Skip to content

Commit

Permalink
chore: run make provider build
Browse files Browse the repository at this point in the history
  • Loading branch information
rquitales committed Apr 11, 2024
1 parent 13668b0 commit 8aefaa0
Show file tree
Hide file tree
Showing 671 changed files with 85,675 additions and 6,181 deletions.
22 changes: 22 additions & 0 deletions provider/pkg/kinds/kinds.go
Original file line number Diff line number Diff line change
Expand Up @@ -119,12 +119,18 @@ const (
ReplicationControllerList Kind = "ReplicationControllerList"
ResourceClaim Kind = "ResourceClaim"
ResourceClaimList Kind = "ResourceClaimList"
ResourceClaimParameters Kind = "ResourceClaimParameters"
ResourceClaimParametersList Kind = "ResourceClaimParametersList"
ResourceClaimTemplate Kind = "ResourceClaimTemplate"
ResourceClaimTemplateList Kind = "ResourceClaimTemplateList"
ResourceClass Kind = "ResourceClass"
ResourceClassList Kind = "ResourceClassList"
ResourceClassParameters Kind = "ResourceClassParameters"
ResourceClassParametersList Kind = "ResourceClassParametersList"
ResourceQuota Kind = "ResourceQuota"
ResourceQuotaList Kind = "ResourceQuotaList"
ResourceSlice Kind = "ResourceSlice"
ResourceSliceList Kind = "ResourceSliceList"
Role Kind = "Role"
RoleBinding Kind = "RoleBinding"
RoleBindingList Kind = "RoleBindingList"
Expand All @@ -144,6 +150,8 @@ const (
Status Kind = "Status"
StorageClass Kind = "StorageClass"
StorageClassList Kind = "StorageClassList"
StorageVersionMigration Kind = "StorageVersionMigration"
StorageVersionMigrationList Kind = "StorageVersionMigrationList"
ValidatingAdmissionPolicy Kind = "ValidatingAdmissionPolicy"
ValidatingAdmissionPolicyBinding Kind = "ValidatingAdmissionPolicyBinding"
ValidatingAdmissionPolicyBindingList Kind = "ValidatingAdmissionPolicyBindingList"
Expand Down Expand Up @@ -282,6 +290,7 @@ const (
StorageV1 groupVersion = "storage.k8s.io/v1"
StorageV1A1 groupVersion = "storage.k8s.io/v1alpha1"
StorageV1B1 groupVersion = "storage.k8s.io/v1beta1"
StoragemigrationV1A1 groupVersion = "storagemigration.k8s.io/v1alpha1"
)

// toGVK is a helper function that converts the internal groupVersion and Kind types to a schema.GroupVersionKind
Expand Down Expand Up @@ -353,13 +362,16 @@ var KnownGroupVersions = codegen.NewStringSet(
"storage.k8s.io/v1",
"storage.k8s.io/v1alpha1",
"storage.k8s.io/v1beta1",
"storagemigration.k8s.io/v1alpha1",
"v1", // alias for "core/v1"
)

// PatchQualifiedTypes is the set of "Patch" resource QualifiedType URN tokens. Checking against this known set rather
// than using the Patch suffix avoids unintended clashes with CustomResources that also contain a Patch suffix.
var PatchQualifiedTypes = codegen.NewStringSet(
"kubernetes:admissionregistration.k8s.io/v1:MutatingWebhookConfigurationPatch",
"kubernetes:admissionregistration.k8s.io/v1:ValidatingAdmissionPolicyBindingPatch",
"kubernetes:admissionregistration.k8s.io/v1:ValidatingAdmissionPolicyPatch",
"kubernetes:admissionregistration.k8s.io/v1:ValidatingWebhookConfigurationPatch",
"kubernetes:admissionregistration.k8s.io/v1alpha1:ValidatingAdmissionPolicyBindingPatch",
"kubernetes:admissionregistration.k8s.io/v1alpha1:ValidatingAdmissionPolicyPatch",
Expand Down Expand Up @@ -466,9 +478,12 @@ var PatchQualifiedTypes = codegen.NewStringSet(
"kubernetes:resource.k8s.io/v1alpha1:ResourceClaimTemplatePatch",
"kubernetes:resource.k8s.io/v1alpha1:ResourceClassPatch",
"kubernetes:resource.k8s.io/v1alpha2:PodSchedulingContextPatch",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClaimParametersPatch",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClaimPatch",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClaimTemplatePatch",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClassParametersPatch",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClassPatch",
"kubernetes:resource.k8s.io/v1alpha2:ResourceSlicePatch",
"kubernetes:scheduling.k8s.io/v1:PriorityClassPatch",
"kubernetes:scheduling.k8s.io/v1alpha1:PriorityClassPatch",
"kubernetes:scheduling.k8s.io/v1beta1:PriorityClassPatch",
Expand All @@ -485,12 +500,15 @@ var PatchQualifiedTypes = codegen.NewStringSet(
"kubernetes:storage.k8s.io/v1beta1:CSIStorageCapacityPatch",
"kubernetes:storage.k8s.io/v1beta1:StorageClassPatch",
"kubernetes:storage.k8s.io/v1beta1:VolumeAttachmentPatch",
"kubernetes:storagemigration.k8s.io/v1alpha1:StorageVersionMigrationPatch",
)

// ListQualifiedTypes is the set of "List" resource QualifiedType URN tokens. Checking against this known set rather
// than using the List suffix avoids unintended clashes with CustomResources that also contain a List suffix.
var ListQualifiedTypes = codegen.NewStringSet(
"kubernetes:admissionregistration.k8s.io/v1:MutatingWebhookConfigurationList",
"kubernetes:admissionregistration.k8s.io/v1:ValidatingAdmissionPolicyBindingList",
"kubernetes:admissionregistration.k8s.io/v1:ValidatingAdmissionPolicyList",
"kubernetes:admissionregistration.k8s.io/v1:ValidatingWebhookConfigurationList",
"kubernetes:admissionregistration.k8s.io/v1alpha1:ValidatingAdmissionPolicyBindingList",
"kubernetes:admissionregistration.k8s.io/v1alpha1:ValidatingAdmissionPolicyList",
Expand Down Expand Up @@ -596,8 +614,11 @@ var ListQualifiedTypes = codegen.NewStringSet(
"kubernetes:resource.k8s.io/v1alpha1:ResourceClassList",
"kubernetes:resource.k8s.io/v1alpha2:PodSchedulingContextList",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClaimList",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClaimParametersList",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClaimTemplateList",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClassList",
"kubernetes:resource.k8s.io/v1alpha2:ResourceClassParametersList",
"kubernetes:resource.k8s.io/v1alpha2:ResourceSliceList",
"kubernetes:scheduling.k8s.io/v1:PriorityClassList",
"kubernetes:scheduling.k8s.io/v1alpha1:PriorityClassList",
"kubernetes:scheduling.k8s.io/v1beta1:PriorityClassList",
Expand All @@ -614,4 +635,5 @@ var ListQualifiedTypes = codegen.NewStringSet(
"kubernetes:storage.k8s.io/v1beta1:CSIStorageCapacityList",
"kubernetes:storage.k8s.io/v1beta1:StorageClassList",
"kubernetes:storage.k8s.io/v1beta1:VolumeAttachmentList",
"kubernetes:storagemigration.k8s.io/v1alpha1:StorageVersionMigrationList",
)
45 changes: 45 additions & 0 deletions sdk/dotnet/AdmissionRegistration/V1/Inputs/AuditAnnotationArgs.cs
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
// *** WARNING: this file was generated by pulumigen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***

using System;
using System.Collections.Generic;
using System.Collections.Immutable;
using System.Threading.Tasks;
using Pulumi.Serialization;

namespace Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1
{

/// <summary>
/// AuditAnnotation describes how to produce an audit annotation for an API request.
/// </summary>
public class AuditAnnotationArgs : global::Pulumi.ResourceArgs
{
/// <summary>
/// key specifies the audit annotation key. The audit annotation keys of a ValidatingAdmissionPolicy must be unique. The key must be a qualified name ([A-Za-z0-9][-A-Za-z0-9_.]*) no more than 63 bytes in length.
///
/// The key is combined with the resource name of the ValidatingAdmissionPolicy to construct an audit annotation key: "{ValidatingAdmissionPolicy name}/{key}".
///
/// If an admission webhook uses the same resource name as this ValidatingAdmissionPolicy and the same audit annotation key, the annotation key will be identical. In this case, the first annotation written with the key will be included in the audit event and all subsequent annotations with the same key will be discarded.
///
/// Required.
/// </summary>
[Input("key", required: true)]
public Input<string> Key { get; set; } = null!;

/// <summary>
/// valueExpression represents the expression which is evaluated by CEL to produce an audit annotation value. The expression must evaluate to either a string or null value. If the expression evaluates to a string, the audit annotation is included with the string value. If the expression evaluates to null or empty string the audit annotation will be omitted. The valueExpression may be no longer than 5kb in length. If the result of the valueExpression is more than 10kb in length, it will be truncated to 10kb.
///
/// If multiple ValidatingAdmissionPolicyBinding resources match an API request, then the valueExpression will be evaluated for each binding. All unique values produced by the valueExpressions will be joined together in a comma-separated list.
///
/// Required.
/// </summary>
[Input("valueExpression", required: true)]
public Input<string> ValueExpression { get; set; } = null!;

public AuditAnnotationArgs()
{
}
public static new AuditAnnotationArgs Empty => new AuditAnnotationArgs();
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
// *** WARNING: this file was generated by pulumigen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***

using System;
using System.Collections.Generic;
using System.Collections.Immutable;
using System.Threading.Tasks;
using Pulumi.Serialization;

namespace Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1
{

/// <summary>
/// AuditAnnotation describes how to produce an audit annotation for an API request.
/// </summary>
public class AuditAnnotationPatchArgs : global::Pulumi.ResourceArgs
{
/// <summary>
/// key specifies the audit annotation key. The audit annotation keys of a ValidatingAdmissionPolicy must be unique. The key must be a qualified name ([A-Za-z0-9][-A-Za-z0-9_.]*) no more than 63 bytes in length.
///
/// The key is combined with the resource name of the ValidatingAdmissionPolicy to construct an audit annotation key: "{ValidatingAdmissionPolicy name}/{key}".
///
/// If an admission webhook uses the same resource name as this ValidatingAdmissionPolicy and the same audit annotation key, the annotation key will be identical. In this case, the first annotation written with the key will be included in the audit event and all subsequent annotations with the same key will be discarded.
///
/// Required.
/// </summary>
[Input("key")]
public Input<string>? Key { get; set; }

/// <summary>
/// valueExpression represents the expression which is evaluated by CEL to produce an audit annotation value. The expression must evaluate to either a string or null value. If the expression evaluates to a string, the audit annotation is included with the string value. If the expression evaluates to null or empty string the audit annotation will be omitted. The valueExpression may be no longer than 5kb in length. If the result of the valueExpression is more than 10kb in length, it will be truncated to 10kb.
///
/// If multiple ValidatingAdmissionPolicyBinding resources match an API request, then the valueExpression will be evaluated for each binding. All unique values produced by the valueExpressions will be joined together in a comma-separated list.
///
/// Required.
/// </summary>
[Input("valueExpression")]
public Input<string>? ValueExpression { get; set; }

public AuditAnnotationPatchArgs()
{
}
public static new AuditAnnotationPatchArgs Empty => new AuditAnnotationPatchArgs();
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
// *** WARNING: this file was generated by pulumigen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***

using System;
using System.Collections.Generic;
using System.Collections.Immutable;
using System.Threading.Tasks;
using Pulumi.Serialization;

namespace Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1
{

/// <summary>
/// ExpressionWarning is a warning information that targets a specific expression.
/// </summary>
public class ExpressionWarningArgs : global::Pulumi.ResourceArgs
{
/// <summary>
/// The path to the field that refers the expression. For example, the reference to the expression of the first item of validations is "spec.validations[0].expression"
/// </summary>
[Input("fieldRef", required: true)]
public Input<string> FieldRef { get; set; } = null!;

/// <summary>
/// The content of type checking information in a human-readable form. Each line of the warning contains the type that the expression is checked against, followed by the type check error from the compiler.
/// </summary>
[Input("warning", required: true)]
public Input<string> Warning { get; set; } = null!;

public ExpressionWarningArgs()
{
}
public static new ExpressionWarningArgs Empty => new ExpressionWarningArgs();
}
}
101 changes: 101 additions & 0 deletions sdk/dotnet/AdmissionRegistration/V1/Inputs/MatchResourcesArgs.cs
Original file line number Diff line number Diff line change
@@ -0,0 +1,101 @@
// *** WARNING: this file was generated by pulumigen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***

using System;
using System.Collections.Generic;
using System.Collections.Immutable;
using System.Threading.Tasks;
using Pulumi.Serialization;

namespace Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1
{

/// <summary>
/// MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
/// </summary>
public class MatchResourcesArgs : global::Pulumi.ResourceArgs
{
[Input("excludeResourceRules")]
private InputList<Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1.NamedRuleWithOperationsArgs>? _excludeResourceRules;

/// <summary>
/// ExcludeResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
/// </summary>
public InputList<Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1.NamedRuleWithOperationsArgs> ExcludeResourceRules
{
get => _excludeResourceRules ?? (_excludeResourceRules = new InputList<Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1.NamedRuleWithOperationsArgs>());
set => _excludeResourceRules = value;
}

/// <summary>
/// matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
///
/// - Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
///
/// - Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
///
/// Defaults to "Equivalent"
/// </summary>
[Input("matchPolicy")]
public Input<string>? MatchPolicy { get; set; }

/// <summary>
/// NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
///
/// For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
/// "matchExpressions": [
/// {
/// "key": "runlevel",
/// "operator": "NotIn",
/// "values": [
/// "0",
/// "1"
/// ]
/// }
/// ]
/// }
///
/// If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
/// "matchExpressions": [
/// {
/// "key": "environment",
/// "operator": "In",
/// "values": [
/// "prod",
/// "staging"
/// ]
/// }
/// ]
/// }
///
/// See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
///
/// Default to the empty LabelSelector, which matches everything.
/// </summary>
[Input("namespaceSelector")]
public Input<Pulumi.Kubernetes.Types.Inputs.Meta.V1.LabelSelectorArgs>? NamespaceSelector { get; set; }

/// <summary>
/// ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
/// </summary>
[Input("objectSelector")]
public Input<Pulumi.Kubernetes.Types.Inputs.Meta.V1.LabelSelectorArgs>? ObjectSelector { get; set; }

[Input("resourceRules")]
private InputList<Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1.NamedRuleWithOperationsArgs>? _resourceRules;

/// <summary>
/// ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
/// </summary>
public InputList<Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1.NamedRuleWithOperationsArgs> ResourceRules
{
get => _resourceRules ?? (_resourceRules = new InputList<Pulumi.Kubernetes.Types.Inputs.AdmissionRegistration.V1.NamedRuleWithOperationsArgs>());
set => _resourceRules = value;
}

public MatchResourcesArgs()
{
}
public static new MatchResourcesArgs Empty => new MatchResourcesArgs();
}
}
Loading

0 comments on commit 8aefaa0

Please sign in to comment.