mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-26 00:00:23 +00:00
rebase: bump sigs.k8s.io/controller-runtime from 0.10.0 to 0.10.1
Bumps [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime) from 0.10.0 to 0.10.1. - [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases) - [Commits](https://github.com/kubernetes-sigs/controller-runtime/compare/v0.10.0...v0.10.1) --- updated-dependencies: - dependency-name: sigs.k8s.io/controller-runtime dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
This commit is contained in:
parent
f0e2f84a40
commit
27a2718f0b
2
go.mod
2
go.mod
@ -32,7 +32,7 @@ require (
|
|||||||
k8s.io/kubernetes v1.22.2
|
k8s.io/kubernetes v1.22.2
|
||||||
k8s.io/mount-utils v0.22.2
|
k8s.io/mount-utils v0.22.2
|
||||||
k8s.io/utils v0.0.0-20210819203725-bdf08cb9a70a
|
k8s.io/utils v0.0.0-20210819203725-bdf08cb9a70a
|
||||||
sigs.k8s.io/controller-runtime v0.10.0
|
sigs.k8s.io/controller-runtime v0.10.1
|
||||||
)
|
)
|
||||||
|
|
||||||
replace (
|
replace (
|
||||||
|
5
go.sum
5
go.sum
@ -1577,7 +1577,6 @@ k8s.io/sample-apiserver v0.22.2/go.mod h1:h+/DIV5EmuNq4vfPr5TSXy9mIBVXXlPAKQMPbj
|
|||||||
k8s.io/system-validators v1.5.0/go.mod h1:bPldcLgkIUK22ALflnsXk8pvkTEndYdNuaHH6gRrl0Q=
|
k8s.io/system-validators v1.5.0/go.mod h1:bPldcLgkIUK22ALflnsXk8pvkTEndYdNuaHH6gRrl0Q=
|
||||||
k8s.io/utils v0.0.0-20190506122338-8fab8cb257d5/go.mod h1:sZAwmy6armz5eXlNoLmJcl4F1QuKu7sr+mFQ0byX7Ew=
|
k8s.io/utils v0.0.0-20190506122338-8fab8cb257d5/go.mod h1:sZAwmy6armz5eXlNoLmJcl4F1QuKu7sr+mFQ0byX7Ew=
|
||||||
k8s.io/utils v0.0.0-20201110183641-67b214c5f920/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
k8s.io/utils v0.0.0-20201110183641-67b214c5f920/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
||||||
k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
|
||||||
k8s.io/utils v0.0.0-20210819203725-bdf08cb9a70a h1:8dYfu/Fc9Gz2rNJKB9IQRGgQOh2clmRzNIPPY1xLY5g=
|
k8s.io/utils v0.0.0-20210819203725-bdf08cb9a70a h1:8dYfu/Fc9Gz2rNJKB9IQRGgQOh2clmRzNIPPY1xLY5g=
|
||||||
k8s.io/utils v0.0.0-20210819203725-bdf08cb9a70a/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
k8s.io/utils v0.0.0-20210819203725-bdf08cb9a70a/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
||||||
layeh.com/radius v0.0.0-20190322222518-890bc1058917/go.mod h1:fywZKyu//X7iRzaxLgPWsvc0L26IUpVvE/aeIL2JtIQ=
|
layeh.com/radius v0.0.0-20190322222518-890bc1058917/go.mod h1:fywZKyu//X7iRzaxLgPWsvc0L26IUpVvE/aeIL2JtIQ=
|
||||||
@ -1593,8 +1592,8 @@ rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
|
|||||||
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.22 h1:fmRfl9WJ4ApJn7LxNuED4m0t18qivVQOxP6aAYG9J6c=
|
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.22 h1:fmRfl9WJ4ApJn7LxNuED4m0t18qivVQOxP6aAYG9J6c=
|
||||||
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.22/go.mod h1:LEScyzhFmoF5pso/YSeBstl57mOzx9xlU9n85RGrDQg=
|
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.22/go.mod h1:LEScyzhFmoF5pso/YSeBstl57mOzx9xlU9n85RGrDQg=
|
||||||
sigs.k8s.io/controller-runtime v0.2.2/go.mod h1:9dyohw3ZtoXQuV1e766PHUn+cmrRCIcBh6XIMFNMZ+I=
|
sigs.k8s.io/controller-runtime v0.2.2/go.mod h1:9dyohw3ZtoXQuV1e766PHUn+cmrRCIcBh6XIMFNMZ+I=
|
||||||
sigs.k8s.io/controller-runtime v0.10.0 h1:HgyZmMpjUOrtkaFtCnfxsR1bGRuFoAczSNbn2MoKj5U=
|
sigs.k8s.io/controller-runtime v0.10.1 h1:+eLHgY/VrJWnfg6iXUqhCUqNXgPH1NZeP9drNAAgWlg=
|
||||||
sigs.k8s.io/controller-runtime v0.10.0/go.mod h1:GCdh6kqV6IY4LK0JLwX0Zm6g233RtVGdb/f0+KSfprg=
|
sigs.k8s.io/controller-runtime v0.10.1/go.mod h1:CQp8eyUQZ/Q7PJvnIrB6/hgfTC1kBkGylwsLgOQi1WY=
|
||||||
sigs.k8s.io/kustomize/api v0.8.11/go.mod h1:a77Ls36JdfCWojpUqR6m60pdGY1AYFix4AH83nJtY1g=
|
sigs.k8s.io/kustomize/api v0.8.11/go.mod h1:a77Ls36JdfCWojpUqR6m60pdGY1AYFix4AH83nJtY1g=
|
||||||
sigs.k8s.io/kustomize/cmd/config v0.9.13/go.mod h1:7547FLF8W/lTaDf0BDqFTbZxM9zqwEJqCKN9sSR0xSs=
|
sigs.k8s.io/kustomize/cmd/config v0.9.13/go.mod h1:7547FLF8W/lTaDf0BDqFTbZxM9zqwEJqCKN9sSR0xSs=
|
||||||
sigs.k8s.io/kustomize/kustomize/v4 v4.2.0/go.mod h1:MOkR6fmhwG7hEDRXBYELTi5GSFcLwfqwzTRHW3kv5go=
|
sigs.k8s.io/kustomize/kustomize/v4 v4.2.0/go.mod h1:MOkR6fmhwG7hEDRXBYELTi5GSFcLwfqwzTRHW3kv5go=
|
||||||
|
2
vendor/modules.txt
vendored
2
vendor/modules.txt
vendored
@ -1010,7 +1010,7 @@ k8s.io/utils/trace
|
|||||||
# sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.22
|
# sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.22
|
||||||
sigs.k8s.io/apiserver-network-proxy/konnectivity-client/pkg/client
|
sigs.k8s.io/apiserver-network-proxy/konnectivity-client/pkg/client
|
||||||
sigs.k8s.io/apiserver-network-proxy/konnectivity-client/proto/client
|
sigs.k8s.io/apiserver-network-proxy/konnectivity-client/proto/client
|
||||||
# sigs.k8s.io/controller-runtime v0.10.0
|
# sigs.k8s.io/controller-runtime v0.10.1
|
||||||
## explicit
|
## explicit
|
||||||
sigs.k8s.io/controller-runtime/pkg/cache
|
sigs.k8s.io/controller-runtime/pkg/cache
|
||||||
sigs.k8s.io/controller-runtime/pkg/cache/internal
|
sigs.k8s.io/controller-runtime/pkg/cache/internal
|
||||||
|
74
vendor/sigs.k8s.io/controller-runtime/pkg/cache/internal/informers_map.go
generated
vendored
74
vendor/sigs.k8s.io/controller-runtime/pkg/cache/internal/informers_map.go
generated
vendored
@ -34,6 +34,7 @@ import (
|
|||||||
"k8s.io/client-go/metadata"
|
"k8s.io/client-go/metadata"
|
||||||
"k8s.io/client-go/rest"
|
"k8s.io/client-go/rest"
|
||||||
"k8s.io/client-go/tools/cache"
|
"k8s.io/client-go/tools/cache"
|
||||||
|
|
||||||
"sigs.k8s.io/controller-runtime/pkg/client/apiutil"
|
"sigs.k8s.io/controller-runtime/pkg/client/apiutil"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -231,12 +232,6 @@ func (ip *specificInformersMap) addInformerToMap(gvk schema.GroupVersionKind, ob
|
|||||||
return nil, false, err
|
return nil, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
switch obj.(type) {
|
|
||||||
case *metav1.PartialObjectMetadata, *metav1.PartialObjectMetadataList:
|
|
||||||
ni = metadataSharedIndexInformerPreserveGVK(gvk, ni)
|
|
||||||
default:
|
|
||||||
}
|
|
||||||
|
|
||||||
i := &MapEntry{
|
i := &MapEntry{
|
||||||
Informer: ni,
|
Informer: ni,
|
||||||
Reader: CacheReader{
|
Reader: CacheReader{
|
||||||
@ -372,26 +367,85 @@ func createMetadataListWatch(gvk schema.GroupVersionKind, ip *specificInformersM
|
|||||||
return &cache.ListWatch{
|
return &cache.ListWatch{
|
||||||
ListFunc: func(opts metav1.ListOptions) (runtime.Object, error) {
|
ListFunc: func(opts metav1.ListOptions) (runtime.Object, error) {
|
||||||
ip.selectors[gvk].ApplyToList(&opts)
|
ip.selectors[gvk].ApplyToList(&opts)
|
||||||
|
|
||||||
|
var (
|
||||||
|
list *metav1.PartialObjectMetadataList
|
||||||
|
err error
|
||||||
|
)
|
||||||
namespace := restrictNamespaceBySelector(ip.namespace, ip.selectors[gvk])
|
namespace := restrictNamespaceBySelector(ip.namespace, ip.selectors[gvk])
|
||||||
if namespace != "" && mapping.Scope.Name() != meta.RESTScopeNameRoot {
|
if namespace != "" && mapping.Scope.Name() != meta.RESTScopeNameRoot {
|
||||||
return client.Resource(mapping.Resource).Namespace(namespace).List(ctx, opts)
|
list, err = client.Resource(mapping.Resource).Namespace(namespace).List(ctx, opts)
|
||||||
|
} else {
|
||||||
|
list, err = client.Resource(mapping.Resource).List(ctx, opts)
|
||||||
}
|
}
|
||||||
return client.Resource(mapping.Resource).List(ctx, opts)
|
if list != nil {
|
||||||
|
for i := range list.Items {
|
||||||
|
list.Items[i].SetGroupVersionKind(gvk)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
},
|
},
|
||||||
// Setup the watch function
|
// Setup the watch function
|
||||||
WatchFunc: func(opts metav1.ListOptions) (watch.Interface, error) {
|
WatchFunc: func(opts metav1.ListOptions) (watch.Interface, error) {
|
||||||
ip.selectors[gvk].ApplyToList(&opts)
|
ip.selectors[gvk].ApplyToList(&opts)
|
||||||
// Watch needs to be set to true separately
|
// Watch needs to be set to true separately
|
||||||
opts.Watch = true
|
opts.Watch = true
|
||||||
|
|
||||||
|
var (
|
||||||
|
watcher watch.Interface
|
||||||
|
err error
|
||||||
|
)
|
||||||
namespace := restrictNamespaceBySelector(ip.namespace, ip.selectors[gvk])
|
namespace := restrictNamespaceBySelector(ip.namespace, ip.selectors[gvk])
|
||||||
if namespace != "" && mapping.Scope.Name() != meta.RESTScopeNameRoot {
|
if namespace != "" && mapping.Scope.Name() != meta.RESTScopeNameRoot {
|
||||||
return client.Resource(mapping.Resource).Namespace(namespace).Watch(ctx, opts)
|
watcher, err = client.Resource(mapping.Resource).Namespace(namespace).Watch(ctx, opts)
|
||||||
|
} else {
|
||||||
|
watcher, err = client.Resource(mapping.Resource).Watch(ctx, opts)
|
||||||
}
|
}
|
||||||
return client.Resource(mapping.Resource).Watch(ctx, opts)
|
if watcher != nil {
|
||||||
|
watcher = newGVKFixupWatcher(gvk, watcher)
|
||||||
|
}
|
||||||
|
return watcher, err
|
||||||
},
|
},
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type gvkFixupWatcher struct {
|
||||||
|
watcher watch.Interface
|
||||||
|
ch chan watch.Event
|
||||||
|
gvk schema.GroupVersionKind
|
||||||
|
wg sync.WaitGroup
|
||||||
|
}
|
||||||
|
|
||||||
|
func newGVKFixupWatcher(gvk schema.GroupVersionKind, watcher watch.Interface) watch.Interface {
|
||||||
|
ch := make(chan watch.Event)
|
||||||
|
w := &gvkFixupWatcher{
|
||||||
|
gvk: gvk,
|
||||||
|
watcher: watcher,
|
||||||
|
ch: ch,
|
||||||
|
}
|
||||||
|
w.wg.Add(1)
|
||||||
|
go w.run()
|
||||||
|
return w
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *gvkFixupWatcher) run() {
|
||||||
|
for e := range w.watcher.ResultChan() {
|
||||||
|
e.Object.GetObjectKind().SetGroupVersionKind(w.gvk)
|
||||||
|
w.ch <- e
|
||||||
|
}
|
||||||
|
w.wg.Done()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *gvkFixupWatcher) Stop() {
|
||||||
|
w.watcher.Stop()
|
||||||
|
w.wg.Wait()
|
||||||
|
close(w.ch)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *gvkFixupWatcher) ResultChan() <-chan watch.Event {
|
||||||
|
return w.ch
|
||||||
|
}
|
||||||
|
|
||||||
// resyncPeriod returns a function which generates a duration each time it is
|
// resyncPeriod returns a function which generates a duration each time it is
|
||||||
// invoked; this is so that multiple controllers don't get into lock-step and all
|
// invoked; this is so that multiple controllers don't get into lock-step and all
|
||||||
// hammer the apiserver with list requests simultaneously.
|
// hammer the apiserver with list requests simultaneously.
|
||||||
|
71
vendor/sigs.k8s.io/controller-runtime/pkg/cache/internal/metadata_infomer_wrapper.go
generated
vendored
71
vendor/sigs.k8s.io/controller-runtime/pkg/cache/internal/metadata_infomer_wrapper.go
generated
vendored
@ -1,71 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright 2021 The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package internal
|
|
||||||
|
|
||||||
import (
|
|
||||||
"time"
|
|
||||||
|
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
||||||
"k8s.io/client-go/tools/cache"
|
|
||||||
)
|
|
||||||
|
|
||||||
func metadataSharedIndexInformerPreserveGVK(gvk schema.GroupVersionKind, si cache.SharedIndexInformer) cache.SharedIndexInformer {
|
|
||||||
return &sharedInformerWrapper{
|
|
||||||
gvk: gvk,
|
|
||||||
SharedIndexInformer: si,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
type sharedInformerWrapper struct {
|
|
||||||
gvk schema.GroupVersionKind
|
|
||||||
cache.SharedIndexInformer
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *sharedInformerWrapper) AddEventHandler(handler cache.ResourceEventHandler) {
|
|
||||||
s.SharedIndexInformer.AddEventHandler(&handlerPreserveGVK{s.gvk, handler})
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *sharedInformerWrapper) AddEventHandlerWithResyncPeriod(handler cache.ResourceEventHandler, resyncPeriod time.Duration) {
|
|
||||||
s.SharedIndexInformer.AddEventHandlerWithResyncPeriod(&handlerPreserveGVK{s.gvk, handler}, resyncPeriod)
|
|
||||||
}
|
|
||||||
|
|
||||||
type handlerPreserveGVK struct {
|
|
||||||
gvk schema.GroupVersionKind
|
|
||||||
cache.ResourceEventHandler
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *handlerPreserveGVK) resetGroupVersionKind(obj interface{}) {
|
|
||||||
if v, ok := obj.(schema.ObjectKind); ok {
|
|
||||||
v.SetGroupVersionKind(h.gvk)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *handlerPreserveGVK) OnAdd(obj interface{}) {
|
|
||||||
h.resetGroupVersionKind(obj)
|
|
||||||
h.ResourceEventHandler.OnAdd(obj)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *handlerPreserveGVK) OnUpdate(oldObj, newObj interface{}) {
|
|
||||||
h.resetGroupVersionKind(oldObj)
|
|
||||||
h.resetGroupVersionKind(newObj)
|
|
||||||
h.ResourceEventHandler.OnUpdate(oldObj, newObj)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *handlerPreserveGVK) OnDelete(obj interface{}) {
|
|
||||||
h.resetGroupVersionKind(obj)
|
|
||||||
h.ResourceEventHandler.OnDelete(obj)
|
|
||||||
}
|
|
14
vendor/sigs.k8s.io/controller-runtime/pkg/client/apiutil/apimachinery.go
generated
vendored
14
vendor/sigs.k8s.io/controller-runtime/pkg/client/apiutil/apimachinery.go
generated
vendored
@ -158,14 +158,12 @@ func createRestConfig(gvk schema.GroupVersionKind, isUnstructured bool, baseConf
|
|||||||
protobufSchemeLock.RUnlock()
|
protobufSchemeLock.RUnlock()
|
||||||
}
|
}
|
||||||
|
|
||||||
if cfg.NegotiatedSerializer == nil {
|
if isUnstructured {
|
||||||
if isUnstructured {
|
// If the object is unstructured, we need to preserve the GVK information.
|
||||||
// If the object is unstructured, we need to preserve the GVK information.
|
// Use our own custom serializer.
|
||||||
// Use our own custom serializer.
|
cfg.NegotiatedSerializer = serializerWithDecodedGVK{serializer.WithoutConversionCodecFactory{CodecFactory: codecs}}
|
||||||
cfg.NegotiatedSerializer = serializerWithDecodedGVK{serializer.WithoutConversionCodecFactory{CodecFactory: codecs}}
|
} else {
|
||||||
} else {
|
cfg.NegotiatedSerializer = serializerWithTargetZeroingDecode{NegotiatedSerializer: serializer.WithoutConversionCodecFactory{CodecFactory: codecs}}
|
||||||
cfg.NegotiatedSerializer = serializerWithTargetZeroingDecode{NegotiatedSerializer: serializer.WithoutConversionCodecFactory{CodecFactory: codecs}}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return cfg
|
return cfg
|
||||||
|
Loading…
Reference in New Issue
Block a user