diff --git a/staging/src/k8s.io/kube-apiextensions-server/artifacts/customresource-01/noxu-resource-definition.yaml b/staging/src/k8s.io/kube-apiextensions-server/artifacts/customresource-01/noxu-resource-definition.yaml new file mode 100644 index 00000000000..538cbe0ca31 --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/artifacts/customresource-01/noxu-resource-definition.yaml @@ -0,0 +1,12 @@ +apiVersion: apiextensions.k8s.io/v1alpha1 +kind: CustomResource +metadata: + name: noxus.mygroup.example.com +spec: + group: mygroup.example.com + version: v1alpha1 + names: + name: noxus + singular: noxu + kind: Noxu + listKind: NoxuList \ No newline at end of file diff --git a/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/apiservice.yaml b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/apiservice.yaml new file mode 100644 index 00000000000..3ede9152ac6 --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/apiservice.yaml @@ -0,0 +1,12 @@ +apiVersion: apiregistration.k8s.io/v1alpha1 +kind: APIService +metadata: + name: v1alpha1.apiextensions.k8s.io +spec: + insecureSkipTLSVerify: true + group: apiextensions.k8s.io + priority: 100 + service: + name: api + namespace: kube-apiextensions + version: v1alpha1 diff --git a/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/auth-delegator.yaml b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/auth-delegator.yaml new file mode 100644 index 00000000000..e9337f2aa27 --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/auth-delegator.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1alpha1 +kind: ClusterRoleBinding +metadata: + name: apiextensions:system:auth-delegator +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:auth-delegator +subjects: +- apiVersion: v1 + kind: ServiceAccount + name: apiserver + namespace: kube-apiextensions diff --git a/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/auth-reader.yaml b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/auth-reader.yaml new file mode 100644 index 00000000000..a0e0998c765 --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/auth-reader.yaml @@ -0,0 +1,14 @@ +apiVersion: rbac.authorization.k8s.io/v1alpha1 +kind: RoleBinding +metadata: + name: apiextensions-auth-reader + namespace: kube-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: extension-apiserver-authentication-reader +subjects: +- apiVersion: v1 + kind: ServiceAccount + name: apiserver + namespace: kube-apiextensions diff --git a/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/rc.yaml b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/rc.yaml new file mode 100644 index 00000000000..026c05acd35 --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/rc.yaml @@ -0,0 +1,26 @@ +apiVersion: v1 +kind: ReplicationController +metadata: + name: apiextensions-server + namespace: kube-apiextensions + labels: + apiserver: "true" +spec: + replicas: 1 + selector: + apiserver: "true" + template: + metadata: + labels: + apiserver: "true" + spec: + serviceAccountName: apiserver + containers: + - name: apiextensions-server + image: kube-apiextensions-server:latest + imagePullPolicy: Never + args: + - "--etcd-servers=http://localhost:2379" + - "--audit-log-path=-" + - name: etcd + image: quay.io/coreos/etcd:v3.0.17 diff --git a/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/sa.yaml b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/sa.yaml new file mode 100644 index 00000000000..1fc4ca9f0b0 --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/sa.yaml @@ -0,0 +1,5 @@ +kind: ServiceAccount +apiVersion: v1 +metadata: + name: apiserver + namespace: kube-apiextensions diff --git a/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/service.yaml b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/service.yaml new file mode 100644 index 00000000000..9749b888321 --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/artifacts/example/service.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +kind: Service +metadata: + name: api + namespace: kube-apiextensions +spec: + ports: + - port: 443 + protocol: TCP + targetPort: 443 + selector: + apiserver: "true" diff --git a/staging/src/k8s.io/kube-apiextensions-server/artifacts/simple-image/Dockerfile b/staging/src/k8s.io/kube-apiextensions-server/artifacts/simple-image/Dockerfile new file mode 100644 index 00000000000..0d782024f19 --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/artifacts/simple-image/Dockerfile @@ -0,0 +1,17 @@ +# Copyright 2017 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +FROM fedora +ADD kube-apiextensions-server / +ENTRYPOINT ["/kube-apiextensions-server"] diff --git a/staging/src/k8s.io/kube-apiextensions-server/hack/build-image.sh b/staging/src/k8s.io/kube-apiextensions-server/hack/build-image.sh new file mode 100755 index 00000000000..a388f7ab89c --- /dev/null +++ b/staging/src/k8s.io/kube-apiextensions-server/hack/build-image.sh @@ -0,0 +1,30 @@ +#!/bin/bash + +# Copyright 2017 The Kubernetes Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + + +KUBE_ROOT=$(dirname "${BASH_SOURCE}")/../../../../.. +source "${KUBE_ROOT}/hack/lib/util.sh" + +# Register function to be called on EXIT to remove generated binary. +function cleanup { + rm "${KUBE_ROOT}/vendor/k8s.io/kube-apiextensions-server/artifacts/simple-image/kube-apiextensions-server" +} +trap cleanup EXIT + +pushd "${KUBE_ROOT}/vendor/k8s.io/kube-apiextensions-server" +cp -v ../../../../_output/local/bin/linux/amd64/kube-apiextensions-server ./artifacts/simple-image/kube-apiextensions-server +docker build -t kube-apiextensions-server:latest ./artifacts/simple-image +popd