mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-07 03:03:59 +00:00
etcd data
Change-Id: I31c3a1c8fee7f3a681186b934bd7c6b36baee6df
This commit is contained in:
parent
ccbcadb032
commit
46b13d48e2
@ -65,6 +65,7 @@ var resetFieldsStatusData = map[schema.GroupVersionResource]string{
|
|||||||
// standard for []metav1.Condition
|
// standard for []metav1.Condition
|
||||||
gvr("admissionregistration.k8s.io", "v1alpha1", "validatingadmissionpolicies"): `{"status": {"conditions":[{"type":"Accepted","status":"True","lastTransitionTime":"2020-01-01T00:00:00Z","reason":"RuleApplied","message":"Rule was applied"}]}}`,
|
gvr("admissionregistration.k8s.io", "v1alpha1", "validatingadmissionpolicies"): `{"status": {"conditions":[{"type":"Accepted","status":"True","lastTransitionTime":"2020-01-01T00:00:00Z","reason":"RuleApplied","message":"Rule was applied"}]}}`,
|
||||||
gvr("admissionregistration.k8s.io", "v1beta1", "validatingadmissionpolicies"): `{"status": {"conditions":[{"type":"Accepted","status":"True","lastTransitionTime":"2020-01-01T00:00:00Z","reason":"RuleApplied","message":"Rule was applied"}]}}`,
|
gvr("admissionregistration.k8s.io", "v1beta1", "validatingadmissionpolicies"): `{"status": {"conditions":[{"type":"Accepted","status":"True","lastTransitionTime":"2020-01-01T00:00:00Z","reason":"RuleApplied","message":"Rule was applied"}]}}`,
|
||||||
|
gvr("networking.k8s.io", "v1alpha1", "servicecidrs"): `{"status": {"conditions":[{"type":"Accepted","status":"True","lastTransitionTime":"2020-01-01T00:00:00Z","reason":"RuleApplied","message":"Rule was applied"}]}}`,
|
||||||
}
|
}
|
||||||
|
|
||||||
// resetFieldsStatusDefault conflicts with statusDefault
|
// resetFieldsStatusDefault conflicts with statusDefault
|
||||||
@ -81,6 +82,9 @@ var noConflicts = map[string]struct{}{
|
|||||||
// storageVersions are skipped because their spec is empty
|
// storageVersions are skipped because their spec is empty
|
||||||
// and thus they can never have a conflict.
|
// and thus they can never have a conflict.
|
||||||
"storageversions": {},
|
"storageversions": {},
|
||||||
|
// servicecidrs are skipped because their spec is inmutable
|
||||||
|
// and thus they can never have a conflict.
|
||||||
|
"servicecidrs": {},
|
||||||
// namespaces only have a spec.finalizers field which is also skipped,
|
// namespaces only have a spec.finalizers field which is also skipped,
|
||||||
// thus it will never have a conflict.
|
// thus it will never have a conflict.
|
||||||
"namespaces": {},
|
"namespaces": {},
|
||||||
@ -134,6 +138,7 @@ var resetFieldsSpecData = map[schema.GroupVersionResource]string{
|
|||||||
gvr("extensions", "v1beta1", "ingresses"): `{"spec": {"backend": {"serviceName": "service2"}}}`,
|
gvr("extensions", "v1beta1", "ingresses"): `{"spec": {"backend": {"serviceName": "service2"}}}`,
|
||||||
gvr("networking.k8s.io", "v1beta1", "ingresses"): `{"spec": {"backend": {"serviceName": "service2"}}}`,
|
gvr("networking.k8s.io", "v1beta1", "ingresses"): `{"spec": {"backend": {"serviceName": "service2"}}}`,
|
||||||
gvr("networking.k8s.io", "v1", "ingresses"): `{"spec": {"defaultBackend": {"service": {"name": "service2"}}}}`,
|
gvr("networking.k8s.io", "v1", "ingresses"): `{"spec": {"defaultBackend": {"service": {"name": "service2"}}}}`,
|
||||||
|
gvr("networking.k8s.io", "v1alpha1", "servicecidrs"): `{}`,
|
||||||
gvr("policy", "v1", "poddisruptionbudgets"): `{"spec": {"selector": {"matchLabels": {"anokkey2": "anokvalue"}}}}`,
|
gvr("policy", "v1", "poddisruptionbudgets"): `{"spec": {"selector": {"matchLabels": {"anokkey2": "anokvalue"}}}}`,
|
||||||
gvr("policy", "v1beta1", "poddisruptionbudgets"): `{"spec": {"selector": {"matchLabels": {"anokkey2": "anokvalue"}}}}`,
|
gvr("policy", "v1beta1", "poddisruptionbudgets"): `{"spec": {"selector": {"matchLabels": {"anokkey2": "anokvalue"}}}}`,
|
||||||
gvr("storage.k8s.io", "v1alpha1", "volumeattachments"): `{"metadata": {"name": "va3"}, "spec": {"nodeName": "localhost2"}}`,
|
gvr("storage.k8s.io", "v1alpha1", "volumeattachments"): `{"metadata": {"name": "va3"}, "spec": {"nodeName": "localhost2"}}`,
|
||||||
|
@ -210,6 +210,13 @@ func GetEtcdStorageDataForNamespace(namespace string) map[schema.GroupVersionRes
|
|||||||
},
|
},
|
||||||
// --
|
// --
|
||||||
|
|
||||||
|
// k8s.io/kubernetes/pkg/apis/networking/v1alpha1
|
||||||
|
gvr("networking.k8s.io", "v1alpha1", "servicecidrs"): {
|
||||||
|
Stub: `{"metadata": {"name": "range1"}, "spec": {"ipv4": "192.168.0.0/16", "ipv6": "fd00:1::/120"}}`,
|
||||||
|
ExpectedEtcdPath: "/registry/servicecidrs/range1",
|
||||||
|
},
|
||||||
|
// --
|
||||||
|
|
||||||
// k8s.io/kubernetes/pkg/apis/policy/v1
|
// k8s.io/kubernetes/pkg/apis/policy/v1
|
||||||
gvr("policy", "v1", "poddisruptionbudgets"): {
|
gvr("policy", "v1", "poddisruptionbudgets"): {
|
||||||
Stub: `{"metadata": {"name": "pdbv1"}, "spec": {"selector": {"matchLabels": {"anokkey": "anokvalue"}}}}`,
|
Stub: `{"metadata": {"name": "pdbv1"}, "spec": {"selector": {"matchLabels": {"anokkey": "anokvalue"}}}}`,
|
||||||
|
Loading…
Reference in New Issue
Block a user