mirror of
https://github.com/kubernetes-sigs/descheduler.git
synced 2026-01-28 14:41:10 +01:00
Bump to k8s v0.30.0-alpha.3 (#1359)
* update go.mod for v0.30.0-alpha.3 * update vendor deps * regenrate go.mod transitive dependencies --------- Co-authored-by: Amir Alavi <amiralavi7@gmail.com>
This commit is contained in:
9
vendor/k8s.io/api/networking/v1/generated.proto
generated
vendored
9
vendor/k8s.io/api/networking/v1/generated.proto
generated
vendored
@@ -84,6 +84,7 @@ message IPBlock {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the cidr range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string except = 2;
|
||||
}
|
||||
|
||||
@@ -225,6 +226,7 @@ message IngressLoadBalancerIngress {
|
||||
message IngressLoadBalancerStatus {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressLoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -396,6 +398,7 @@ message NetworkPolicyEgressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// to is a list of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -404,6 +407,7 @@ message NetworkPolicyEgressRule {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer to = 2;
|
||||
}
|
||||
|
||||
@@ -416,6 +420,7 @@ message NetworkPolicyIngressRule {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPort ports = 1;
|
||||
|
||||
// from is a list of sources which should be able to access the pods selected for this rule.
|
||||
@@ -424,6 +429,7 @@ message NetworkPolicyIngressRule {
|
||||
// source). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyPeer from = 2;
|
||||
}
|
||||
|
||||
@@ -505,6 +511,7 @@ message NetworkPolicySpec {
|
||||
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||
// solely to ensure that the pods it selects are isolated by default)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyIngressRule ingress = 2;
|
||||
|
||||
// egress is a list of egress rules to be applied to the selected pods. Outgoing traffic
|
||||
@@ -515,6 +522,7 @@ message NetworkPolicySpec {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated NetworkPolicyEgressRule egress = 3;
|
||||
|
||||
// policyTypes is a list of rule types that the NetworkPolicy relates to.
|
||||
@@ -528,6 +536,7 @@ message NetworkPolicySpec {
|
||||
// an egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string policyTypes = 4;
|
||||
}
|
||||
|
||||
|
||||
9
vendor/k8s.io/api/networking/v1/types.go
generated
vendored
9
vendor/k8s.io/api/networking/v1/types.go
generated
vendored
@@ -74,6 +74,7 @@ type NetworkPolicySpec struct {
|
||||
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||
// solely to ensure that the pods it selects are isolated by default)
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []NetworkPolicyIngressRule `json:"ingress,omitempty" protobuf:"bytes,2,rep,name=ingress"`
|
||||
|
||||
// egress is a list of egress rules to be applied to the selected pods. Outgoing traffic
|
||||
@@ -84,6 +85,7 @@ type NetworkPolicySpec struct {
|
||||
// solely to ensure that the pods it selects are isolated by default).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Egress []NetworkPolicyEgressRule `json:"egress,omitempty" protobuf:"bytes,3,rep,name=egress"`
|
||||
|
||||
// policyTypes is a list of rule types that the NetworkPolicy relates to.
|
||||
@@ -97,6 +99,7 @@ type NetworkPolicySpec struct {
|
||||
// an egress section and would otherwise default to just [ "Ingress" ]).
|
||||
// This field is beta-level in 1.8
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
PolicyTypes []PolicyType `json:"policyTypes,omitempty" protobuf:"bytes,4,rep,name=policyTypes,casttype=PolicyType"`
|
||||
}
|
||||
|
||||
@@ -109,6 +112,7 @@ type NetworkPolicyIngressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// from is a list of sources which should be able to access the pods selected for this rule.
|
||||
@@ -117,6 +121,7 @@ type NetworkPolicyIngressRule struct {
|
||||
// source). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the from list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
From []NetworkPolicyPeer `json:"from,omitempty" protobuf:"bytes,2,rep,name=from"`
|
||||
}
|
||||
|
||||
@@ -130,6 +135,7 @@ type NetworkPolicyEgressRule struct {
|
||||
// If this field is present and contains at least one item, then this rule allows
|
||||
// traffic only if the traffic matches at least one port in the list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||
|
||||
// to is a list of destinations for outgoing traffic of pods selected for this rule.
|
||||
@@ -138,6 +144,7 @@ type NetworkPolicyEgressRule struct {
|
||||
// destination). If this field is present and contains at least one item, this rule
|
||||
// allows traffic only if the traffic matches at least one item in the to list.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
To []NetworkPolicyPeer `json:"to,omitempty" protobuf:"bytes,2,rep,name=to"`
|
||||
}
|
||||
|
||||
@@ -175,6 +182,7 @@ type IPBlock struct {
|
||||
// Valid examples are "192.168.1.0/24" or "2001:db8::/64"
|
||||
// Except values will be rejected if they are outside the cidr range
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Except []string `json:"except,omitempty" protobuf:"bytes,2,rep,name=except"`
|
||||
}
|
||||
|
||||
@@ -329,6 +337,7 @@ type IngressStatus struct {
|
||||
type IngressLoadBalancerStatus struct {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []IngressLoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
|
||||
1
vendor/k8s.io/api/networking/v1alpha1/generated.proto
generated
vendored
1
vendor/k8s.io/api/networking/v1alpha1/generated.proto
generated
vendored
@@ -121,6 +121,7 @@ message ServiceCIDRSpec {
|
||||
// from which to assign service cluster IPs. Max of two CIDRs is allowed, one of each IP family.
|
||||
// This field is immutable.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string cidrs = 1;
|
||||
}
|
||||
|
||||
|
||||
1
vendor/k8s.io/api/networking/v1alpha1/types.go
generated
vendored
1
vendor/k8s.io/api/networking/v1alpha1/types.go
generated
vendored
@@ -111,6 +111,7 @@ type ServiceCIDRSpec struct {
|
||||
// from which to assign service cluster IPs. Max of two CIDRs is allowed, one of each IP family.
|
||||
// This field is immutable.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
CIDRs []string `json:"cidrs,omitempty" protobuf:"bytes,1,opt,name=cidrs"`
|
||||
}
|
||||
|
||||
|
||||
5
vendor/k8s.io/api/networking/v1beta1/generated.proto
generated
vendored
5
vendor/k8s.io/api/networking/v1beta1/generated.proto
generated
vendored
@@ -69,6 +69,7 @@ message HTTPIngressPath {
|
||||
// or '#'.
|
||||
message HTTPIngressRuleValue {
|
||||
// paths is a collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
repeated HTTPIngressPath paths = 1;
|
||||
}
|
||||
|
||||
@@ -211,6 +212,7 @@ message IngressLoadBalancerIngress {
|
||||
message IngressLoadBalancerStatus {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressLoadBalancerIngress ingress = 1;
|
||||
}
|
||||
|
||||
@@ -313,11 +315,13 @@ message IngressSpec {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressTLS tls = 2;
|
||||
|
||||
// rules is a list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated IngressRule rules = 3;
|
||||
}
|
||||
|
||||
@@ -335,6 +339,7 @@ message IngressTLS {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
repeated string hosts = 1;
|
||||
|
||||
// secretName is the name of the secret used to terminate TLS traffic on
|
||||
|
||||
5
vendor/k8s.io/api/networking/v1beta1/types.go
generated
vendored
5
vendor/k8s.io/api/networking/v1beta1/types.go
generated
vendored
@@ -97,11 +97,13 @@ type IngressSpec struct {
|
||||
// through the SNI TLS extension, if the ingress controller fulfilling the
|
||||
// ingress supports SNI.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
TLS []IngressTLS `json:"tls,omitempty" protobuf:"bytes,2,rep,name=tls"`
|
||||
|
||||
// rules is a list of host rules used to configure the Ingress. If unspecified, or
|
||||
// no rule matches, all traffic is sent to the default backend.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Rules []IngressRule `json:"rules,omitempty" protobuf:"bytes,3,rep,name=rules"`
|
||||
// TODO: Add the ability to specify load-balancer IP through claims
|
||||
}
|
||||
@@ -113,6 +115,7 @@ type IngressTLS struct {
|
||||
// wildcard host setting for the loadbalancer controller fulfilling this
|
||||
// Ingress, if left unspecified.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Hosts []string `json:"hosts,omitempty" protobuf:"bytes,1,rep,name=hosts"`
|
||||
|
||||
// secretName is the name of the secret used to terminate TLS traffic on
|
||||
@@ -136,6 +139,7 @@ type IngressStatus struct {
|
||||
type IngressLoadBalancerStatus struct {
|
||||
// ingress is a list containing ingress points for the load-balancer.
|
||||
// +optional
|
||||
// +listType=atomic
|
||||
Ingress []IngressLoadBalancerIngress `json:"ingress,omitempty" protobuf:"bytes,1,rep,name=ingress"`
|
||||
}
|
||||
|
||||
@@ -239,6 +243,7 @@ type IngressRuleValue struct {
|
||||
// or '#'.
|
||||
type HTTPIngressRuleValue struct {
|
||||
// paths is a collection of paths that map requests to backends.
|
||||
// +listType=atomic
|
||||
Paths []HTTPIngressPath `json:"paths" protobuf:"bytes,1,rep,name=paths"`
|
||||
// TODO: Consider adding fields for ingress-type specific global
|
||||
// options usable by a loadbalancer, like http keep-alive.
|
||||
|
||||
Reference in New Issue
Block a user