ["automanaged"],
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "all-srcs",
|
||||
srcs = [
|
||||
":package-srcs",
|
||||
"//build/debs:all-srcs",
|
||||
],
|
||||
tags = ["automanaged"],
|
||||
name = "docker-artifacts",
|
||||
srcs = [":%s.tar" % binary for binary in DOCKERIZED_BINARIES.keys()] +
|
||||
[":%s.docker_tag" % binary for binary in DOCKERIZED_BINARIES.keys()],
|
||||
)
|
||||
|
|
8
vendor/k8s.io/kubernetes/build/OWNERS
generated
vendored
8
vendor/k8s.io/kubernetes/build/OWNERS
generated
vendored
|
@ -1,4 +1,10 @@
|
|||
assignees:
|
||||
reviewers:
|
||||
- ihmccreery
|
||||
- ixdy
|
||||
- jbeda
|
||||
- lavalamp
|
||||
- zmerlynn
|
||||
approvers:
|
||||
- ihmccreery
|
||||
- ixdy
|
||||
- jbeda
|
||||
|
|
43
vendor/k8s.io/kubernetes/build/lib/release.sh
generated
vendored
43
vendor/k8s.io/kubernetes/build/lib/release.sh
generated
vendored
|
@ -356,34 +356,37 @@ function kube::release::package_salt_tarball() {
|
|||
function kube::release::package_kube_manifests_tarball() {
|
||||
kube::log::status "Building tarball: manifests"
|
||||
|
||||
local salt_dir="${KUBE_ROOT}/cluster/saltbase/salt"
|
||||
|
||||
local release_stage="${RELEASE_STAGE}/manifests/kubernetes"
|
||||
rm -rf "${release_stage}"
|
||||
local dst_dir="${release_stage}/gci-trusty"
|
||||
mkdir -p "${dst_dir}"
|
||||
|
||||
local salt_dir="${KUBE_ROOT}/cluster/saltbase/salt"
|
||||
cp "${salt_dir}/cluster-autoscaler/cluster-autoscaler.manifest" "${dst_dir}/"
|
||||
mkdir -p "${release_stage}"
|
||||
cp "${salt_dir}/fluentd-gcp/fluentd-gcp.yaml" "${release_stage}/"
|
||||
cp "${salt_dir}/kube-registry-proxy/kube-registry-proxy.yaml" "${release_stage}/"
|
||||
cp "${salt_dir}/kube-proxy/kube-proxy.manifest" "${release_stage}/"
|
||||
cp "${salt_dir}/etcd/etcd.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-scheduler/kube-scheduler.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-apiserver/kube-apiserver.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-apiserver/abac-authz-policy.jsonl" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-controller-manager/kube-controller-manager.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/kube-addons/kube-addon-manager.yaml" "${dst_dir}"
|
||||
cp "${salt_dir}/l7-gcp/glbc.manifest" "${dst_dir}"
|
||||
cp "${salt_dir}/rescheduler/rescheduler.manifest" "${dst_dir}/"
|
||||
cp "${salt_dir}/e2e-image-puller/e2e-image-puller.manifest" "${dst_dir}/"
|
||||
cp "${KUBE_ROOT}/cluster/gce/trusty/configure-helper.sh" "${dst_dir}/trusty-configure-helper.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/configure-helper.sh" "${dst_dir}/gci-configure-helper.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/mounter/mounter" "${dst_dir}/gci-mounter"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/health-monitor.sh" "${dst_dir}/health-monitor.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/container-linux/configure-helper.sh" "${dst_dir}/container-linux-configure-helper.sh"
|
||||
cp -r "${salt_dir}/kube-admission-controls/limit-range" "${dst_dir}"
|
||||
|
||||
local gci_dst_dir="${release_stage}/gci-trusty"
|
||||
mkdir -p "${gci_dst_dir}"
|
||||
cp "${salt_dir}/cluster-autoscaler/cluster-autoscaler.manifest" "${gci_dst_dir}/"
|
||||
cp "${salt_dir}/etcd/etcd.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-scheduler/kube-scheduler.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-apiserver/kube-apiserver.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-apiserver/abac-authz-policy.jsonl" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-controller-manager/kube-controller-manager.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/kube-addons/kube-addon-manager.yaml" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/l7-gcp/glbc.manifest" "${gci_dst_dir}"
|
||||
cp "${salt_dir}/rescheduler/rescheduler.manifest" "${gci_dst_dir}/"
|
||||
cp "${salt_dir}/e2e-image-puller/e2e-image-puller.manifest" "${gci_dst_dir}/"
|
||||
cp "${KUBE_ROOT}/cluster/gce/trusty/configure-helper.sh" "${gci_dst_dir}/trusty-configure-helper.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/configure-helper.sh" "${gci_dst_dir}/gci-configure-helper.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/mounter/mounter" "${gci_dst_dir}/gci-mounter"
|
||||
cp "${KUBE_ROOT}/cluster/gce/gci/health-monitor.sh" "${gci_dst_dir}/health-monitor.sh"
|
||||
cp "${KUBE_ROOT}/cluster/gce/container-linux/configure-helper.sh" "${gci_dst_dir}/container-linux-configure-helper.sh"
|
||||
cp -r "${salt_dir}/kube-admission-controls/limit-range" "${gci_dst_dir}"
|
||||
local objects
|
||||
objects=$(cd "${KUBE_ROOT}/cluster/addons" && find . \( -name \*.yaml -or -name \*.yaml.in -or -name \*.json \) | grep -v demo)
|
||||
tar c -C "${KUBE_ROOT}/cluster/addons" ${objects} | tar x -C "${dst_dir}"
|
||||
tar c -C "${KUBE_ROOT}/cluster/addons" ${objects} | tar x -C "${gci_dst_dir}"
|
||||
|
||||
kube::release::clean_cruft
|
||||
|
||||
|
|
15
vendor/k8s.io/kubernetes/build/pause/Makefile
generated
vendored
15
vendor/k8s.io/kubernetes/build/pause/Makefile
generated
vendored
|
@ -12,7 +12,7 @@
|
|||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
.PHONY: all push push-legacy container clean
|
||||
.PHONY: all push push-legacy container clean orphan
|
||||
|
||||
REGISTRY ?= gcr.io/google_containers
|
||||
IMAGE = $(REGISTRY)/pause-$(ARCH)
|
||||
|
@ -25,7 +25,7 @@ ARCH ?= amd64
|
|||
|
||||
ALL_ARCH = amd64 arm arm64 ppc64le s390x
|
||||
|
||||
CFLAGS = -Os -Wall -static
|
||||
CFLAGS = -Os -Wall -Werror -static
|
||||
KUBE_CROSS_IMAGE ?= gcr.io/google_containers/kube-cross
|
||||
KUBE_CROSS_VERSION ?= $(shell cat ../build-image/cross/VERSION)
|
||||
|
||||
|
@ -97,5 +97,16 @@ ifeq ($(ARCH),amd64)
|
|||
endif
|
||||
touch $@
|
||||
|
||||
# Useful for testing, not automatically included in container image
|
||||
orphan: bin/orphan-$(ARCH)
|
||||
bin/orphan-$(ARCH): orphan.c
|
||||
mkdir -p bin
|
||||
docker run -u $$(id -u):$$(id -g) -v $$(pwd):/build \
|
||||
$(KUBE_CROSS_IMAGE):$(KUBE_CROSS_VERSION) \
|
||||
/bin/bash -c "\
|
||||
cd /build && \
|
||||
$(TRIPLE)-gcc $(CFLAGS) -o $@ $^ && \
|
||||
$(TRIPLE)-strip $@"
|
||||
|
||||
clean:
|
||||
rm -rf .container-* .push-* bin/
|
||||
|
|
36
vendor/k8s.io/kubernetes/build/pause/orphan.c
generated
vendored
Normal file
36
vendor/k8s.io/kubernetes/build/pause/orphan.c
generated
vendored
Normal file
|
@ -0,0 +1,36 @@
|
|||
/*
|
||||
Copyright 2016 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
/* Creates a zombie to be reaped by init. Useful for testing. */
|
||||
|
||||
#include <stdio.h>
|
||||
#include <unistd.h>
|
||||
|
||||
int main() {
|
||||
pid_t pid;
|
||||
pid = fork();
|
||||
if (pid == 0) {
|
||||
while (getppid() > 1)
|
||||
;
|
||||
printf("Child exiting: pid=%d ppid=%d\n", getpid(), getppid());
|
||||
return 0;
|
||||
} else if (pid > 0) {
|
||||
printf("Parent exiting: pid=%d ppid=%d\n", getpid(), getppid());
|
||||
return 0;
|
||||
}
|
||||
perror("Could not create child");
|
||||
return 1;
|
||||
}
|
36
vendor/k8s.io/kubernetes/build/pause/pause.c
generated
vendored
36
vendor/k8s.io/kubernetes/build/pause/pause.c
generated
vendored
|
@ -17,20 +17,36 @@ limitations under the License.
|
|||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/wait.h>
|
||||
#include <unistd.h>
|
||||
|
||||
static void sigdown(int signo) {
|
||||
psignal(signo, "shutting down, got signal");
|
||||
exit(0);
|
||||
psignal(signo, "Shutting down, got signal");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
static void sigreap(int signo) {
|
||||
while (waitpid(-1, NULL, WNOHANG) > 0)
|
||||
;
|
||||
}
|
||||
|
||||
int main() {
|
||||
if (signal(SIGINT, sigdown) == SIG_ERR)
|
||||
return 1;
|
||||
if (signal(SIGTERM, sigdown) == SIG_ERR)
|
||||
return 2;
|
||||
signal(SIGKILL, sigdown);
|
||||
for (;;) pause();
|
||||
fprintf(stderr, "error: infinite loop terminated\n");
|
||||
return 42;
|
||||
if (getpid() != 1)
|
||||
/* Not an error because pause sees use outside of infra containers. */
|
||||
fprintf(stderr, "Warning: pause should be the first process in a pod\n");
|
||||
|
||||
if (sigaction(SIGINT, &(struct sigaction){.sa_handler = sigdown}, NULL) < 0)
|
||||
return 1;
|
||||
if (sigaction(SIGTERM, &(struct sigaction){.sa_handler = sigdown}, NULL) < 0)
|
||||
return 2;
|
||||
if (sigaction(SIGCHLD, &(struct sigaction){.sa_handler = sigreap,
|
||||
.sa_flags = SA_NOCLDSTOP},
|
||||
NULL) < 0)
|
||||
return 3;
|
||||
|
||||
for (;;)
|
||||
pause();
|
||||
fprintf(stderr, "Error: infinite loop terminated\n");
|
||||
return 42;
|
||||
}
|
||||
|
|
261
vendor/k8s.io/kubernetes/build/release-tars/BUILD
generated
vendored
Normal file
261
vendor/k8s.io/kubernetes/build/release-tars/BUILD
generated
vendored
Normal file
|
@ -0,0 +1,261 @@
|
|||
package(default_visibility = ["//visibility:public"])
|
||||
|
||||
load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar")
|
||||
|
||||
filegroup(
|
||||
name = "package-srcs",
|
||||
srcs = glob(["**"]),
|
||||
tags = ["automanaged"],
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "all-srcs",
|
||||
srcs = [":package-srcs"],
|
||||
tags = ["automanaged"],
|
||||
)
|
||||
|
||||
config_setting(
|
||||
name = "embed_license_targets",
|
||||
values = {
|
||||
"define": "EMBED_LICENSE_TARGETS=true",
|
||||
},
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-src",
|
||||
extension = "tar.gz",
|
||||
files = [
|
||||
"//:all-srcs",
|
||||
],
|
||||
package_dir = "kubernetes",
|
||||
strip_prefix = "//",
|
||||
)
|
||||
|
||||
# FIXME: this should be configurable/auto-detected
|
||||
PLATFORM_ARCH_STRING = "linux-amd64"
|
||||
|
||||
# KUBE_CLIENT_TARGETS
|
||||
CLIENT_TARGETS = [
|
||||
"//cmd/kubectl",
|
||||
"//federation/cmd/kubefed",
|
||||
]
|
||||
|
||||
# KUBE_NODE_TARGETS
|
||||
NODE_TARGETS = [
|
||||
"//cmd/kube-proxy",
|
||||
"//cmd/kubelet",
|
||||
]
|
||||
|
||||
# KUBE_SERVER_TARGETS
|
||||
# No need to duplicate CLIENT_TARGETS or NODE_TARGETS here,
|
||||
# since we include them in the actual build rule.
|
||||
SERVER_TARGETS = [
|
||||
"//cmd/hyperkube",
|
||||
"//cmd/kube-aggregator",
|
||||
"//cmd/kube-apiserver",
|
||||
"//cmd/kube-controller-manager",
|
||||
"//cmd/kube-discovery",
|
||||
"//cmd/kubeadm",
|
||||
"//plugin/cmd/kube-scheduler",
|
||||
]
|
||||
|
||||
# kube::golang::test_targets
|
||||
TEST_BINARY_TARGETS = [
|
||||
"//cmd/gendocs",
|
||||
"//cmd/genkubedocs",
|
||||
"//cmd/genman",
|
||||
"//cmd/genswaggertypedocs",
|
||||
"//cmd/genyaml",
|
||||
"//cmd/linkcheck",
|
||||
"//cmd/mungedocs",
|
||||
"//examples/k8petstore/web-server/src",
|
||||
"//federation/cmd/genfeddocs",
|
||||
"//test/e2e:e2e.test",
|
||||
"//vendor:github.com/onsi/ginkgo/ginkgo_bin",
|
||||
"//cmd/kubemark", # TODO: server platforms only
|
||||
"//test/e2e_node:e2e_node.test", # TODO: server platforms only
|
||||
]
|
||||
|
||||
TEST_PORTABLE_TARGETS = [
|
||||
"//federation/develop:all-srcs",
|
||||
"//hack:e2e.go",
|
||||
"//hack:federated-ginkgo-e2e.sh",
|
||||
"//hack:get-build.sh",
|
||||
"//hack:ginkgo-e2e.sh",
|
||||
"//hack/e2e-internal:all-srcs",
|
||||
"//hack/lib:all-srcs",
|
||||
"//test/e2e/testing-manifests:all-srcs",
|
||||
"//test/kubemark:all-srcs",
|
||||
]
|
||||
|
||||
# Included in node and server tarballs.
|
||||
LICENSE_TARGETS = [
|
||||
"//:Godeps/LICENSES",
|
||||
":kubernetes-src.tar.gz",
|
||||
]
|
||||
|
||||
pkg_tar(
|
||||
name = "_client-bin",
|
||||
files = CLIENT_TARGETS,
|
||||
mode = "0755",
|
||||
package_dir = "client/bin",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-client-%s" % PLATFORM_ARCH_STRING,
|
||||
extension = "tar.gz",
|
||||
package_dir = "kubernetes",
|
||||
deps = [
|
||||
":_client-bin",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_node-bin",
|
||||
files = NODE_TARGETS + CLIENT_TARGETS,
|
||||
mode = "0755",
|
||||
package_dir = "node/bin",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-node-%s" % PLATFORM_ARCH_STRING,
|
||||
extension = "tar.gz",
|
||||
files = select({
|
||||
":embed_license_targets": LICENSE_TARGETS,
|
||||
"//conditions:default": [],
|
||||
}),
|
||||
mode = "0644",
|
||||
package_dir = "kubernetes",
|
||||
deps = [
|
||||
":_node-bin",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_server-bin",
|
||||
files = SERVER_TARGETS + NODE_TARGETS + CLIENT_TARGETS + [
|
||||
"//build:docker-artifacts",
|
||||
],
|
||||
mode = "0755",
|
||||
package_dir = "server/bin",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
genrule(
|
||||
name = "dummy",
|
||||
outs = [".dummy"],
|
||||
cmd = "touch $@",
|
||||
)
|
||||
|
||||
# Some of the startup scripts fail if there isn't an addons/ directory in the server tarball.
|
||||
pkg_tar(
|
||||
name = "_server-addons",
|
||||
files = [
|
||||
":.dummy",
|
||||
],
|
||||
package_dir = "addons",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-server-%s" % PLATFORM_ARCH_STRING,
|
||||
extension = "tar.gz",
|
||||
files = select({
|
||||
":embed_license_targets": LICENSE_TARGETS,
|
||||
"//conditions:default": [],
|
||||
}),
|
||||
mode = "0644",
|
||||
package_dir = "kubernetes",
|
||||
deps = [
|
||||
":_server-addons",
|
||||
":_server-bin",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_test-bin",
|
||||
files = TEST_BINARY_TARGETS,
|
||||
mode = "0755",
|
||||
package_dir = "platforms/" + PLATFORM_ARCH_STRING.replace("-", "/"),
|
||||
# TODO: how to make this multiplatform?
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-test",
|
||||
extension = "tar.gz",
|
||||
files = TEST_PORTABLE_TARGETS,
|
||||
package_dir = "kubernetes",
|
||||
strip_prefix = "//",
|
||||
deps = [
|
||||
# TODO: how to make this multiplatform?
|
||||
":_test-bin",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "_full_server",
|
||||
files = [
|
||||
":kubernetes-manifests.tar.gz",
|
||||
":kubernetes-salt.tar.gz",
|
||||
],
|
||||
package_dir = "server",
|
||||
visibility = ["//visibility:private"],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes",
|
||||
extension = "tar.gz",
|
||||
files = [
|
||||
# TODO: the version file
|
||||
"//:README.md",
|
||||
"//:Vagrantfile",
|
||||
"//cluster:all-srcs",
|
||||
"//docs:all-srcs",
|
||||
"//examples:all-srcs",
|
||||
"//third_party/htpasswd:all-srcs",
|
||||
] + select({
|
||||
":embed_license_targets": ["//:Godeps/LICENSES"],
|
||||
"//conditions:default": [],
|
||||
}),
|
||||
package_dir = "kubernetes",
|
||||
strip_prefix = "//",
|
||||
deps = [
|
||||
":_full_server",
|
||||
"//federation:release",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-manifests",
|
||||
extension = "tar.gz",
|
||||
deps = [
|
||||
"//cluster:manifests",
|
||||
],
|
||||
)
|
||||
|
||||
pkg_tar(
|
||||
name = "kubernetes-salt",
|
||||
extension = "tar.gz",
|
||||
deps = [
|
||||
"//cluster/saltbase:salt",
|
||||
],
|
||||
)
|
||||
|
||||
filegroup(
|
||||
name = "release-tars",
|
||||
srcs = [
|
||||
":kubernetes.tar.gz",
|
||||
":kubernetes-client-%s.tar.gz" % PLATFORM_ARCH_STRING,
|
||||
":kubernetes-node-%s.tar.gz" % PLATFORM_ARCH_STRING,
|
||||
":kubernetes-server-%s.tar.gz" % PLATFORM_ARCH_STRING,
|
||||
":kubernetes-manifests.tar.gz",
|
||||
":kubernetes-salt.tar.gz",
|
||||
":kubernetes-src.tar.gz",
|
||||
":kubernetes-test.tar.gz",
|
||||
],
|
||||
)
|
Loading…
Add table
Add a link
Reference in a new issue