rebase: bump k8s.io/kubernetes from 1.23.5 to 1.23.6

Bumps [k8s.io/kubernetes](https://github.com/kubernetes/kubernetes) from 1.23.5 to 1.23.6.
- [Release notes](https://github.com/kubernetes/kubernetes/releases)
- [Commits](https://github.com/kubernetes/kubernetes/compare/v1.23.5...v1.23.6)

---
updated-dependencies:
- dependency-name: k8s.io/kubernetes
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Niels de Vos <ndevos@redhat.com>
This commit is contained in:
dependabot[bot]
2022-04-25 20:17:18 +00:00
committed by mergify[bot]
parent b11951a710
commit 863a9a7882
11 changed files with 169 additions and 146 deletions

View File

@ -289,10 +289,9 @@ type UncountedTerminatedPods struct {
Failed []types.UID `json:"failed,omitempty" protobuf:"bytes,2,rep,name=failed,casttype=k8s.io/apimachinery/pkg/types.UID"`
}
// +enum
type JobConditionType string
// These are valid conditions of a job.
// These are built-in conditions of a job.
const (
// JobSuspended means the job has been suspended.
JobSuspended JobConditionType = "Suspended"

View File

@ -214,7 +214,6 @@ type CertificateSigningRequestStatus struct {
}
// RequestConditionType is the type of a CertificateSigningRequestCondition
// +enum
type RequestConditionType string
// Well-known condition types for certificate requests.

19
vendor/k8s.io/api/core/v1/types.go generated vendored
View File

@ -522,7 +522,6 @@ type PersistentVolumeClaimSpec struct {
}
// PersistentVolumeClaimConditionType is a valid value of PersistentVolumeClaimCondition.Type
// +enum
type PersistentVolumeClaimConditionType string
const (
@ -2635,10 +2634,9 @@ const (
)
// PodConditionType is a valid value for PodCondition.Type
// +enum
type PodConditionType string
// These are valid conditions of pod.
// These are built-in conditions of pod. An application may use a custom condition not listed here.
const (
// ContainersReady indicates whether all containers in the pod are ready.
ContainersReady PodConditionType = "ContainersReady"
@ -5055,11 +5053,10 @@ const (
NodeTerminated NodePhase = "Terminated"
)
// +enum
type NodeConditionType string
// These are valid conditions of node. Currently, we don't have enough information to decide
// node condition. In the future, we will add more. The proposed set of conditions are:
// These are valid but not exhaustive conditions of node. A cloud provider may set a condition not listed here.
// The built-in set of conditions are:
// NodeReachable, NodeLive, NodeReady, NodeSchedulable, NodeRunnable.
const (
// NodeReady means kubelet is healthy and ready to accept pods.
@ -5094,10 +5091,9 @@ type NodeCondition struct {
Message string `json:"message,omitempty" protobuf:"bytes,6,opt,name=message"`
}
// +enum
type NodeAddressType string
// These are valid address type of node.
// These are built-in addresses type of node. A cloud provider may set a type not listed here.
const (
// NodeHostName identifies a name of the node. Although every node can be assumed
// to have a NodeAddress of this type, its exact syntax and semantics are not
@ -5267,10 +5263,9 @@ const (
NamespaceTerminatingCause metav1.CauseType = "NamespaceTerminating"
)
// +enum
type NamespaceConditionType string
// These are valid conditions of a namespace.
// These are built-in conditions of a namespace.
const (
// NamespaceDeletionDiscoveryFailure contains information about namespace deleter errors during resource discovery.
NamespaceDeletionDiscoveryFailure NamespaceConditionType = "NamespaceDeletionDiscoveryFailure"
@ -5758,8 +5753,8 @@ type EventList struct {
// List holds a list of objects, which may not be known by the server.
type List metav1.List
// LimitType is a type of object that is limited
// +enum
// LimitType is a type of object that is limited. It can be Pod, Container, PersistentVolumeClaim or
// a fully qualified resource name.
type LimitType string
const (

View File

@ -413,6 +413,10 @@ func (c *Clientset) Discovery() discovery.DiscoveryInterface {
func NewForConfig(c *rest.Config) (*Clientset, error) {
configShallowCopy := *c
if configShallowCopy.UserAgent == "" {
configShallowCopy.UserAgent = rest.DefaultKubernetesUserAgent()
}
// share the transport between all clients
httpClient, err := rest.HTTPClientFor(&configShallowCopy)
if err != nil {

View File

@ -1 +0,0 @@
base.go export-subst

View File

@ -284,18 +284,15 @@ func (c *threadSafeMap) updateIndices(oldObj interface{}, newObj interface{}, ke
c.indices[name] = index
}
if len(indexValues) == 1 && len(oldIndexValues) == 1 && indexValues[0] == oldIndexValues[0] {
// We optimize for the most common case where indexFunc returns a single value which has not been changed
continue
}
for _, value := range oldIndexValues {
// We optimize for the most common case where index returns a single value.
if len(indexValues) == 1 && value == indexValues[0] {
continue
}
c.deleteKeyFromIndex(key, value, index)
}
for _, value := range indexValues {
// We optimize for the most common case where index returns a single value.
if len(oldIndexValues) == 1 && value == oldIndexValues[0] {
continue
}
c.addKeyToIndex(key, value, index)
}
}

View File

@ -248,6 +248,9 @@ func (f *Framework) BeforeEach() {
ginkgo.By("Waiting for a default service account to be provisioned in namespace")
err = WaitForDefaultServiceAccountInNamespace(f.ClientSet, namespace.Name)
ExpectNoError(err)
ginkgo.By("Waiting for kube-root-ca.crt to be provisioned in namespace")
err = WaitForKubeRootCAInNamespace(f.ClientSet, namespace.Name)
ExpectNoError(err)
} else {
Logf("Skipping waiting for service account")
}

View File

@ -282,6 +282,32 @@ func WaitForNamespacesDeleted(c clientset.Interface, namespaces []string, timeou
})
}
func waitForConfigMapInNamespace(c clientset.Interface, ns, name string, timeout time.Duration) error {
fieldSelector := fields.OneTermEqualSelector("metadata.name", name).String()
lw := &cache.ListWatch{
ListFunc: func(options metav1.ListOptions) (object runtime.Object, e error) {
options.FieldSelector = fieldSelector
return c.CoreV1().ConfigMaps(ns).List(context.TODO(), options)
},
WatchFunc: func(options metav1.ListOptions) (i watch.Interface, e error) {
options.FieldSelector = fieldSelector
return c.CoreV1().ConfigMaps(ns).Watch(context.TODO(), options)
},
}
ctx, cancel := watchtools.ContextWithOptionalTimeout(context.Background(), timeout)
defer cancel()
_, err := watchtools.UntilWithSync(ctx, lw, &v1.ConfigMap{}, nil, func(event watch.Event) (bool, error) {
switch event.Type {
case watch.Deleted:
return false, apierrors.NewNotFound(schema.GroupResource{Resource: "configmaps"}, name)
case watch.Added, watch.Modified:
return true, nil
}
return false, nil
})
return err
}
func waitForServiceAccountInNamespace(c clientset.Interface, ns, serviceAccountName string, timeout time.Duration) error {
fieldSelector := fields.OneTermEqualSelector("metadata.name", serviceAccountName).String()
lw := &cache.ListWatch{
@ -296,24 +322,18 @@ func waitForServiceAccountInNamespace(c clientset.Interface, ns, serviceAccountN
}
ctx, cancel := watchtools.ContextWithOptionalTimeout(context.Background(), timeout)
defer cancel()
_, err := watchtools.UntilWithSync(ctx, lw, &v1.ServiceAccount{}, nil, serviceAccountHasSecrets)
_, err := watchtools.UntilWithSync(ctx, lw, &v1.ServiceAccount{}, nil, func(event watch.Event) (bool, error) {
switch event.Type {
case watch.Deleted:
return false, apierrors.NewNotFound(schema.GroupResource{Resource: "serviceaccounts"}, serviceAccountName)
case watch.Added, watch.Modified:
return true, nil
}
return false, nil
})
return err
}
// serviceAccountHasSecrets returns true if the service account has at least one secret,
// false if it does not, or an error.
func serviceAccountHasSecrets(event watch.Event) (bool, error) {
switch event.Type {
case watch.Deleted:
return false, apierrors.NewNotFound(schema.GroupResource{Resource: "serviceaccounts"}, "")
}
switch t := event.Object.(type) {
case *v1.ServiceAccount:
return len(t.Secrets) > 0, nil
}
return false, nil
}
// WaitForDefaultServiceAccountInNamespace waits for the default service account to be provisioned
// the default service account is what is associated with pods when they do not specify a service account
// as a result, pods are not able to be provisioned in a namespace until the service account is provisioned
@ -321,6 +341,13 @@ func WaitForDefaultServiceAccountInNamespace(c clientset.Interface, namespace st
return waitForServiceAccountInNamespace(c, namespace, "default", ServiceAccountProvisionTimeout)
}
// WaitForKubeRootCAInNamespace waits for the configmap kube-root-ca.crt containing the service account
// CA trust bundle to be provisioned in the specified namespace so that pods do not have to retry mounting
// the config map (which creates noise that hides other issues in the Kubelet).
func WaitForKubeRootCAInNamespace(c clientset.Interface, namespace string) error {
return waitForConfigMapInNamespace(c, namespace, "kube-root-ca.crt", ServiceAccountProvisionTimeout)
}
// CreateTestingNS should be used by every test, note that we append a common prefix to the provided test name.
// Please see NewFramework instead of using this directly.
func CreateTestingNS(baseName string, c clientset.Interface, labels map[string]string) (*v1.Namespace, error) {

72
vendor/modules.txt vendored
View File

@ -749,7 +749,7 @@ gopkg.in/yaml.v2
# gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b
## explicit
gopkg.in/yaml.v3
# k8s.io/api v0.23.5 => k8s.io/api v0.23.5
# k8s.io/api v0.23.6 => k8s.io/api v0.23.6
## explicit; go 1.16
k8s.io/api/admission/v1
k8s.io/api/admission/v1beta1
@ -798,7 +798,7 @@ k8s.io/api/scheduling/v1beta1
k8s.io/api/storage/v1
k8s.io/api/storage/v1alpha1
k8s.io/api/storage/v1beta1
# k8s.io/apimachinery v0.23.5 => k8s.io/apimachinery v0.23.5
# k8s.io/apimachinery v0.23.6 => k8s.io/apimachinery v0.23.6
## explicit; go 1.16
k8s.io/apimachinery/pkg/api/equality
k8s.io/apimachinery/pkg/api/errors
@ -854,7 +854,7 @@ k8s.io/apimachinery/pkg/watch
k8s.io/apimachinery/third_party/forked/golang/json
k8s.io/apimachinery/third_party/forked/golang/netutil
k8s.io/apimachinery/third_party/forked/golang/reflect
# k8s.io/apiserver v0.23.5 => k8s.io/apiserver v0.23.5
# k8s.io/apiserver v0.23.6 => k8s.io/apiserver v0.23.6
## explicit; go 1.16
k8s.io/apiserver/pkg/admission
k8s.io/apiserver/pkg/admission/configuration
@ -895,7 +895,7 @@ k8s.io/apiserver/pkg/util/feature
k8s.io/apiserver/pkg/util/webhook
k8s.io/apiserver/pkg/util/x509metrics
k8s.io/apiserver/pkg/warning
# k8s.io/client-go v12.0.0+incompatible => k8s.io/client-go v0.23.5
# k8s.io/client-go v12.0.0+incompatible => k8s.io/client-go v0.23.6
## explicit; go 1.16
k8s.io/client-go/applyconfigurations/admissionregistration/v1
k8s.io/client-go/applyconfigurations/admissionregistration/v1beta1
@ -1138,12 +1138,12 @@ k8s.io/client-go/util/homedir
k8s.io/client-go/util/keyutil
k8s.io/client-go/util/retry
k8s.io/client-go/util/workqueue
# k8s.io/cloud-provider v0.23.5 => k8s.io/cloud-provider v0.23.5
# k8s.io/cloud-provider v0.23.6 => k8s.io/cloud-provider v0.23.6
## explicit; go 1.16
k8s.io/cloud-provider
k8s.io/cloud-provider/volume
k8s.io/cloud-provider/volume/helpers
# k8s.io/component-base v0.23.5 => k8s.io/component-base v0.23.5
# k8s.io/component-base v0.23.6 => k8s.io/component-base v0.23.6
## explicit; go 1.16
k8s.io/component-base/cli/flag
k8s.io/component-base/config
@ -1154,7 +1154,7 @@ k8s.io/component-base/metrics/legacyregistry
k8s.io/component-base/metrics/testutil
k8s.io/component-base/traces
k8s.io/component-base/version
# k8s.io/component-helpers v0.23.5 => k8s.io/component-helpers v0.23.5
# k8s.io/component-helpers v0.23.6 => k8s.io/component-helpers v0.23.6
## explicit; go 1.16
k8s.io/component-helpers/node/util/sysctl
k8s.io/component-helpers/scheduling/corev1
@ -1170,14 +1170,14 @@ k8s.io/klog/v2/internal/severity
## explicit; go 1.16
k8s.io/kube-openapi/pkg/schemaconv
k8s.io/kube-openapi/pkg/util/proto
# k8s.io/kubectl v0.0.0 => k8s.io/kubectl v0.23.5
# k8s.io/kubectl v0.0.0 => k8s.io/kubectl v0.23.6
## explicit; go 1.16
k8s.io/kubectl/pkg/scale
k8s.io/kubectl/pkg/util/podutils
# k8s.io/kubelet v0.0.0 => k8s.io/kubelet v0.23.5
# k8s.io/kubelet v0.0.0 => k8s.io/kubelet v0.23.6
## explicit; go 1.16
k8s.io/kubelet/pkg/apis/stats/v1alpha1
# k8s.io/kubernetes v1.23.5
# k8s.io/kubernetes v1.23.6
## explicit; go 1.16
k8s.io/kubernetes/pkg/api/legacyscheme
k8s.io/kubernetes/pkg/api/service
@ -1240,7 +1240,7 @@ k8s.io/kubernetes/test/e2e/storage/podlogs
k8s.io/kubernetes/test/e2e/storage/utils
k8s.io/kubernetes/test/utils
k8s.io/kubernetes/test/utils/image
# k8s.io/mount-utils v0.23.5 => k8s.io/mount-utils v0.23.5
# k8s.io/mount-utils v0.23.6 => k8s.io/mount-utils v0.23.6
## explicit; go 1.16
k8s.io/mount-utils
# k8s.io/utils v0.0.0-20211116205334-6203023598ed
@ -1319,29 +1319,29 @@ sigs.k8s.io/yaml
# github.com/golang/protobuf => github.com/golang/protobuf v1.4.3
# github.com/portworx/sched-ops => github.com/portworx/sched-ops v0.20.4-openstorage-rc3
# gomodules.xyz/jsonpatch/v2 => github.com/gomodules/jsonpatch/v2 v2.2.0
# k8s.io/api => k8s.io/api v0.23.5
# k8s.io/apiextensions-apiserver => k8s.io/apiextensions-apiserver v0.23.5
# k8s.io/apimachinery => k8s.io/apimachinery v0.23.5
# k8s.io/apiserver => k8s.io/apiserver v0.23.5
# k8s.io/cli-runtime => k8s.io/cli-runtime v0.23.5
# k8s.io/client-go => k8s.io/client-go v0.23.5
# k8s.io/cloud-provider => k8s.io/cloud-provider v0.23.5
# k8s.io/cluster-bootstrap => k8s.io/cluster-bootstrap v0.23.5
# k8s.io/code-generator => k8s.io/code-generator v0.23.5
# k8s.io/component-base => k8s.io/component-base v0.23.5
# k8s.io/component-helpers => k8s.io/component-helpers v0.23.5
# k8s.io/controller-manager => k8s.io/controller-manager v0.23.5
# k8s.io/cri-api => k8s.io/cri-api v0.23.5
# k8s.io/csi-translation-lib => k8s.io/csi-translation-lib v0.23.5
# k8s.io/kube-aggregator => k8s.io/kube-aggregator v0.23.5
# k8s.io/kube-controller-manager => k8s.io/kube-controller-manager v0.23.5
# k8s.io/kube-proxy => k8s.io/kube-proxy v0.23.5
# k8s.io/kube-scheduler => k8s.io/kube-scheduler v0.23.5
# k8s.io/kubectl => k8s.io/kubectl v0.23.5
# k8s.io/kubelet => k8s.io/kubelet v0.23.5
# k8s.io/legacy-cloud-providers => k8s.io/legacy-cloud-providers v0.23.5
# k8s.io/metrics => k8s.io/metrics v0.23.5
# k8s.io/mount-utils => k8s.io/mount-utils v0.23.5
# k8s.io/pod-security-admission => k8s.io/pod-security-admission v0.23.5
# k8s.io/sample-apiserver => k8s.io/sample-apiserver v0.23.5
# k8s.io/api => k8s.io/api v0.23.6
# k8s.io/apiextensions-apiserver => k8s.io/apiextensions-apiserver v0.23.6
# k8s.io/apimachinery => k8s.io/apimachinery v0.23.6
# k8s.io/apiserver => k8s.io/apiserver v0.23.6
# k8s.io/cli-runtime => k8s.io/cli-runtime v0.23.6
# k8s.io/client-go => k8s.io/client-go v0.23.6
# k8s.io/cloud-provider => k8s.io/cloud-provider v0.23.6
# k8s.io/cluster-bootstrap => k8s.io/cluster-bootstrap v0.23.6
# k8s.io/code-generator => k8s.io/code-generator v0.23.6
# k8s.io/component-base => k8s.io/component-base v0.23.6
# k8s.io/component-helpers => k8s.io/component-helpers v0.23.6
# k8s.io/controller-manager => k8s.io/controller-manager v0.23.6
# k8s.io/cri-api => k8s.io/cri-api v0.23.6
# k8s.io/csi-translation-lib => k8s.io/csi-translation-lib v0.23.6
# k8s.io/kube-aggregator => k8s.io/kube-aggregator v0.23.6
# k8s.io/kube-controller-manager => k8s.io/kube-controller-manager v0.23.6
# k8s.io/kube-proxy => k8s.io/kube-proxy v0.23.6
# k8s.io/kube-scheduler => k8s.io/kube-scheduler v0.23.6
# k8s.io/kubectl => k8s.io/kubectl v0.23.6
# k8s.io/kubelet => k8s.io/kubelet v0.23.6
# k8s.io/legacy-cloud-providers => k8s.io/legacy-cloud-providers v0.23.6
# k8s.io/metrics => k8s.io/metrics v0.23.6
# k8s.io/mount-utils => k8s.io/mount-utils v0.23.6
# k8s.io/pod-security-admission => k8s.io/pod-security-admission v0.23.6
# k8s.io/sample-apiserver => k8s.io/sample-apiserver v0.23.6
# layeh.com/radius => github.com/layeh/radius v0.0.0-20190322222518-890bc1058917