mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-12-18 11:00:25 +00:00
rebase: update github.com/ceph/ceph-csi to latest version
Signed-off-by: Niels de Vos <ndevos@ibm.com>
This commit is contained in:
parent
88ed4a12cc
commit
dee73e78af
2
go.mod
2
go.mod
@ -123,7 +123,7 @@ require (
|
|||||||
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f // indirect
|
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f // indirect
|
||||||
github.com/opencontainers/go-digest v1.0.0 // indirect
|
github.com/opencontainers/go-digest v1.0.0 // indirect
|
||||||
github.com/opencontainers/selinux v1.11.0 // indirect
|
github.com/opencontainers/selinux v1.11.0 // indirect
|
||||||
github.com/openshift/api v0.0.0-20230320192226-1fc631efd341 // indirect
|
github.com/openshift/api v0.0.0-20240115183315-0793e918179d // indirect
|
||||||
github.com/pkg/errors v0.9.1 // indirect
|
github.com/pkg/errors v0.9.1 // indirect
|
||||||
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 // indirect
|
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 // indirect
|
||||||
github.com/prometheus/client_model v0.5.0 // indirect
|
github.com/prometheus/client_model v0.5.0 // indirect
|
||||||
|
4
go.sum
4
go.sum
@ -1451,8 +1451,8 @@ github.com/opencontainers/go-digest v1.0.0/go.mod h1:0JzlMkj0TRzQZfJkVvzbP0HBR3I
|
|||||||
github.com/opencontainers/selinux v1.11.0 h1:+5Zbo97w3Lbmb3PeqQtpmTkMwsW5nRI3YaLpt7tQ7oU=
|
github.com/opencontainers/selinux v1.11.0 h1:+5Zbo97w3Lbmb3PeqQtpmTkMwsW5nRI3YaLpt7tQ7oU=
|
||||||
github.com/opencontainers/selinux v1.11.0/go.mod h1:E5dMC3VPuVvVHDYmi78qvhJp8+M586T4DlDRYpFkyec=
|
github.com/opencontainers/selinux v1.11.0/go.mod h1:E5dMC3VPuVvVHDYmi78qvhJp8+M586T4DlDRYpFkyec=
|
||||||
github.com/openshift/api v0.0.0-20210105115604-44119421ec6b/go.mod h1:aqU5Cq+kqKKPbDMqxo9FojgDeSpNJI7iuskjXjtojDg=
|
github.com/openshift/api v0.0.0-20210105115604-44119421ec6b/go.mod h1:aqU5Cq+kqKKPbDMqxo9FojgDeSpNJI7iuskjXjtojDg=
|
||||||
github.com/openshift/api v0.0.0-20230320192226-1fc631efd341 h1:PhLdiIlVqgN4frwrG8lNlbQdJ4eJcGdjX/vhlN6xupk=
|
github.com/openshift/api v0.0.0-20240115183315-0793e918179d h1:gtwDqGPf5QmsV8jvOUoDNbtyeby9QeLdsybNQ8mGqHQ=
|
||||||
github.com/openshift/api v0.0.0-20230320192226-1fc631efd341/go.mod h1:ctXNyWanKEjGj8sss1KjjHQ3ENKFm33FFnS5BKaIPh4=
|
github.com/openshift/api v0.0.0-20240115183315-0793e918179d/go.mod h1:CxgbWAlvu2iQB0UmKTtRu1YfepRg1/vJ64n2DlIEVz4=
|
||||||
github.com/openshift/build-machinery-go v0.0.0-20200917070002-f171684f77ab/go.mod h1:b1BuldmJlbA/xYtdZvKi+7j5YGB44qJUJDZ9zwiNCfE=
|
github.com/openshift/build-machinery-go v0.0.0-20200917070002-f171684f77ab/go.mod h1:b1BuldmJlbA/xYtdZvKi+7j5YGB44qJUJDZ9zwiNCfE=
|
||||||
github.com/openshift/client-go v0.0.0-20210112165513-ebc401615f47/go.mod h1:u7NRAjtYVAKokiI9LouzTv4mhds8P4S1TwdVAfbjKSk=
|
github.com/openshift/client-go v0.0.0-20210112165513-ebc401615f47/go.mod h1:u7NRAjtYVAKokiI9LouzTv4mhds8P4S1TwdVAfbjKSk=
|
||||||
github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
||||||
|
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/cephfs/doc.go
generated
vendored
Normal file
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/cephfs/doc.go
generated
vendored
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2024 The Ceph-CSI Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Package cephfs contains functions to obtain standard and recommended
|
||||||
|
// deployment artifacts for the CephFS CSI-driver on Kubernetes. These
|
||||||
|
// artifacts can be used by automation tools that want to deploy Ceph-CSI.
|
||||||
|
package cephfs
|
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/nfs/doc.go
generated
vendored
Normal file
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/nfs/doc.go
generated
vendored
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2021 The Ceph-CSI Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Package nfs contains functions to obtain standard and recommended deployment
|
||||||
|
// artifacts for the NFS CSI-driver on Kubernetes. These artifacts can be used
|
||||||
|
// by automation tools that want to deploy Ceph-CSI.
|
||||||
|
package nfs
|
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/rbd/doc.go
generated
vendored
Normal file
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/rbd/doc.go
generated
vendored
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2021 The Ceph-CSI Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Package rbd contains functions to obtain standard and recommended deployment
|
||||||
|
// artifacts for the RBD CSI-driver on Kubernetes. These artifacts can be used
|
||||||
|
// by automation tools that want to deploy Ceph-CSI.
|
||||||
|
package rbd
|
3
vendor/github.com/openshift/api/security/v1/consts.go
generated
vendored
3
vendor/github.com/openshift/api/security/v1/consts.go
generated
vendored
@ -7,4 +7,7 @@ const (
|
|||||||
SupplementalGroupsAnnotation = "openshift.io/sa.scc.supplemental-groups"
|
SupplementalGroupsAnnotation = "openshift.io/sa.scc.supplemental-groups"
|
||||||
MCSAnnotation = "openshift.io/sa.scc.mcs"
|
MCSAnnotation = "openshift.io/sa.scc.mcs"
|
||||||
ValidatedSCCAnnotation = "openshift.io/scc"
|
ValidatedSCCAnnotation = "openshift.io/scc"
|
||||||
|
// This annotation pins required SCCs for core OpenShift workloads to prevent preemption of custom SCCs.
|
||||||
|
// It is being used in the SCC admission plugin.
|
||||||
|
RequiredSCCAnnotation = "openshift.io/required-scc"
|
||||||
)
|
)
|
||||||
|
8
vendor/github.com/openshift/api/security/v1/generated.proto
generated
vendored
8
vendor/github.com/openshift/api/security/v1/generated.proto
generated
vendored
@ -137,6 +137,8 @@ message PodSecurityPolicySubjectReviewStatus {
|
|||||||
// Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
|
// Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
|
||||||
// +openshift:compatibility-gen:level=4
|
// +openshift:compatibility-gen:level=4
|
||||||
message RangeAllocation {
|
message RangeAllocation {
|
||||||
|
// metadata is the standard object's metadata.
|
||||||
|
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
||||||
|
|
||||||
// range is a string representing a unique label for a range of uids, "1000000000-2000000000/10000".
|
// range is a string representing a unique label for a range of uids, "1000000000-2000000000/10000".
|
||||||
@ -152,6 +154,8 @@ message RangeAllocation {
|
|||||||
// Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
|
// Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
|
||||||
// +openshift:compatibility-gen:level=1
|
// +openshift:compatibility-gen:level=1
|
||||||
message RangeAllocationList {
|
message RangeAllocationList {
|
||||||
|
// metadata is the standard list's metadata.
|
||||||
|
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||||
|
|
||||||
// List of RangeAllocations.
|
// List of RangeAllocations.
|
||||||
@ -203,6 +207,8 @@ message SELinuxContextStrategyOptions {
|
|||||||
// +kubebuilder:singular=securitycontextconstraint
|
// +kubebuilder:singular=securitycontextconstraint
|
||||||
// +openshift:compatibility-gen:level=1
|
// +openshift:compatibility-gen:level=1
|
||||||
message SecurityContextConstraints {
|
message SecurityContextConstraints {
|
||||||
|
// metadata is the standard object's metadata.
|
||||||
|
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
||||||
|
|
||||||
// Priority influences the sort order of SCCs when evaluating which SCCs to try first for
|
// Priority influences the sort order of SCCs when evaluating which SCCs to try first for
|
||||||
@ -346,6 +352,8 @@ message SecurityContextConstraints {
|
|||||||
// Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
|
// Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
|
||||||
// +openshift:compatibility-gen:level=1
|
// +openshift:compatibility-gen:level=1
|
||||||
message SecurityContextConstraintsList {
|
message SecurityContextConstraintsList {
|
||||||
|
// metadata is the standard list's metadata.
|
||||||
|
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||||
|
|
||||||
// List of security context constraints.
|
// List of security context constraints.
|
||||||
|
12
vendor/github.com/openshift/api/security/v1/types.go
generated
vendored
12
vendor/github.com/openshift/api/security/v1/types.go
generated
vendored
@ -35,6 +35,9 @@ var AllowAllCapabilities corev1.Capability = "*"
|
|||||||
// +openshift:compatibility-gen:level=1
|
// +openshift:compatibility-gen:level=1
|
||||||
type SecurityContextConstraints struct {
|
type SecurityContextConstraints struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
|
||||||
|
// metadata is the standard object's metadata.
|
||||||
|
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||||
|
|
||||||
// Priority influences the sort order of SCCs when evaluating which SCCs to try first for
|
// Priority influences the sort order of SCCs when evaluating which SCCs to try first for
|
||||||
@ -295,6 +298,9 @@ const (
|
|||||||
// +openshift:compatibility-gen:level=1
|
// +openshift:compatibility-gen:level=1
|
||||||
type SecurityContextConstraintsList struct {
|
type SecurityContextConstraintsList struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
|
||||||
|
// metadata is the standard list's metadata.
|
||||||
|
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||||
|
|
||||||
// List of security context constraints.
|
// List of security context constraints.
|
||||||
@ -431,6 +437,9 @@ type ServiceAccountPodSecurityPolicyReviewStatus struct {
|
|||||||
// +openshift:compatibility-gen:level=4
|
// +openshift:compatibility-gen:level=4
|
||||||
type RangeAllocation struct {
|
type RangeAllocation struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
|
||||||
|
// metadata is the standard object's metadata.
|
||||||
|
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||||
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||||
|
|
||||||
// range is a string representing a unique label for a range of uids, "1000000000-2000000000/10000".
|
// range is a string representing a unique label for a range of uids, "1000000000-2000000000/10000".
|
||||||
@ -449,6 +458,9 @@ type RangeAllocation struct {
|
|||||||
// +openshift:compatibility-gen:level=1
|
// +openshift:compatibility-gen:level=1
|
||||||
type RangeAllocationList struct {
|
type RangeAllocationList struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
|
||||||
|
// metadata is the standard list's metadata.
|
||||||
|
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||||
|
|
||||||
// List of RangeAllocations.
|
// List of RangeAllocations.
|
||||||
|
4
vendor/github.com/openshift/api/security/v1/zz_generated.swagger_doc_generated.go
generated
vendored
4
vendor/github.com/openshift/api/security/v1/zz_generated.swagger_doc_generated.go
generated
vendored
@ -122,6 +122,7 @@ func (PodSecurityPolicySubjectReviewStatus) SwaggerDoc() map[string]string {
|
|||||||
|
|
||||||
var map_RangeAllocation = map[string]string{
|
var map_RangeAllocation = map[string]string{
|
||||||
"": "RangeAllocation is used so we can easily expose a RangeAllocation typed for security group\n\nCompatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.",
|
"": "RangeAllocation is used so we can easily expose a RangeAllocation typed for security group\n\nCompatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.",
|
||||||
|
"metadata": "metadata is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
|
||||||
"range": "range is a string representing a unique label for a range of uids, \"1000000000-2000000000/10000\".",
|
"range": "range is a string representing a unique label for a range of uids, \"1000000000-2000000000/10000\".",
|
||||||
"data": "data is a byte array representing the serialized state of a range allocation. It is a bitmap with each bit set to one to represent a range is taken.",
|
"data": "data is a byte array representing the serialized state of a range allocation. It is a bitmap with each bit set to one to represent a range is taken.",
|
||||||
}
|
}
|
||||||
@ -132,6 +133,7 @@ func (RangeAllocation) SwaggerDoc() map[string]string {
|
|||||||
|
|
||||||
var map_RangeAllocationList = map[string]string{
|
var map_RangeAllocationList = map[string]string{
|
||||||
"": "RangeAllocationList is a list of RangeAllocations objects\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
"": "RangeAllocationList is a list of RangeAllocations objects\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
||||||
|
"metadata": "metadata is the standard list's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
|
||||||
"items": "List of RangeAllocations.",
|
"items": "List of RangeAllocations.",
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -163,6 +165,7 @@ func (SELinuxContextStrategyOptions) SwaggerDoc() map[string]string {
|
|||||||
|
|
||||||
var map_SecurityContextConstraints = map[string]string{
|
var map_SecurityContextConstraints = map[string]string{
|
||||||
"": "SecurityContextConstraints governs the ability to make requests that affect the SecurityContext that will be applied to a container. For historical reasons SCC was exposed under the core Kubernetes API group. That exposure is deprecated and will be removed in a future release - users should instead use the security.openshift.io group to manage SecurityContextConstraints.\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
"": "SecurityContextConstraints governs the ability to make requests that affect the SecurityContext that will be applied to a container. For historical reasons SCC was exposed under the core Kubernetes API group. That exposure is deprecated and will be removed in a future release - users should instead use the security.openshift.io group to manage SecurityContextConstraints.\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
||||||
|
"metadata": "metadata is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
|
||||||
"priority": "Priority influences the sort order of SCCs when evaluating which SCCs to try first for a given pod request based on access in the Users and Groups fields. The higher the int, the higher priority. An unset value is considered a 0 priority. If scores for multiple SCCs are equal they will be sorted from most restrictive to least restrictive. If both priorities and restrictions are equal the SCCs will be sorted by name.",
|
"priority": "Priority influences the sort order of SCCs when evaluating which SCCs to try first for a given pod request based on access in the Users and Groups fields. The higher the int, the higher priority. An unset value is considered a 0 priority. If scores for multiple SCCs are equal they will be sorted from most restrictive to least restrictive. If both priorities and restrictions are equal the SCCs will be sorted by name.",
|
||||||
"allowPrivilegedContainer": "AllowPrivilegedContainer determines if a container can request to be run as privileged.",
|
"allowPrivilegedContainer": "AllowPrivilegedContainer determines if a container can request to be run as privileged.",
|
||||||
"defaultAddCapabilities": "DefaultAddCapabilities is the default set of capabilities that will be added to the container unless the pod spec specifically drops the capability. You may not list a capabiility in both DefaultAddCapabilities and RequiredDropCapabilities.",
|
"defaultAddCapabilities": "DefaultAddCapabilities is the default set of capabilities that will be added to the container unless the pod spec specifically drops the capability. You may not list a capabiility in both DefaultAddCapabilities and RequiredDropCapabilities.",
|
||||||
@ -195,6 +198,7 @@ func (SecurityContextConstraints) SwaggerDoc() map[string]string {
|
|||||||
|
|
||||||
var map_SecurityContextConstraintsList = map[string]string{
|
var map_SecurityContextConstraintsList = map[string]string{
|
||||||
"": "SecurityContextConstraintsList is a list of SecurityContextConstraints objects\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
"": "SecurityContextConstraintsList is a list of SecurityContextConstraints objects\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
||||||
|
"metadata": "metadata is the standard list's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
|
||||||
"items": "List of security context constraints.",
|
"items": "List of security context constraints.",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
6
vendor/modules.txt
vendored
6
vendor/modules.txt
vendored
@ -134,7 +134,7 @@ github.com/cenkalti/backoff/v3
|
|||||||
## explicit; go 1.18
|
## explicit; go 1.18
|
||||||
github.com/cenkalti/backoff/v4
|
github.com/cenkalti/backoff/v4
|
||||||
# github.com/ceph/ceph-csi/api v0.0.0-00010101000000-000000000000 => ./api
|
# github.com/ceph/ceph-csi/api v0.0.0-00010101000000-000000000000 => ./api
|
||||||
## explicit; go 1.18
|
## explicit; go 1.21
|
||||||
github.com/ceph/ceph-csi/api/deploy/kubernetes
|
github.com/ceph/ceph-csi/api/deploy/kubernetes
|
||||||
github.com/ceph/ceph-csi/api/deploy/kubernetes/cephfs
|
github.com/ceph/ceph-csi/api/deploy/kubernetes/cephfs
|
||||||
github.com/ceph/ceph-csi/api/deploy/kubernetes/nfs
|
github.com/ceph/ceph-csi/api/deploy/kubernetes/nfs
|
||||||
@ -490,8 +490,8 @@ github.com/opencontainers/go-digest
|
|||||||
github.com/opencontainers/selinux/go-selinux
|
github.com/opencontainers/selinux/go-selinux
|
||||||
github.com/opencontainers/selinux/go-selinux/label
|
github.com/opencontainers/selinux/go-selinux/label
|
||||||
github.com/opencontainers/selinux/pkg/pwalkdir
|
github.com/opencontainers/selinux/pkg/pwalkdir
|
||||||
# github.com/openshift/api v0.0.0-20230320192226-1fc631efd341
|
# github.com/openshift/api v0.0.0-20240115183315-0793e918179d
|
||||||
## explicit; go 1.19
|
## explicit; go 1.21
|
||||||
github.com/openshift/api/security/v1
|
github.com/openshift/api/security/v1
|
||||||
# github.com/pkg/errors v0.9.1
|
# github.com/pkg/errors v0.9.1
|
||||||
## explicit
|
## explicit
|
||||||
|
Loading…
Reference in New Issue
Block a user