From aa16d70ca616af0112ae2a6bb25e33a777eb2ae7 Mon Sep 17 00:00:00 2001 From: Sebastiaan van Steenis Date: Tue, 12 Feb 2019 01:03:10 +0100 Subject: [PATCH] Update vendor --- vendor.conf | 2 +- .../management.cattle.io/v3/authz_types.go | 1 + .../management.cattle.io/v3/cluster_types.go | 6 +- .../v3/globaldns_types.go | 10 +- .../management.cattle.io/v3/k8s_defaults.go | 14 +- .../management.cattle.io/v3/logging_types.go | 6 +- .../management.cattle.io/v3/machine_types.go | 6 + .../v3/multi_cluster_app.go | 10 +- .../v3/resource_quota_types.go | 7 + .../apis/management.cattle.io/v3/rke_types.go | 65 +++++++- .../v3/zz_generated_deepcopy.go | 155 +++++++++++++++++- 11 files changed, 263 insertions(+), 19 deletions(-) diff --git a/vendor.conf b/vendor.conf index 2910a275..c583b36d 100644 --- a/vendor.conf +++ b/vendor.conf @@ -28,4 +28,4 @@ github.com/matttproud/golang_protobuf_extensions c12348ce28de40eed0136aa2b644d0e github.com/mattn/go-colorable efa589957cd060542a26d2dd7832fd6a6c6c3ade github.com/mattn/go-isatty 6ca4dbf54d38eea1a992b3c722a76a5d1c4cb25c github.com/rancher/norman 0557aa4ff31a3a0f007dcb1b684894f23cda390c -github.com/rancher/types 68de51b62acfcced8ea1a6acc9f73cae7d7bc425 +github.com/rancher/types 1d346f8e7dcaf5f60f41cc3b52c8a55bb08866f5 diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/authz_types.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/authz_types.go index c0014808..11f1822c 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/authz_types.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/authz_types.go @@ -55,6 +55,7 @@ type ProjectSpec struct { ClusterName string `json:"clusterName,omitempty" norman:"required,type=reference[cluster]"` ResourceQuota *ProjectResourceQuota `json:"resourceQuota,omitempty"` NamespaceDefaultResourceQuota *NamespaceResourceQuota `json:"namespaceDefaultResourceQuota,omitempty"` + ContainerDefaultResourceLimit *ContainerResourceLimit `json:"containerDefaultResourceLimit,omitempty"` EnableProjectMonitoring bool `json:"enableProjectMonitoring" norman:"default=false"` } diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/cluster_types.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/cluster_types.go index 181e4f4f..b5832ba5 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/cluster_types.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/cluster_types.go @@ -221,7 +221,7 @@ type Capabilities struct { } type LoadBalancerCapabilities struct { - Enabled bool `json:"enabled,omitempty"` + Enabled *bool `json:"enabled,omitempty"` Provider string `json:"provider,omitempty"` ProtocolsSupported []string `json:"protocolsSupported,omitempty"` HealthCheckSupported bool `json:"healthCheckSupported,omitempty"` @@ -245,6 +245,10 @@ type RotateCertificateInput struct { Services []string `json:"services,omitempty" norman:"type=enum,options=etcd|kubelet|kube-apiserver|kube-proxy|kube-scheduler|kube-controller-manager"` } +type RotateCertificateOutput struct { + Message string `json:"message,omitempty"` +} + type LocalClusterAuthEndpoint struct { Enabled bool `json:"enabled"` FQDN string `json:"fqdn,omitempty"` diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/globaldns_types.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/globaldns_types.go index 40da967f..34bb9137 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/globaldns_types.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/globaldns_types.go @@ -18,10 +18,10 @@ type GlobalDNS struct { } type GlobalDNSSpec struct { - FQDN string `json:"fqdn,omitempty"` - ProjectNames []string `json:"projectNames" norman:"type=array[reference[project]]"` + FQDN string `json:"fqdn,omitempty" norman:"required"` + ProjectNames []string `json:"projectNames" norman:"type=array[reference[project]],noupdate"` MultiClusterAppName string `json:"multiClusterAppName,omitempty" norman:"type=reference[multiClusterApp]"` - ProviderName string `json:"providerName,omitempty" norman:"type=reference[globalDnsProvider]"` + ProviderName string `json:"providerName,omitempty" norman:"type=reference[globalDnsProvider],required"` Members []Member `json:"members,omitempty"` } @@ -57,3 +57,7 @@ type CloudflareProviderConfig struct { APIKey string `json:"apiKey" norman:"notnullable,required,minLength=1,type=password"` APIEmail string `json:"apiEmail" norman:"notnullable,required,minLength=1"` } + +type UpdateGlobalDNSTargetsInput struct { + ProjectNames []string `json:"projectNames" norman:"type=array[reference[project]]"` +} diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/k8s_defaults.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/k8s_defaults.go index 8c73521c..e419b972 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/k8s_defaults.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/k8s_defaults.go @@ -97,12 +97,12 @@ var ( PipelineSystemImages: projectv3.PipelineSystemImages{ Jenkins: m("rancher/pipeline-jenkins-server:v0.1.0"), JenkinsJnlp: m("jenkins/jnlp-slave:3.10-1-alpine"), - AlpineGit: m("rancher/pipeline-tools:v0.1.4"), + AlpineGit: m("rancher/pipeline-tools:v0.1.8"), PluginsDocker: m("plugins/docker:17.12"), Minio: m("minio/minio:RELEASE.2018-05-25T19-49-13Z"), Registry: m("registry:2"), - RegistryProxy: m("rancher/pipeline-tools:v0.1.4"), - KubeApply: m("rancher/pipeline-tools:v0.1.4"), + RegistryProxy: m("rancher/pipeline-tools:v0.1.8"), + KubeApply: m("rancher/pipeline-tools:v0.1.8"), }, LoggingSystemImages: LoggingSystemImages{ Fluentd: m("rancher/fluentd:v0.1.11"), @@ -624,10 +624,10 @@ var ( "v1.11.6-rancher1-1": { Etcd: m("quay.io/coreos/etcd:v3.2.18"), Kubernetes: m("rancher/hyperkube:v1.11.6-rancher1"), - Alpine: m("rancher/rke-tools:v0.1.18"), - NginxProxy: m("rancher/rke-tools:v0.1.18"), - CertDownloader: m("rancher/rke-tools:v0.1.18"), - KubernetesServicesSidecar: m("rancher/rke-tools:v0.1.18"), + Alpine: m("rancher/rke-tools:v0.1.15"), + NginxProxy: m("rancher/rke-tools:v0.1.15"), + CertDownloader: m("rancher/rke-tools:v0.1.15"), + KubernetesServicesSidecar: m("rancher/rke-tools:v0.1.15"), KubeDNS: m("gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.10"), DNSmasq: m("gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.10"), KubeDNSSidecar: m("gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.10"), diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/logging_types.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/logging_types.go index 4ff8bca6..00975c34 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/logging_types.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/logging_types.go @@ -141,6 +141,7 @@ type SyslogConfig struct { Program string `json:"program,omitempty"` Protocol string `json:"protocol,omitempty" norman:"default=udp,type=enum,options=udp|tcp"` Token string `json:"token,omitempty" norman:"type=password"` + EnableTLS bool `json:"enableTls,omitempty" norman:"default=false"` Certificate string `json:"certificate,omitempty"` ClientCert string `json:"clientCert,omitempty"` ClientKey string `json:"clientKey,omitempty"` @@ -165,7 +166,10 @@ type FluentServer struct { } type CustomTargetConfig struct { - Content string `json:"content,omitempty"` + Content string `json:"content,omitempty"` + Certificate string `json:"certificate,omitempty"` + ClientCert string `json:"clientCert,omitempty"` + ClientKey string `json:"clientKey,omitempty"` } type LoggingSystemImages struct { diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/machine_types.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/machine_types.go index 24fa6a3c..a8ddf968 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/machine_types.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/machine_types.go @@ -302,4 +302,10 @@ type CloudCredential struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` + + Spec CloudCredentialSpec `json:"spec"` +} + +type CloudCredentialSpec struct { + Description string `json:"description,omitempty"` } diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/multi_cluster_app.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/multi_cluster_app.go index 039a45e6..cce6b33c 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/multi_cluster_app.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/multi_cluster_app.go @@ -28,8 +28,9 @@ type MultiClusterApp struct { type MultiClusterAppSpec struct { TemplateVersionName string `json:"templateVersionName,omitempty" norman:"type=reference[templateVersion],required"` Answers []Answer `json:"answers,omitempty"` - Targets []Target `json:"targets,omitempty" norman:"required"` + Targets []Target `json:"targets,omitempty" norman:"required,noupdate"` Members []Member `json:"members,omitempty"` + Roles []string `json:"roles,omitempty" norman:"type=array[reference[roleTemplate]]"` RevisionHistoryLimit int `json:"revisionHistoryLimit,omitempty" norman:"default=10"` UpgradeStrategy UpgradeStrategy `json:"upgradeStrategy,omitempty"` } @@ -56,7 +57,7 @@ type Member struct { UserPrincipalName string `json:"userPrincipalName,omitempty" norman:"type=reference[principal]"` DisplayName string `json:"displayName,omitempty"` GroupPrincipalName string `json:"groupPrincipalName,omitempty" norman:"type=reference[principal]"` - AccessType string `json:"accessType,omitempty" norman:"type=enum,options=all|readonly|update"` + AccessType string `json:"accessType,omitempty" norman:"type=enum,options=owner|member|read-only"` } type UpgradeStrategy struct { @@ -80,3 +81,8 @@ type MultiClusterAppRevision struct { type MultiClusterAppRollbackInput struct { RevisionName string `json:"revisionName,omitempty" norman:"type=reference[multiClusterAppRevision]"` } + +type UpdateMultiClusterAppTargetsInput struct { + Projects []string `json:"projects" norman:"type=array[reference[project]],required"` + Answers []Answer `json:"answers" norman:"type=array[reference[answer]]"` +} diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/resource_quota_types.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/resource_quota_types.go index 586de7ab..1a3545b5 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/resource_quota_types.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/resource_quota_types.go @@ -24,3 +24,10 @@ type ResourceQuotaLimit struct { LimitsCPU string `json:"limitsCpu,omitempty"` LimitsMemory string `json:"limitsMemory,omitempty"` } + +type ContainerResourceLimit struct { + RequestsCPU string `json:"requestsCpu,omitempty"` + RequestsMemory string `json:"requestsMemory,omitempty"` + LimitsCPU string `json:"limitsCpu,omitempty"` + LimitsMemory string `json:"limitsMemory,omitempty"` +} diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/rke_types.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/rke_types.go index 22947064..ec281735 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/rke_types.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/rke_types.go @@ -197,13 +197,13 @@ type ETCDService struct { Key string `yaml:"key" json:"key,omitempty"` // External etcd prefix Path string `yaml:"path" json:"path,omitempty"` - // Etcd Recurring snapshot Service - Snapshot *bool `yaml:"snapshot" json:"snapshot,omitempty" norman:"default=true"` + // Etcd Recurring snapshot Service, used by rke only + Snapshot *bool `yaml:"snapshot" json:"snapshot,omitempty" norman:"default=false"` // Etcd snapshot Retention period Retention string `yaml:"retention" json:"retention,omitempty" norman:"default=72h"` // Etcd snapshot Creation period Creation string `yaml:"creation" json:"creation,omitempty" norman:"default=12h"` - // Backup backend for etcd snapshots, used by rke only + // Backup backend for etcd snapshots BackupConfig *BackupConfig `yaml:"backup_config" json:"backupConfig,omitempty"` } @@ -596,6 +596,65 @@ type AzureCloudProvider struct { // AWSCloudProvider options type AWSCloudProvider struct { + Global GlobalAwsOpts `json:"global" yaml:"global" ini:"Global,omitempty"` + ServiceOverride map[string]ServiceOverride `json:"serviceOverride,omitempty" yaml:"service_override,omitempty" ini:"ServiceOverride,omitempty"` +} + +type ServiceOverride struct { + Service string `json:"service" yaml:"service" ini:"Service,omitempty"` + Region string `json:"region" yaml:"region" ini:"Region,omitempty"` + URL string `json:"url" yaml:"url" ini:"URL,omitempty"` + SigningRegion string `json:"signing-region" yaml:"signing-region" ini:"SigningRegion,omitempty"` + SigningMethod string `json:"signing-method" yaml:"signing-method" ini:"SigningMethod,omitempty"` + SigningName string `json:"signing-name" yaml:"signing-name" ini:"SigningName,omitempty"` +} + +type GlobalAwsOpts struct { + // TODO: Is there any use for this? We can get it from the instance metadata service + // Maybe if we're not running on AWS, e.g. bootstrap; for now it is not very useful + Zone string `json:"zone" yaml:"zone" ini:"Zone,omitempty"` + + // The AWS VPC flag enables the possibility to run the master components + // on a different aws account, on a different cloud provider or on-premises. + // If the flag is set also the KubernetesClusterTag must be provided + VPC string `json:"vpc" yaml:"vpc" ini:"VPC,omitempty"` + // SubnetID enables using a specific subnet to use for ELB's + SubnetID string `json:"subnet-id" yaml:"subnet-id" ini:"SubnetID,omitempty"` + // RouteTableID enables using a specific RouteTable + RouteTableID string `json:"routetable-id" yaml:"routetable-id" ini:"RouteTableID,omitempty"` + + // RoleARN is the IAM role to assume when interaction with AWS APIs. + RoleARN string `json:"role-arn" yaml:"role-arn" ini:"RoleARN,omitempty"` + + // KubernetesClusterTag is the legacy cluster id we'll use to identify our cluster resources + KubernetesClusterTag string `json:"kubernetes-cluster-tag" yaml:"kubernetes-cluster-tag" ini:"KubernetesClusterTag,omitempty"` + // KubernetesClusterID is the cluster id we'll use to identify our cluster resources + KubernetesClusterID string `json:"kubernetes-cluster-id" yaml:"kubernetes-cluster-id" ini:"KubernetesClusterID,omitempty"` + + //The aws provider creates an inbound rule per load balancer on the node security + //group. However, this can run into the AWS security group rule limit of 50 if + //many LoadBalancers are created. + // + //This flag disables the automatic ingress creation. It requires that the user + //has setup a rule that allows inbound traffic on kubelet ports from the + //local VPC subnet (so load balancers can access it). E.g. 10.82.0.0/16 30000-32000. + DisableSecurityGroupIngress bool `json:"disable-security-group-ingress" yaml:"disable-security-group-ingress" ini:"DisableSecurityGroupIngress,omitempty"` + + //AWS has a hard limit of 500 security groups. For large clusters creating a security group for each ELB + //can cause the max number of security groups to be reached. If this is set instead of creating a new + //Security group for each ELB this security group will be used instead. + ElbSecurityGroup string `json:"elb-security-group" yaml:"elb-security-group" ini:"ElbSecurityGroup,omitempty"` + + //During the instantiation of an new AWS cloud provider, the detected region + //is validated against a known set of regions. + // + //In a non-standard, AWS like environment (e.g. Eucalyptus), this check may + //be undesirable. Setting this to true will disable the check and provide + //a warning that the check was skipped. Please note that this is an + //experimental feature and work-in-progress for the moment. If you find + //yourself in an non-AWS cloud and open an issue, please indicate that in the + //issue body. + DisableStrictZoneCheck bool `json:"disable-strict-zone-check" yaml:"disable-strict-zone-check" ini:"DisableStrictZoneCheck,omitempty"` } type MonitoringConfig struct { diff --git a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/zz_generated_deepcopy.go b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/zz_generated_deepcopy.go index e06c4eea..38eee4b7 100644 --- a/vendor/github.com/rancher/types/apis/management.cattle.io/v3/zz_generated_deepcopy.go +++ b/vendor/github.com/rancher/types/apis/management.cattle.io/v3/zz_generated_deepcopy.go @@ -36,6 +36,14 @@ func (in *ADFSConfig) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *AWSCloudProvider) DeepCopyInto(out *AWSCloudProvider) { *out = *in + out.Global = in.Global + if in.ServiceOverride != nil { + in, out := &in.ServiceOverride, &out.ServiceOverride + *out = make(map[string]ServiceOverride, len(*in)) + for key, val := range *in { + (*out)[key] = val + } + } return } @@ -806,6 +814,7 @@ func (in *CloudCredential) DeepCopyInto(out *CloudCredential) { out.Namespaced = in.Namespaced out.TypeMeta = in.TypeMeta in.ObjectMeta.DeepCopyInto(&out.ObjectMeta) + out.Spec = in.Spec return } @@ -860,13 +869,29 @@ func (in *CloudCredentialList) DeepCopyObject() runtime.Object { return nil } +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *CloudCredentialSpec) DeepCopyInto(out *CloudCredentialSpec) { + *out = *in + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CloudCredentialSpec. +func (in *CloudCredentialSpec) DeepCopy() *CloudCredentialSpec { + if in == nil { + return nil + } + out := new(CloudCredentialSpec) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CloudProvider) DeepCopyInto(out *CloudProvider) { *out = *in if in.AWSCloudProvider != nil { in, out := &in.AWSCloudProvider, &out.AWSCloudProvider *out = new(AWSCloudProvider) - **out = **in + (*in).DeepCopyInto(*out) } if in.AzureCloudProvider != nil { in, out := &in.AzureCloudProvider, &out.AzureCloudProvider @@ -2050,6 +2075,22 @@ func (in *Condition) DeepCopy() *Condition { return out } +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *ContainerResourceLimit) DeepCopyInto(out *ContainerResourceLimit) { + *out = *in + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ContainerResourceLimit. +func (in *ContainerResourceLimit) DeepCopy() *ContainerResourceLimit { + if in == nil { + return nil + } + out := new(ContainerResourceLimit) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CustomConfig) DeepCopyInto(out *CustomConfig) { *out = *in @@ -2719,6 +2760,22 @@ func (in *GithubConfigTestOutput) DeepCopy() *GithubConfigTestOutput { return out } +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *GlobalAwsOpts) DeepCopyInto(out *GlobalAwsOpts) { + *out = *in + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new GlobalAwsOpts. +func (in *GlobalAwsOpts) DeepCopy() *GlobalAwsOpts { + if in == nil { + return nil + } + out := new(GlobalAwsOpts) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *GlobalDNS) DeepCopyInto(out *GlobalDNS) { *out = *in @@ -3796,6 +3853,11 @@ func (in *ListenConfigList) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *LoadBalancerCapabilities) DeepCopyInto(out *LoadBalancerCapabilities) { *out = *in + if in.Enabled != nil { + in, out := &in.Enabled, &out.Enabled + *out = new(bool) + **out = **in + } if in.ProtocolsSupported != nil { in, out := &in.ProtocolsSupported, &out.ProtocolsSupported *out = make([]string, len(*in)) @@ -4378,6 +4440,11 @@ func (in *MultiClusterAppSpec) DeepCopyInto(out *MultiClusterAppSpec) { *out = make([]Member, len(*in)) copy(*out, *in) } + if in.Roles != nil { + in, out := &in.Roles, &out.Roles + *out = make([]string, len(*in)) + copy(*out, *in) + } in.UpgradeStrategy.DeepCopyInto(&out.UpgradeStrategy) return } @@ -6569,6 +6636,11 @@ func (in *ProjectSpec) DeepCopyInto(out *ProjectSpec) { *out = new(NamespaceResourceQuota) **out = **in } + if in.ContainerDefaultResourceLimit != nil { + in, out := &in.ContainerDefaultResourceLimit, &out.ContainerDefaultResourceLimit + *out = new(ContainerResourceLimit) + **out = **in + } return } @@ -7222,6 +7294,22 @@ func (in *RotateCertificateInput) DeepCopy() *RotateCertificateInput { return out } +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *RotateCertificateOutput) DeepCopyInto(out *RotateCertificateOutput) { + *out = *in + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RotateCertificateOutput. +func (in *RotateCertificateOutput) DeepCopy() *RotateCertificateOutput { + if in == nil { + return nil + } + out := new(RotateCertificateOutput) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *RotateCertificates) DeepCopyInto(out *RotateCertificates) { *out = *in @@ -7399,6 +7487,22 @@ func (in *SearchPrincipalsInput) DeepCopy() *SearchPrincipalsInput { return out } +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *ServiceOverride) DeepCopyInto(out *ServiceOverride) { + *out = *in + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ServiceOverride. +func (in *ServiceOverride) DeepCopy() *ServiceOverride { + if in == nil { + return nil + } + out := new(ServiceOverride) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *SetPasswordInput) DeepCopyInto(out *SetPasswordInput) { *out = *in @@ -8085,6 +8189,55 @@ func (in *TokenList) DeepCopyObject() runtime.Object { return nil } +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *UpdateGlobalDNSTargetsInput) DeepCopyInto(out *UpdateGlobalDNSTargetsInput) { + *out = *in + if in.ProjectNames != nil { + in, out := &in.ProjectNames, &out.ProjectNames + *out = make([]string, len(*in)) + copy(*out, *in) + } + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new UpdateGlobalDNSTargetsInput. +func (in *UpdateGlobalDNSTargetsInput) DeepCopy() *UpdateGlobalDNSTargetsInput { + if in == nil { + return nil + } + out := new(UpdateGlobalDNSTargetsInput) + in.DeepCopyInto(out) + return out +} + +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *UpdateMultiClusterAppTargetsInput) DeepCopyInto(out *UpdateMultiClusterAppTargetsInput) { + *out = *in + if in.Projects != nil { + in, out := &in.Projects, &out.Projects + *out = make([]string, len(*in)) + copy(*out, *in) + } + if in.Answers != nil { + in, out := &in.Answers, &out.Answers + *out = make([]Answer, len(*in)) + for i := range *in { + (*in)[i].DeepCopyInto(&(*out)[i]) + } + } + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new UpdateMultiClusterAppTargetsInput. +func (in *UpdateMultiClusterAppTargetsInput) DeepCopy() *UpdateMultiClusterAppTargetsInput { + if in == nil { + return nil + } + out := new(UpdateMultiClusterAppTargetsInput) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *UpgradeStrategy) DeepCopyInto(out *UpgradeStrategy) { *out = *in